{"id":25679,"date":"2023-09-02T00:24:16","date_gmt":"2023-09-01T22:24:16","guid":{"rendered":"https:\/\/blog.mi.hdm-stuttgart.de\/?p=25679"},"modified":"2023-09-02T00:24:18","modified_gmt":"2023-09-01T22:24:18","slug":"browser-session-hijacking","status":"publish","type":"post","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2023\/09\/02\/browser-session-hijacking\/","title":{"rendered":"Browser Session Hijacking"},"content":{"rendered":"\n<p class=\"has-text-align-justify\">Everybody knows that the internet is a dangerous place. You constantly hear about data breaches, stolen or leaked passwords and are reminded to keep your personal information safe from malicious entities. So, what do you do to keep your information safe? You use a strong password, avoid websites without https and even use a 2FA. But what if I tell you that all of this can be easily bypassed?<\/p>\n\n\n\n<p class=\"has-text-align-justify\">In this article, I will talk about browser session hijacking, and how it can be used (at least to some degree) to bypass all currently used security measures. (Justin Warner, 2018) Later I will propose changes that can be implemented to reduce the risk of a successful session hijacking, or at least mitigate the damage caused by it.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is a browser session?<\/h2>\n\n\n\n<p class=\"has-text-align-justify\">First of a quick rundown of what a browser session is and why we even need one. The web uses http\/https to communicate information between the client and the server. But http has the problem, that it is a stateless protocol, therefore it does not remember either the user, or possible data the user previously transmitted. To be able to save information the user submitted and for the server to remember the current user cookies are used. These store some information about the user\u2019s system and a unique identifier, with which the server can identify incoming traffic to the user. These identifying cookies are the browser session cookies which function as an authentication token for the user. (Johnson, 2021) (The TechCave, 2021)<\/p>\n\n\n\n<p class=\"has-text-align-justify\">We use these sessions cookies to allow users to navigate to new sites on our website without having to reauthenticate themselves or resubmit information. Furthermore, a lot of websites allow these cookies to be saved with long lasting lifetimes, to reduce the need for reauthentication after browser or system restarts. This allows the websites to offer a fluent browsing experience to the user, which allows users to just use the website without having to worry about logging into every service once they have started a browsing session. (Johnson, 2021)<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why is it vulnerable?<\/h2>\n\n\n\n<p class=\"has-text-align-justify\">Since the cookie is used to identify the current user and keep it logged in, it allows this file to be used instead of the login information to validate the current session. Therefore, it functions as a purpose-built bypass of the security measures for authorized access to the system. And herein is the crux of the problem: How are these security bypassing measures secured? Most often not. And even worse, to identify the current sessions, these cookies are sent to the server via the web, which leads to another potential point of attack, if the traffic is not sufficiently protected. (The TechCave, 2021)<\/p>\n\n\n\n<p class=\"has-text-align-justify\">Most of the assumed security of session cookies is the difficulty to access or load these cookies. But cookies are usually written to and read by many different JavaScript\u2019s from the website and are not necessarily encrypted by any measure. A lot of browsers allow exporting and importing of browser sessions as well, which includes the cookies. This implies, that if the system of the user is in any way compromised, the attacker might be able to access these cookies and import them into another browser on another machine. (The TechCave, 2021)<\/p>\n\n\n\n<p class=\"has-text-align-justify\">As previously mentioned, the browser session cookies have no predefined lifetime. The server can choose which lifetime it assigns to the session. This leads to a simple file saved in your browser, being able to be used as a bypass for your security measures for a prolonged period. While services like financial institutes are quite good at keeping the accepted lifetime of the cookie to a minimum, a lot of services choose to prioritize user comfort over security. This allows attackers a greater time frame to steal and use a session cookie, which makes these attacks easier to execute as well as more attractive attacks. (The TechCave, 2021)<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How does it get hijacked?