{"id":210,"date":"2018-07-15T20:46:47","date_gmt":"2018-07-15T19:46:47","guid":{"rendered":"https:\/\/blog.overgen.com\/messi89\/?p=210"},"modified":"2018-07-23T21:52:13","modified_gmt":"2018-07-23T20:52:13","slug":"ida-remote-debugging-android","status":"publish","type":"post","link":"https:\/\/blog.overgen.com\/messi89\/reverse-engineering\/ida-remote-debugging-android\/","title":{"rendered":"IDA &#8211; Remote debugging d&rsquo;un process sous Android\/Arm (Part1)"},"content":{"rendered":"<p>Salut,<\/p>\n<p>Pour mon premier article dans la rubrique r\u00e9tro-<span class=\"st\">ing\u00e9nierie<\/span> (Reverse Engineering) j&rsquo;ai d\u00e9cid\u00e9 de vous parler de l&rsquo;approche la plus simple pour \u00e9tudier le comportement d&rsquo;un binaire inconnu, bien entendu ce tutoriel est pour l&rsquo;apprentissage des techniques utilis\u00e9es et n\u2019incite en cas \u00e0 le faire pour des raisons malveillantes, le retro-ing\u00e9nierie est interdit et peut \u00eatre puni dans certains pays.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/blog.overgen.com\/messi89\/wp-content\/uploads\/2018\/04\/idapro.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-214 aligncenter\" src=\"https:\/\/blog.overgen.com\/messi89\/wp-content\/uploads\/2018\/04\/idapro.png\" alt=\"\" width=\"721\" height=\"200\" srcset=\"https:\/\/blog.overgen.com\/messi89\/wp-content\/uploads\/2018\/04\/idapro.png 721w, https:\/\/blog.overgen.com\/messi89\/wp-content\/uploads\/2018\/04\/idapro-300x83.png 300w\" sizes=\"auto, (max-width: 721px) 100vw, 721px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<p>Les outils que je juge n\u00e9cessaire pour commencer un d\u00e9sassemblage d&rsquo;un binaire :<\/p>\n<ul>\n<li>Un \u00e9diteur Hexa : perso j&rsquo;utilise <a href=\"https:\/\/www.sweetscape.com\/\">Sweetscape 010Editor<\/a>, en version free j&rsquo;aime bien <a href=\"https:\/\/mh-nexus.de\/en\/hxd\/\">HxD Hex Editor.<\/a><\/li>\n<li>Un d\u00e9sassembleur : le plus connu et celui que j&rsquo;utilise c&rsquo;est celui de <a href=\"https:\/\/www.hex-rays.com\/products\/ida\/\">Hex-Rays Ida Pro<\/a> Il existe en version gratuite en version pro avec plus de fonctionnalit\u00e9s.<\/li>\n<li>Une calculatrice de programmeur : celle de Windows suffit largement.<\/li>\n<li>Un cerveau et beaucoup de patience.<\/li>\n<\/ul>\n<p>Une fois tout cela r\u00e9uni&#8230;.<\/p>\n<p>Il faut d&rsquo;abord prendre le host debugger ad\u00e9quat pour l&rsquo;environnement dans lequel notre bin est ex\u00e9cut\u00e9, qui se trouve dans le dossier d&rsquo;installation d&rsquo;IDA puis le dossier <strong>dbgsrv<\/strong><\/p>\n<pre class=\"lang:default decode:true \">D:\\IDA 7.0\\dbgsrv<\/pre>\n<p><a href=\"https:\/\/blog.overgen.com\/messi89\/wp-content\/uploads\/2018\/04\/dbgserver.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-218\" src=\"https:\/\/blog.overgen.com\/messi89\/wp-content\/uploads\/2018\/04\/dbgserver.png\" alt=\"\" width=\"1735\" height=\"802\" srcset=\"https:\/\/blog.overgen.com\/messi89\/wp-content\/uploads\/2018\/04\/dbgserver.png 1735w, https:\/\/blog.overgen.com\/messi89\/wp-content\/uploads\/2018\/04\/dbgserver-300x139.png 300w, https:\/\/blog.overgen.com\/messi89\/wp-content\/uploads\/2018\/04\/dbgserver-768x355.png 768w, https:\/\/blog.overgen.com\/messi89\/wp-content\/uploads\/2018\/04\/dbgserver-1024x473.png 1024w\" sizes=\"auto, (max-width: 1735px) 100vw, 1735px\" \/><\/a><\/p>\n<p>Dans notre cas (Android\/Arm) je vais prendre le fichier <strong>android_server<\/strong><\/p>\n<p>La prochaine \u00e9tape est de se connecter \u00e0 notre device android (via ADB) afin de copier l&rsquo;android_server<\/p>\n<pre class=\"lang:default decode:true\">adb connect IP_DEVICE\r\nadb push android_server \/CUSTOM_DIR<\/pre>\n<p>puis il faut donner les droits d&rsquo;execution \u00e0 notre android_server et l&rsquo;executer<\/p>\n<pre class=\"lang:default decode:true\">chmod 775 \/CUSTOM_DIR\/android_server\r\n\/CUSTOM_DIR\/android_server<\/pre>\n<p>Maintenant que notre host debugger est pr\u00eat nous pouvons attacher n&rsquo;importe quel process \u00e0 IDA afin de faire du Remote Debugging<\/p>\n<p>&nbsp;<\/p>\n<p>Cette premi\u00e8re partie se termine ici, dans la prochaine partie nous allons prendre un cas d&rsquo;utilisation r\u00e9el afin de voir les \u00e9tapes et astuces qui faciliterons votre op\u00e9ration reverse ou analyse<\/p>\n<p>&nbsp;<\/p>\n<p>A bient\u00f4t<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Salut, Pour mon premier article dans la rubrique r\u00e9tro-ing\u00e9nierie (Reverse Engineering) j&rsquo;ai d\u00e9cid\u00e9 de vous parler de l&rsquo;approche la plus simple pour \u00e9tudier le comportement d&rsquo;un binaire inconnu, bien entendu ce tutoriel est pour l&rsquo;apprentissage des techniques utilis\u00e9es et n\u2019incite en cas \u00e0 le faire pour des raisons malveillantes, le retro-ing\u00e9nierie est interdit et peut [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[52],"tags":[56,58,57,55,54,53],"class_list":["post-210","post","type-post","status-publish","format-standard","hentry","category-reverse-engineering","tag-android","tag-debugger","tag-disassembler","tag-idapro","tag-remotedebugging","tag-reverseengineering"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IDA - Remote debugging d&#039;un process sous Android\/Arm (Part1) ~ Messi89&#039;s blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.overgen.com\/messi89\/reverse-engineering\/ida-remote-debugging-android\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IDA - Remote debugging d&#039;un process sous Android\/Arm (Part1) ~ Messi89&#039;s blog\" \/>\n<meta property=\"og:description\" content=\"Salut, Pour mon premier article dans la rubrique r\u00e9tro-ing\u00e9nierie (Reverse Engineering) j&rsquo;ai d\u00e9cid\u00e9 de vous parler de l&rsquo;approche la plus simple pour \u00e9tudier le comportement d&rsquo;un binaire inconnu, bien entendu ce tutoriel est pour l&rsquo;apprentissage des techniques utilis\u00e9es et n\u2019incite en cas \u00e0 le faire pour des raisons malveillantes, le retro-ing\u00e9nierie est interdit et peut [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.overgen.com\/messi89\/reverse-engineering\/ida-remote-debugging-android\/\" \/>\n<meta property=\"og:site_name\" content=\"Messi89&#039;s blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-07-15T19:46:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-07-23T20:52:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.overgen.com\/messi89\/wp-content\/uploads\/2018\/04\/idapro.png\" \/>\n<meta name=\"author\" content=\"messi89\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@messi89minou\" \/>\n<meta name=\"twitter:site\" content=\"@messi89minou\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"messi89\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.overgen.com\/messi89\/reverse-engineering\/ida-remote-debugging-android\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.overgen.com\/messi89\/reverse-engineering\/ida-remote-debugging-android\/\"},\"author\":{\"name\":\"messi89\",\"@id\":\"https:\/\/blog.overgen.com\/messi89\/#\/schema\/person\/d212f5045c7feebd97fb10f743e1a892\"},\"headline\":\"IDA &#8211; Remote debugging d&rsquo;un process sous Android\/Arm (Part1)\",\"datePublished\":\"2018-07-15T19:46:47+00:00\",\"dateModified\":\"2018-07-23T20:52:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.overgen.com\/messi89\/reverse-engineering\/ida-remote-debugging-android\/\"},\"wordCount\":307,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blog.overgen.com\/messi89\/#\/schema\/person\/d212f5045c7feebd97fb10f743e1a892\"},\"image\":{\"@id\":\"https:\/\/blog.overgen.com\/messi89\/reverse-engineering\/ida-remote-debugging-android\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.overgen.com\/messi89\/wp-content\/uploads\/2018\/04\/idapro.png\",\"keywords\":[\"android\",\"debugger\",\"disassembler\",\"idapro\",\"remotedebugging\",\"reverseengineering\"],\"articleSection\":[\"Reverse Engineering\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.overgen.com\/messi89\/reverse-engineering\/ida-remote-debugging-android\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.overgen.com\/messi89\/reverse-engineering\/ida-remote-debugging-android\/\",\"url\":\"https:\/\/blog.overgen.com\/messi89\/reverse-engineering\/ida-remote-debugging-android\/\",\"name\":\"IDA - Remote debugging d'un process sous Android\/Arm (Part1) ~ Messi89&#039;s blog\",\"isPartOf\":{\"@id\":\"https:\/\/blog.overgen.com\/messi89\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.overgen.com\/messi89\/reverse-engineering\/ida-remote-debugging-android\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.overgen.com\/messi89\/reverse-engineering\/ida-remote-debugging-android\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.overgen.com\/messi89\/wp-content\/uploads\/2018\/04\/idapro.png\",\"datePublished\":\"2018-07-15T19:46:47+00:00\",\"dateModified\":\"2018-07-23T20:52:13+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.overgen.com\/messi89\/reverse-engineering\/ida-remote-debugging-android\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.overgen.com\/messi89\/reverse-engineering\/ida-remote-debugging-android\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/blog.overgen.com\/messi89\/reverse-engineering\/ida-remote-debugging-android\/#primaryimage\",\"url\":\"https:\/\/blog.overgen.com\/messi89\/wp-content\/uploads\/2018\/04\/idapro.png\",\"contentUrl\":\"https:\/\/blog.overgen.com\/messi89\/wp-content\/uploads\/2018\/04\/idapro.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.overgen.com\/messi89\/reverse-engineering\/ida-remote-debugging-android\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/blog.overgen.com\/messi89\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IDA &#8211; Remote debugging d&rsquo;un process sous Android\/Arm (Part1)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.overgen.com\/messi89\/#website\",\"url\":\"https:\/\/blog.overgen.com\/messi89\/\",\"name\":\"Messi89&#039;s blog\",\"description\":\"De l&#039;action dans le code {  }\",\"publisher\":{\"@id\":\"https:\/\/blog.overgen.com\/messi89\/#\/schema\/person\/d212f5045c7feebd97fb10f743e1a892\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.overgen.com\/messi89\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/blog.overgen.com\/messi89\/#\/schema\/person\/d212f5045c7feebd97fb10f743e1a892\",\"name\":\"messi89\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/476325cad08026ef2f47662b9590b416221ae3fb36553e097f15eb7f5be9f979?s=96&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/476325cad08026ef2f47662b9590b416221ae3fb36553e097f15eb7f5be9f979?