{"id":63746,"date":"2024-09-12T11:30:16","date_gmt":"2024-09-12T11:30:16","guid":{"rendered":"https:\/\/ushopwell.com\/ublog\/establishing-reverse-shell-using-netcat-web-application-security-gurukula\/"},"modified":"2024-09-12T11:30:16","modified_gmt":"2024-09-12T11:30:16","slug":"establishing-reverse-shell-using-netcat-web-application-security-gurukula","status":"publish","type":"post","link":"https:\/\/ushopwell.com\/ublog\/establishing-reverse-shell-using-netcat-web-application-security-gurukula\/","title":{"rendered":"Establishing Reverse Shell using Netcat | Web Application Security | @GURUKULA"},"content":{"rendered":"<div class=\"youtubomatic-video-container\"><iframe loading=\"lazy\" width=\"580\" height=\"380\" src=\"https:\/\/www.youtube.com\/embed\/LdLXrbtcm94?autoplay=1&#038;controls=1&#038;hl=en\" frameborder=\"0\" allowfullscreen><\/iframe><\/div>\n<p>Welcome to GURUKULA! In this advanced tutorial, we explore how to create a **Reverse Shell using Command Injection**. A reverse shell is a powerful method used by attackers to gain remote access to a target system by exploiting command injection vulnerabilities. This video will guide you through the process of executing a reverse shell, the risks associated with it, and the preventive measures you can implement to secure your applications.<\/p>\n<p>Link to Complete Playlist:<\/p>\n<p><a href=\"https:\/\/www.youtube.com\/playlist?list=PLA2UBjeRwle0p5iZVtseIBGkdQZ7kZ-KZ\" target=\"_blank\" rel=\"noopener\">https:\/\/www.youtube.com\/playlist?list=PLA2UBjeRwle0p5iZVtseIBGkdQZ7kZ-KZ<\/a><\/p>\n<p>If you find this tutorial insightful, please like, share, and subscribe to GURUKULA for more advanced cybersecurity content and tech tutorials. Don\u2019t forget to hit the notification bell so you never miss an update!<\/p>\n<p>**Let&#8217;s connect and learn together! Follow GURUKULA on all our platforms for more updates:**<\/p>\n<p>&#8211; Facebook: <a href=\"https:\/\/facebook.com\/letslearnwithgurukula\" target=\"_blank\" rel=\"noopener\">https:\/\/facebook.com\/letslearnwithgurukula<\/a><br \/>\n&#8211; Instagram: <a href=\"https:\/\/www.instagram.com\/learnwithgurukula\" target=\"_blank\" rel=\"noopener\">https:\/\/www.instagram.com\/learnwithgurukula<\/a><br \/>\n&#8211; WhatsApp Channel: <a href=\"https:\/\/whatsapp.com\/channel\/0029Va6PiCh7NoZrWWRceQ2M\" target=\"_blank\" rel=\"noopener\">https:\/\/whatsapp.com\/channel\/0029Va6PiCh7NoZrWWRceQ2M<\/a><br \/>\n&#8211; LinkedIn: <a href=\"https:\/\/www.linkedin.com\/company\/learnwithgurukula\" target=\"_blank\" rel=\"noopener\">https:\/\/www.linkedin.com\/company\/learnwithgurukula<\/a><\/p>\n<p>### Hashtags:<br \/>\nEstablishing Reverse Shell using Netcat | Web Application Security |  @GURUKULA<br \/>\n#ReverseShell #CommandInjection #CyberSecurity #EthicalHacking #PenetrationTesting #WebApplicationSecurity #GURUKULA #LearnCyberSecurity #SecurityTesting #netcat #hackingtutorial<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Welcome to GURUKULA! In this advanced tutorial, we explore how to create a **Reverse Shell using Command Injection**. A reverse shell is a powerful method used by attackers to gain remote access to a target system by exploiting command injection vulnerabilities. This video will guide you through the process of executing a reverse shell, the risks associated with it, and the preventive measures you can implement to secure your applications&#8230;.<\/p>\n","protected":false},"author":1,"featured_media":63747,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","tve_updated_post":"","tve_custom_css":"","tve_user_custom_css":"","tve_globals":{},"tcb2_ready":0,"tcb_editor_enabled":0,"tve_landing_page":"","_tve_header":"","_tve_footer":""},"categories":[1],"tags":[],"class_list":["post-63746","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Establishing Reverse Shell using Netcat | Web Application Security | @GURUKULA - UshopWell.com<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ushopwell.com\/ublog\/establishing-reverse-shell-using-netcat-web-application-security-gurukula\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Establishing Reverse Shell using Netcat | Web Application Security | @GURUKULA - UshopWell.com\" \/>\n<meta property=\"og:description\" content=\"Welcome to GURUKULA! In this advanced tutorial, we explore how to create a **Reverse Shell using Command Injection**. A reverse shell is a powerful method used by attackers to gain remote access to a target system by exploiting command injection vulnerabilities. This video will guide you through the process of executing a reverse shell, the risks associated with it, and the preventive measures you can implement to secure your applications....