<\/h2>\n\n\n\n<p class=\"has-text-align-justify\">A big problem with session cookies is their identifiable name. The server uses a set name for the session cookie to identify it as such a cookie and uses the data contained to identify the user. This enables attackers to look up the name of the session cookie for a given service in their own browser, as long as they are logged into their own account. With this given name they can identify the session cookie of any user once they gained access to their cookies or web traffic. (wunderwuzzi, 2018)<\/p>\n\n\n\n<p class=\"has-text-align-justify\">There are a lot of possible ways to get access to browser cookies, but some are more commonly used than others. The following are examples of these common attack vectors.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><em>Session Sniffing<\/em><\/h4>\n\n\n\n<p class=\"has-text-align-justify\">A common attack vector to gain access to cookies of users, are man in the middle attacks. If the user is using an unprotected network the attacker can read the user\u2019s internet traffic and use a package sniffer to listen for the packages that contain the session cookie. Even private networks can be susceptible to these attacks once the attacker gained access to a device in that network. In the age of smart devices this attack vector has become a rising risk.\u00a0(Justin Warner, 2018) (OWASP, 2023)<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><em>Session Fixation<\/em><\/h4>\n\n\n\n<p class=\"has-text-align-justify\">Another possibility to gain access to a valid session cookie of a user, is the usage of session fixation. This kind of attack only works for services, which create the session cookie, before the user is logged into an account. This is often the case since many services track the users inputs even if the user is not logged in, to already allow information to be saved. In this process the attacker generates a valid session cookie by visiting the target site without logging in. Afterwards the attacker sends a link containing the generated session cookie to the user. Once the user clicks on the link, the session ID which is embedded in the link is set in their browser. The server recognizes the cookie and once the user logs in it is associated with the current user. Therefore both user and attacker to access the service. (Johnson, 2021)\u00a0(OWASP, 2022)<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><em>Cross-site scripting<\/em><\/h4>\n\n\n\n<p class=\"has-text-align-justify\">If an attacker finds some vulnerabilities in a web server, they might be able to inject JavaScript into the website. These kinds of attacks are called cross-site scripting. Since JavaScript\u2019s are used by the server to write information to the cookies to identify the user and save their information, the browser trusts the server to access them. This allows the malicious scripts to read the session cookie of each user and send it to the attacker, which can therefore use it to access the system. (OWASP, 2023) (The TechCave, 2021)<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><em>Malware<\/em><\/h4>\n\n\n\n<p class=\"has-text-align-justify\">If the attacker manages to install malware on the target machine, they can try different strategies to access the cookies. They can either try to directly access the storage location of the browser cookies on the disc, try to generate a process dump of the browser containing the cookie, install malicious add-ons into the browser that read the cookies or use package sniffing to listen for the cookie. (Justin Warner, 2018) (OWASP, 2023)<\/p>\n\n\n\n<p class=\"has-text-align-justify\">Once the cookie is acquired the attacker can import this cookie into their own browser and will be immediately logged into the account of the user once they open the website the cookie is referring to. From there they might try to steal sensitive information, change the current security measures, or use the account for malicious activities. (Johnson, 2021)<\/p>\n\n\n\n<p class=\"has-text-align-justify\">The malware might even allow the attacker to use the users network as a VPN, to be able to send the request of the attacker with the same IP address as the user. This can bypass further session cookie protection measures.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What can we do to prevent successful hijacking?<\/h2>\n\n\n\n<p class=\"has-text-align-justify\">As with most security flaws in IT-Systems, they are not something inevitable but most often a result of poor execution. The same goes for session cookies, which can easily be improved to offer similar quality of life, while reducing the risk that a session might be used by an unauthorized user.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><em>Use system information to identify the session in addition to the cookie.