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/476325cad08026ef2f47662b9590b416221ae3fb36553e097f15eb7f5be9f979?s=96&r=g\",\"caption\":\"messi89\"},\"logo\":{\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/476325cad08026ef2f47662b9590b416221ae3fb36553e097f15eb7f5be9f979?s=96&r=g\"},\"sameAs\":[\"http:\/\/blog.overgen.com\/messi89\",\"https:\/\/x.com\/@messi89minou\"],\"url\":\"https:\/\/blog.overgen.com\/messi89\/author\/messi89\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IDA - Remote debugging d'un process sous Android\/Arm (Part1) ~ Messi89&#039;s blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.overgen.com\/messi89\/reverse-engineering\/ida-remote-debugging-android\/","og_locale":"fr_FR","og_type":"article","og_title":"IDA - Remote debugging d'un process sous Android\/Arm (Part1) ~ Messi89&#039;s blog","og_description":"Salut, Pour mon premier article dans la rubrique r\u00e9tro-ing\u00e9nierie (Reverse Engineering) j&rsquo;ai d\u00e9cid\u00e9 de vous parler de l&rsquo;approche la plus simple pour \u00e9tudier le comportement d&rsquo;un binaire inconnu, bien entendu ce tutoriel est pour l&rsquo;apprentissage des techniques utilis\u00e9es et n\u2019incite en cas \u00e0 le faire pour des raisons malveillantes, le retro-ing\u00e9nierie est interdit et peut [&hellip;]","og_url":"https:\/\/blog.overgen.com\/messi89\/reverse-engineering\/ida-remote-debugging-android\/","og_site_name":"Messi89&#039;s blog","article_published_time":"2018-07-15T19:46:47+00:00","article_modified_time":"2018-07-23T20:52:13+00:00","og_image":[{"url":"https:\/\/blog.overgen.com\/messi89\/wp-content\/uploads\/2018\/04\/idapro.png","type":"","width":"","height":""}],"author":"messi89","twitter_card":"summary_large_image","twitter_creator":"@messi89minou","twitter_site":"@messi89minou","twitter_misc":{"\u00c9crit par":"messi89","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.overgen.com\/messi89\/reverse-engineering\/ida-remote-debugging-android\/#article","isPartOf":{"@id":"https:\/\/blog.overgen.com\/messi89\/reverse-engineering\/ida-remote-debugging-android\/"},"author":{"name":"messi89","@id":"https:\/\/blog.overgen.com\/messi89\/#\/schema\/person\/d212f5045c7feebd97fb10f743e1a892"},"headline":"IDA &#8211; Remote debugging d&rsquo;un process sous Android\/Arm (Part1)","datePublished":"2018-07-15T19:46:47+00:00","dateModified":"2018-07-23T20:52:13+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.overgen.com\/messi89\/reverse-engineering\/ida-remote-debugging-android\/"},"wordCount":307,"commentCount":0,"publisher":{"@id":"https:\/\/blog.overgen.com\/messi89\/#\/schema\/person\/d212f5045c7feebd97fb10f743e1a892"},"image":{"@id":"https:\/\/blog.overgen.com\/messi89\/reverse-engineering\/ida-remote-debugging-android\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.overgen.com\/messi89\/wp-content\/uploads\/2018\/04\/idapro.png","keywords":["android","debugger","disassembler","idapro","remotedebugging","reverseengineering"],"articleSection":["Reverse Engineering"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.overgen.com\/messi89\/reverse-engineering\/ida-remote-debugging-android\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.overgen.com\/messi89\/reverse-engineering\/ida-remote-debugging-android\/","url":"https:\/\/blog.overgen.com\/messi89\/reverse-engineering\/ida-remote-debugging-android\/","name":"IDA - Remote debugging d'un process sous Android\/Arm (Part1) ~ Messi89&#039;s