\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ushopwell.com\/ublog\/establishing-reverse-shell-using-netcat-web-application-security-gurukula\/\" \/>\n<meta property=\"og:site_name\" content=\"UshopWell.com\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-12T11:30:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ushopwell.com\/ublog\/wp-content\/uploads\/2024\/09\/63746\/establishing-reverse-shell-using-netcat-web-application-security-gurukula.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"480\" \/>\n\t<meta property=\"og:image:height\" content=\"360\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"UShopWell\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"UShopWell\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/establishing-reverse-shell-using-netcat-web-application-security-gurukula\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/establishing-reverse-shell-using-netcat-web-application-security-gurukula\\\/\"},\"author\":{\"name\":\"UShopWell\",\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/#\\\/schema\\\/person\\\/6fd1f9e0ff932e534c86c70d5acff0fc\"},\"headline\":\"Establishing Reverse Shell using Netcat | Web Application Security | @GURUKULA\",\"datePublished\":\"2024-09-12T11:30:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/establishing-reverse-shell-using-netcat-web-application-security-gurukula\\\/\"},\"wordCount\":196,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/establishing-reverse-shell-using-netcat-web-application-security-gurukula\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/63746\\\/establishing-reverse-shell-using-netcat-web-application-security-gurukula.jpg\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/establishing-reverse-shell-using-netcat-web-application-security-gurukula\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/establishing-reverse-shell-using-netcat-web-application-security-gurukula\\\/\",\"url\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/establishing-reverse-shell-using-netcat-web-application-security-gurukula\\\/\",\"name\":\"Establishing Reverse Shell using Netcat | Web Application Security | @GURUKULA - UshopWell.com\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/establishing-reverse-shell-using-netcat-web-application-security-gurukula\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/establishing-reverse-shell-using-netcat-web-application-security-gurukula\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/63746\\\/establishing-reverse-shell-using-netcat-web-application-security-gurukula.jpg\",\"datePublished\":\"2024-09-12T11:30:16+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/establishing-reverse-shell-using-netcat-web-application-security-gurukula\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/establishing-reverse-shell-using-netcat-web-application-security-gurukula\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/establishing-reverse-shell-using-netcat-web-application-security-gurukula\\\/#primaryimage\",\"url\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/63746\\\/establishing-reverse-shell-using-netcat-web-application-security-gurukula.jpg\",\"contentUrl\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/63746\\\/establishing-reverse-shell-using-netcat-web-application-security-gurukula.jpg\",\"width\":480,\"height\":360,\"caption\":\"Establishing Reverse Shell using Netcat | Web Application Security | @GURUKULA\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/establishing-reverse-shell-using-netcat-web-application-security-gurukula\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Establishing Reverse Shell using Netcat | Web Application Security | @GURUKULA\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/#website\",\"url\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/\",\"name\":\"UshopWell.com\",\"description\":\"The Premiere Online Marketplace\",\"publisher\":{\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/#organization\",\"name\":\"UshopWell\",\"url\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/wp-content\\\/uploads\\\/2018\\\/01\\\/pandaSwea.png\",\"contentUrl\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/wp-content\\\/uploads\\\/2018\\\/01\\\/pandaSwea.png\",\"width\":365,\"height\":359,\"caption\":\"UshopWell\"},\"image\":{\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/#\\\/schema\\\/person\\\/6fd1f9e0ff932e534c86c70d5acff0fc\",\"name\":\"UShopWell\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4adb372cadd43b4d4c57964dab95b0f69618bf960d131c4acf49d96d6bbc9c6e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4adb372cadd43b4d4c57964dab95b0f69618bf960d131c4acf49d96d6bbc9c6e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4adb372cadd43b4d4c57964dab95b0f69618bf960d131c4acf49d96d6bbc9c6e?s=96&d=mm&r=g\",\"caption\":\"UShopWell\"},\"url\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/author\\\/kburnettu\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Establishing Reverse Shell using Netcat | Web Application Security | @GURUKULA - UshopWell.com","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ushopwell.com\/ublog\/establishing-reverse-shell-using-netcat-web-application-security-gurukula\/","og_locale":"en_US","og_type":"article","og_title":"Establishing Reverse Shell using Netcat | Web Application Security | @GURUKULA - UshopWell.com","og_description":"Welcome to GURUKULA! In this advanced tutorial, we explore how to create a **Reverse Shell using Command Injection**. A reverse shell is a powerful method used by attackers to gain remote access to a target system by exploiting command injection vulnerabilities. This video will guide you through the process of executing a reverse shell, the risks associated with it, and the preventive measures you can implement to secure your applications....","og_url":"https:\/\/ushopwell.com\/ublog\/establishing-reverse-shell-using-netcat-web-application-security-gurukula\/","og_site_name":"UshopWell.com","article_published_time":"2024-09-12T11:30:16+00:00","og_image":[{"width":480,"height":360,"url":"https:\/\/ushopwell.com\/ublog\/wp-content\/uploads\/2024\/09\/63746\/establishing-reverse-shell-using-netcat-web-application-security-gurukula.jpg","type":"image\/jpeg"}],"author":"UShopWell","twitter_card":"summary_large_image","twitter_misc":{"Written by":"UShopWell","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ushopwell.com\/ublog\/establishing-reverse-shell-using-netcat-web-application-security-gurukula\/#article","isPartOf":{"@id":"https:\/\/ushopwell.com\/ublog\/establishing-reverse-shell-using-netcat-web-application-security-gurukula\/"},"author":{"name":"UShopWell","@id":"https:\/\/ushopwell.com\/ublog\/#\/schema\/person\/6fd1f9e0ff932e534c86c70d5acff0fc"},"headline":"Establishing Reverse Shell using Netcat | Web Application Security | @GURUKULA","datePublished":"2024-09-12T11:30:16+00:00","mainEntityOfPage":{"@id":"https:\/\/ushopwell.com\/ublog\/establishing-reverse-shell-using-netcat-web-application-security-gurukula\/"},"wordCount":196,"commentCount":0,"publisher":{"@id":"https:\/\/ushopwell.com\/ublog\/#organization"},"image":{"@id":"https:\/\/ushopwell.com\/ublog\/establishing-reverse-shell-using-netcat-web-application-security-gurukula\/#primaryimage"},"thumbnailUrl":"https:\/\/ushopwell.com\/ublog\/wp-content\/uploads\/2024\/09\/63746\/establishing-reverse-shell-using-netcat-web-application-security-gurukula.jpg","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ushopwell.com\/ublog\/establishing-reverse-shell-using-netcat-web-application-security-gurukula\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ushopwell.com\/ublog\/establishing-reverse-shell-using-netcat-web-application-security-gurukula\/","url":"https:\/\/ushopwell.com\/ublog\/establishing-reverse-shell-using-netcat-web-application-security-gurukula\/","name":"Establishing Reverse Shell using Netcat | Web Application Security | @GURUKULA - UshopWell.com","isPartOf":{"@id":"https:\/\/ushopwell.com\/ublog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ushopwell.com\/ublog\/establishing-reverse-shell-using-netcat-web-application-security-gurukula\/#primaryimage"},"image":{"@id":"https:\/\/ushopwell.com\/ublog\/establishing-reverse-shell-using-netcat-web-application-security-gurukula\/#primaryimage"},"thumbnailUrl":"https:\/\/ushopwell.com\/ublog\/wp-content\/uploads\/2024\/09\/63746\/establishing-reverse-shell-using-netcat-web-application-security-gurukula.jpg","datePublished":"2024-09-12T11:30:16+00:00","breadcrumb":{"@id":"https:\/\/ushopwell.com\/ublog\/establishing-reverse-shell-using-netcat-web-application-security-gurukula\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ushopwell.com\/ublog\/establishing-reverse-shell-using-netcat-web-application-security-gurukula\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ushopwell.com\/ublog\/establishing-reverse-shell-using-netcat-web-application-security-gurukula\/#primaryimage","url":"https:\/\/ushopwell.com\/ublog\/wp-content\/uploads\/2024\/09\/63746\/establishing-reverse-shell-using-netcat-web-application-security-gurukula.jpg","contentUrl":"https:\/\/ushopwell.com\/ublog\/wp-content\/uploads\/2024\/09\/63746\/establishing-reverse-shell-using-netcat-web-application-security-gurukula.jpg","width":480,"height":360,"caption":"Establishing Reverse Shell using Netcat | Web Application Security | @GURUKULA"},{"@type":"BreadcrumbList","@id":"https:\/\/ushopwell.com\/ublog\/establishing-reverse-shell-using-netcat-web-application-security-gurukula\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ushopwell.com\/ublog\/"},{"@type":"ListItem","position":2,"name":"Establishing Reverse Shell using Netcat | Web Application Security | @GURUKULA"}]},{"@type":"WebSite","@id":"https:\/\/ushopwell.com\/ublog\/#website","url":"https:\/\/ushopwell.com\/ublog\/","name":"UshopWell.com","description":"The Premiere Online Marketplace","publisher":{"@id":"https:\/\/ushopwell.com\/ublog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ushopwell.com\/ublog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ushopwell.com\/ublog\/#organization","name":"UshopWell","url":"https:\/\/ushopwell.com\/ublog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ushopwell.com\/ublog\/#\/schema\/logo\/image\/","url":"https:\/\/ushopwell.com\/ublog\/wp-content\/uploads\/2018\/01\/pandaSwea.png","contentUrl":"https:\/\/ushopwell.com\/ublog\/wp-content\/uploads\/2018\/01\/pandaSwea.png","width":365,"height":359,"caption":"UshopWell"},"image":{"@id":"https:\/\/ushopwell.com\/ublog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/ushopwell.com\/ublog\/#\/schema\/person\/6fd1f9e0ff932e534c86c70d5acff0fc","name":"UShopWell","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/4adb372cadd43b4d4c57964dab95b0f69618bf960d131c4acf49d96d6bbc9c6e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/4adb372cadd43b4d4c57964dab95b0f69618bf960d131c4acf49d96d6bbc9c6e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4adb372cadd43b4d4c57964dab95b0f69618bf960d131c4acf49d96d6bbc9c6e?s=96&d=mm&r=g","caption":"UShopWell"},"url":"https:\/\/ushopwell.com\/ublog\/author\/kburnettu\/"}]}},"_links":{"self":[{"href":"https:\/\/ushopwell.com\/ublog\/wp-json\/wp\/v2\/posts\/63746","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ushopwell.com\/ublog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ushopwell.com\/ublog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ushopwell.com\/ublog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ushopwell.com\/ublog\/wp-json\/wp\/v2\/comments?post=63746"}],"version-history":[{"count":0,"href":"https:\/\/ushopwell.com\/ublog\/wp-json\/wp\/v2\/posts\/63746\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ushopwell.com\/ublog\/wp-json\/wp\/v2\/media\/63747"}],"wp:attachment":[{"href":"https:\/\/ushopwell.com\/ublog\/wp-json\/wp\/v2\/media?parent=63746"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ushopwell.com\/ublog\/wp-json\/wp\/v2\/categories?post=63746"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ushopwell.com\/ublog\/wp-json\/wp\/v2\/tags?post=63746"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}