<\/em><\/h4>\n\n\n\n<p class=\"has-text-align-justify\">If we use system information like, browser version, IP-Address and so on to identify the current session that a user is using to connect to the server, then we force the attacker to be able to copy all these information to be able to use the hijacked cookie. If this method of authentication is used it will slightly reduce the ease of use of session cookies, since mobile devices will require reauthentication after switching networks. On the other hand, this would make session hijacking such a difficult endeavor that attackers might ignore this attack completely. (wunderwuzzi, 2018)<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><em>Encrypt all traffic to the server.<\/em><\/h4>\n\n\n\n<p class=\"has-text-align-justify\">If we only use https to communicate between client and server, we can mitigate an easy identification of which packages contain the session cookie that the attacker tries to gain access to. Currently a lot of servers use http traffic for information it does not consider sensitive information, which often contains cookies as well. This change would not have any impact on the browsing experience while almost eliminating package sniffing attacks. (Bugliesi, 2015) (The TechCave, 2021) (Johnson, 2021)<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><em>Encrypt all locally saved browser cookies.<\/em><\/h4>\n\n\n\n<p class=\"has-text-align-justify\">A very attractive attack to gain access to session cookies is accessing the saved browser cookies on disc. This attack allows the attacker to gain access to all saved cookies at once and might give them multiple valid session at once. To reduce the risk of these cookies being accessed, the browser could encrypt all cookies before writing them to disc. This method would force attackers to use a process dump attack to gain access to these cookies, which might be more difficult to execute.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><em>Do not save cookies or limit their lifetime to a minimum.<\/em><\/h4>\n\n\n\n<p class=\"has-text-align-justify\">Not saving cookies and limiting their lifetime would highly reduce the window of opportunity that an attacker can use to gain access to the service. This method is often used by financial institutions, which force a logout after a short period of time, but would generate a lot of frustration in users, which would be forced to repeatedly log into low-risk services. (wunderwuzzi, 2018)<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><em>Use ever changing session cookies.<\/em><\/h4>\n\n\n\n<p class=\"has-text-align-justify\">Another possibility to reduce the window of opportunity for a successful attack is the implementation of ever-changing session identifiers. After each successful interaction with a server through a session cookie, the server sends a new session cookie and invalidates the old one. This system reduces the lifetime of each session cookie to a minimum and therefore limits the time a stolen cookie can be used to until the user performed the next action. A problem that might arise through this system is through the asynchronous communication of server and client. This might lead to a request getting delayed and another request using the same valid session cookie. The first request will therefore be denied by the server since that session cookie was used up by the second request. This might lead to unexpected errors while using the service. (The TechCave, 2021) (Wikipedia, 2023)<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><em>Request reauthentication for sensitive actions.<\/em><\/h4>\n\n\n\n<p class=\"has-text-align-justify\">Most of the damage that can be caused by an attacker lies in the entire hijacking of the account. With a valid session the attacker might be able to change security credentials and lock the current user out of their account. To prevent this the server can ignore the currently valid session before taking any security relevant actions and request an authentication via 2FA or password. This limits the possibilities of the attacker to cause damage while being a generally accepted approach to increased security by the user. (wunderwuzzi, 2018) (The TechCave, 2021)<\/p>\n\n\n\n<p class=\"has-text-align-justify\">Additionally, the user can try to use common techniques to reduce possible attack vectors. These include encrypting all internet traffic with a VPN, avoiding public unsecured Wi-Fi if possible, deleting old cookies and adhering to anti-malware best practices. But in the end, the server dictates how the session cookie is set up and used, which puts most of the responsibility on its side.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Further Reading:<\/h2>\n\n\n\n<p><a href=\"https:\/\/embracethered.com\/blog\/posts\/passthecookie\/\" target=\"_blank\" rel=\"noopener\">An example of a successful cookie \u201ctheft\u201d with pictures.<\/a><\/p>\n\n\n\n<p>A short video about the usage of session theft spreading on YouTube.