blog","isPartOf":{"@id":"https:\/\/blog.overgen.com\/messi89\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.overgen.com\/messi89\/reverse-engineering\/ida-remote-debugging-android\/#primaryimage"},"image":{"@id":"https:\/\/blog.overgen.com\/messi89\/reverse-engineering\/ida-remote-debugging-android\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.overgen.com\/messi89\/wp-content\/uploads\/2018\/04\/idapro.png","datePublished":"2018-07-15T19:46:47+00:00","dateModified":"2018-07-23T20:52:13+00:00","breadcrumb":{"@id":"https:\/\/blog.overgen.com\/messi89\/reverse-engineering\/ida-remote-debugging-android\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.overgen.com\/messi89\/reverse-engineering\/ida-remote-debugging-android\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/blog.overgen.com\/messi89\/reverse-engineering\/ida-remote-debugging-android\/#primaryimage","url":"https:\/\/blog.overgen.com\/messi89\/wp-content\/uploads\/2018\/04\/idapro.png","contentUrl":"https:\/\/blog.overgen.com\/messi89\/wp-content\/uploads\/2018\/04\/idapro.png"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.overgen.com\/messi89\/reverse-engineering\/ida-remote-debugging-android\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/blog.overgen.com\/messi89\/"},{"@type":"ListItem","position":2,"name":"IDA &#8211; Remote debugging d&rsquo;un process sous Android\/Arm (Part1)"}]},{"@type":"WebSite","@id":"https:\/\/blog.overgen.com\/messi89\/#website","url":"https:\/\/blog.overgen.com\/messi89\/","name":"Messi89&#039;s blog","description":"De l&#039;action dans le code {  }","publisher":{"@id":"https:\/\/blog.overgen.com\/messi89\/#\/schema\/person\/d212f5045c7feebd97fb10f743e1a892"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.overgen.com\/messi89\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":["Person","Organization"],"@id":"https:\/\/blog.overgen.com\/messi89\/#\/schema\/person\/d212f5045c7feebd97fb10f743e1a892","name":"messi89","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/476325cad08026ef2f47662b9590b416221ae3fb36553e097f15eb7f5be9f979?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/476325cad08026ef2f47662b9590b416221ae3fb36553e097f15eb7f5be9f979?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/476325cad08026ef2f47662b9590b416221ae3fb36553e097f15eb7f5be9f979?s=96&r=g","caption":"messi89"},"logo":{"@id":"https:\/\/secure.gravatar.com\/avatar\/476325cad08026ef2f47662b9590b416221ae3fb36553e097f15eb7f5be9f979?s=96&r=g"},"sameAs":["http:\/\/blog.overgen.com\/messi89","https:\/\/x.com\/@messi89minou"],"url":"https:\/\/blog.overgen.com\/messi89\/author\/messi89\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.overgen.com\/messi89\/wp-json\/wp\/v2\/posts\/210","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.overgen.com\/messi89\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.overgen.com\/messi89\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.overgen.com\/messi89\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.overgen.com\/messi89\/wp-json\/wp\/v2\/comments?post=210"}],"version-history":[{"count":8,"href":"https:\/\/blog.overgen.com\/messi89\/wp-json\/wp\/v2\/posts\/210\/revisions"}],"predecessor-version":[{"id":234,"href":"https:\/\/blog.overgen.com\/messi89\/wp-json\/wp\/v2\/posts\/210\/revisions\/234"}],"wp:attachment":[{"href":"https:\/\/blog.overgen.com\/messi89\/wp-json\/wp\/v2\/media?parent=210"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.overgen.com\/messi89\/wp-json\/wp\/v2\/categories?post=210"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.overgen.com\/messi89\/wp-json\/wp\/v2\/tags?post=210"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}