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe loading=\"lazy\" class=\"youtube-player\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/xf9ERdBkM5M?version=3&#038;rel=1&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;fs=1&#038;hl=en-US&#038;autohide=2&#038;wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation allow-popups-to-escape-sandbox\"><\/iframe><\/span>\n<\/div><\/figure>\n\n\n\n<p><a href=\"https:\/\/attack.mitre.org\/techniques\/T1185\/\" target=\"_blank\" rel=\"noopener\">A short list of various malwares that used cookie theft to gain access to users accounts.<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">References<\/h3>\n\n\n\n<p>Bugliesi, M. e. (2015, 01 01). <em>iospress.<\/em> Retrieved from CookiExt: Patching the Browser Against Session Hijacking Attacks\u2019: https:\/\/content.iospress.com\/articles\/journal-of-computer-security\/jcs529<\/p>\n\n\n\n<p>Johnson, A. (2021, 05 06). <em>NORTON.<\/em> Retrieved from Session hijacking: What is a session hijacking and how does it work?: https:\/\/us.norton.com\/blog\/id-theft\/session-hijacking<\/p>\n\n\n\n<p>Justin Warner, I. (2018, 01 16). <em>MITRE.<\/em> Retrieved from Browser Session Hijacking: https:\/\/attack.mitre.org\/techniques\/T1185\/<\/p>\n\n\n\n<p>OWASP. (2023). <em>OWASP.<\/em> Retrieved from Session hijacking attack: https:\/\/owasp.org\/www-community\/attacks\/Session_hijacking_attack<\/p>\n\n\n\n<p>The TechCave. (2021, 12 01). <em>YouTube.<\/em> Retrieved from Session Hijacking Attack | Session ID and Cookie Stealing | SideJacking: https:\/\/www.youtube.com\/watch?v=oI7dX6DWyTo<\/p>\n\n\n\n<p>Wikipedia. (2023, 08 24). <em>Wikipedia<\/em>. Retrieved from Session Hijacking: https:\/\/en.wikipedia.org\/wiki\/Session_hijacking<\/p>\n\n\n\n<p>wunderwuzzi. (2018, 12 16). <em>Embrace The Red.<\/em> Retrieved from Pass the Cookie and Pivot to the Clouds: https:\/\/embracethered.com\/blog\/posts\/passthecookie\/<br><br>OWASP. (2022). <em>OWASP<\/em>. Retrieved from Session fixation: https:\/\/owasp.org\/www-community\/attacks\/Session_fixation<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This article outlines the dangers of insufficiently protected browser session cookies, how they work, how they can be hijacked and what to do to avoid it.<\/p>\n","protected":false},"author":1168,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1,26,651],"tags":[404,199,58,27],"ppma_author":[979],"class_list":["post-25679","post","type-post","status-publish","format-standard","hentry","category-allgemein","category-secure-systems","category-system-designs","tag-browser","tag-hacking","tag-secure-systems","tag-security"],"aioseo_notices":[],"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":902,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2016\/07\/22\/defense-in-depth-a-present-time-example\/","url_meta":{"origin":25679,"position":0},"title":"Defense in Depth: a present time example","author":"Benjamin Binder","date":"22. July 2016","format":false,"excerpt":"In this post, we want to take a look on the concept of defense in depth. Therefore we are going to examine Chrome OS, the niche operation system for web users.","rel":"","context":"In &quot;Secure Systems&quot;","block_context":{"text":"Secure Systems","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/system-designs\/secure-systems\/"},"img":{"alt_text":"Dark castle walls reaching in the sky","src":"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/3\/32\/Caernarfon_Castle_Walls.jpg","width":350,"height":200,"srcset":"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/3\/32\/Caernarfon_Castle_Walls.jpg 1x, https:\/\/upload.wikimedia.org\/wikipedia\/commons\/3\/32\/Caernarfon_Castle_Walls.jpg 1.5x, https:\/\/upload.wikimedia.org\/wikipedia\/commons\/3\/32\/Caernarfon_Castle_Walls.jpg 2x, https:\/\/upload.wikimedia.org\/wikipedia\/commons\/3\/32\/Caernarfon_Castle_Walls.jpg 3x, https:\/\/upload.wikimedia.org\/wikipedia\/commons\/3\/32\/Caernarfon_Castle_Walls.jpg 4x"},"classes":[]},{"id":736,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2016\/07\/05\/how-is-xss-still-a-thing\/","url_meta":{"origin":25679,"position":1},"title":"How is XSS still a thing?","author":"Mario Erazo","date":"5. July 2016","format":false,"excerpt":"Back in 2005, the words \u2018But most of all, samy is my hero\u2019 caused great agitation among MySpace engineers as Samy Kamkar injected a Cross Site Scripting (XSS) worm into the social network. The attack consisted in an infected user, publishing a post in their myspace page showing these words\u2026","rel":"","context":"In &quot;Secure Systems&quot;","block_context":{"text":"Secure Systems","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/system-designs\/secure-systems\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/07\/52_s9fTmrNTxuCmSF-BL5Dl72eJkfbmt4t8yenImKBVvK0kTmF0xjctABnaLJIm9-1.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":1701,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2016\/11\/14\/malvertising-part-2\/","url_meta":{"origin":25679,"position":2},"title":"Malvertising Part 2","author":"Jonathan Peter","date":"14. November 2016","format":false,"excerpt":"Welcome to the second part of my series about malvertising. In this second post, we\u2019ll get to the important stuff: What is malvertising and how often do these attacks happen? As previously mentioned, the word malvertising is composed of advertising and malware. It\u2019s an attack form in which a victim\u2026","rel":"","context":"In &quot;Secure Systems&quot;","block_context":{"text":"Secure Systems","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/system-designs\/secure-systems\/"},"img":{"alt_text":"bildschirmfoto-2016-10-03-um-20-53-58","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/10\/Bildschirmfoto-2016-10-03-um-20.53.58.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/10\/Bildschirmfoto-2016-10-03-um-20.53.58.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/10\/Bildschirmfoto-2016-10-03-um-20.53.58.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/10\/Bildschirmfoto-2016-10-03-um-20.53.58.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":20290,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2021\/08\/02\/zero-trust-security-the-further-development-of-perimeter-security\/","url_meta":{"origin":25679,"position":3},"title":"Zero Trust Security &#8211; The further development of perimeter security?","author":"Max Merz","date":"2. August 2021","format":false,"excerpt":"Most companies use perimeter security to secure their cooperate applications, services and data from attackers and unauthorised users. This approach includes a cooperate network, where clients, that are part of the network are able to access the applications. This includes attackers that got access to these networks.Additionally more applications are\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/Windows_365.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/Windows_365.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/Windows_365.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/Windows_365.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":1575,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2016\/09\/10\/whatsapp-encrypts\/","url_meta":{"origin":25679,"position":4},"title":"WhatsApp encrypts !?","author":"jh176","date":"10. September 2016","format":false,"excerpt":"The majority of the 1 billion monthly whatsapp users may be a little confused about the tiny yellow info-box in their familiar chat. End-to-end encryption? Is this one of these silly annoying whatsapp-viruses or maybe something good? The first big question is \u201cwhy\u201d. Why do we need a (so complicated)\u2026","rel":"","context":"In &quot;Secure Systems&quot;","block_context":{"text":"Secure Systems","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/system-designs\/secure-systems\/"},"img":{"alt_text":"wsap_screenshot","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/09\/WSAP_Screenshot-169x300.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":10939,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2020\/09\/11\/how-are-vulnerabilities-exploited-to-compromise-a-system\/","url_meta":{"origin":25679,"position":5},"title":"How are vulnerabilities exploited to compromise a system?","author":"Joel Beiter","date":"11. September 2020","format":false,"excerpt":"This article is a recap of the \"Live Hack\" presentation, held in the lecture \"Sichere Systeme\" in SS 2020. It will introduce different vulnerabilities like XSS and SQL-Injection and shows how passwords can be cracked under certain circumstances. The last step explains how a SUID binary was exploited to gain\u2026","rel":"","context":"In &quot;Secure Systems&quot;","block_context":{"text":"Secure Systems","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/system-designs\/secure-systems\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"authors":[{"term_id":979,"user_id":1168,"is_guest":0,"slug":"maximilian_von-detten","display_name":"Maximilian von Detten","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/0600cacb23938a6de977b490fda87674c86101d444930a160b1214a37ddd4ece?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/25679","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/users\/1168"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/comments?post=25679"}],"version-history":[{"count":5,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/25679\/revisions"}],"predecessor-version":[{"id":25685,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/25679\/revisions\/25685"}],"wp:attachment":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/media?parent=25679"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/categories?post=25679"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/tags?post=25679"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/ppma_author?post=25679"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}