{"id":532,"date":"2020-01-17T17:04:19","date_gmt":"2020-01-17T17:04:19","guid":{"rendered":"http:\/\/dcapps.tech\/freeudemy\/?p=532"},"modified":"2020-01-17T17:04:22","modified_gmt":"2020-01-17T17:04:22","slug":"100-off-ethical-hacking-from-top-university-professor","status":"publish","type":"post","link":"https:\/\/dc-apps.net\/freeudemy\/100-off-ethical-hacking-from-top-university-professor\/","title":{"rendered":"[100% Off] Ethical Hacking from Top University Professor"},"content":{"rendered":"<div id=\"dcapp-3256779515\" class=\"dcapp-before-content_2 dcapp-entity-placement\"><a href=\"https:\/\/t.me\/freeudmeyc\" aria-label=\"Join our Telegram Channel\"><img loading=\"lazy\" src=\"https:\/\/dc-apps.net\/freeudemy\/wp-content\/uploads\/2020\/03\/join-our-telegram-channel.png\" alt=\"Join our Telegram Channel\"  srcset=\"https:\/\/dc-apps.net\/freeudemy\/wp-content\/uploads\/2020\/03\/join-our-telegram-channel.png 700w, https:\/\/dc-apps.net\/freeudemy\/wp-content\/uploads\/2020\/03\/join-our-telegram-channel-300x71.png 300w\" sizes=\"(max-width: 700px) 100vw, 700px\" width=\"700\" height=\"165\"  style=\"display: inline-block;\" \/><\/a><\/div><div id=\"dcapp-2746099489\" class=\"dcapp-before-content dcapp-entity-placement\" style=\"margin-bottom: 5px;\"><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-7454916351629321\" crossorigin=\"anonymous\"><\/script><ins class=\"adsbygoogle\" style=\"display:block;\" data-ad-client=\"ca-pub-7454916351629321\" \ndata-ad-slot=\"9119542394\" \ndata-ad-format=\"auto\"><\/ins>\n<script> \n(adsbygoogle = window.adsbygoogle || []).push({}); \n<\/script>\n<\/div>\n<p><strong>23 Hours of HD VIdeo <\/strong><\/p>\n\n\n\n<!--more-->\n\n\n\n<p>\n\n \n\n\nRequirements\n\n\n<\/p>\n\n\n\n<ul><li>Beginners are Welcome<\/li><\/ul>\n\n\n\n<p>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nDescription\n\n\n<\/p>\n\n\n\n<p>I would like to <strong>welcome you<\/strong> to this course on \nEthical Hacking. This is the first lecture of this course. Now, in this \nlecture, I will try to give you a very overall idea about what ethical \nhacking exactly is, what are the scopes of an ethical hacker and towards\n the end, I shall give you some idea about the coverage of this course \u2014\n what are the things we are expected to cover ok. So, the title of this \nlecture is Introduction to Ethical Hacking. <\/p>\n\n\n\n<p>Now, in this \nlecture as I told you, firstly we shall try to tell you what is ethical \nhacking? There is a related terminological penetration testing, we will \nalso be discussing about that. And some of the roles of an ethical \nhacker, what an ethical hacker is expected to do and what he or she is \nnot expected to do that we shall try to distinguish and discuss.&nbsp; <\/p><div id=\"dcapp-2486964794\" class=\"dcapp-content dcapp-entity-placement\" style=\"margin-top: 5px;margin-bottom: 5px;\"><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-7454916351629321\" crossorigin=\"anonymous\"><\/script><ins class=\"adsbygoogle\" style=\"display:block;\" data-ad-client=\"ca-pub-7454916351629321\" \ndata-ad-slot=\"3439662696\" \ndata-ad-format=\"auto\"><\/ins>\n<script> \n(adsbygoogle = window.adsbygoogle || []).push({}); \n<\/script>\n<\/div>\n\n\n\n<p>So,\n let us first start with the definition of ethical hacking. What exactly\n is ethical hacking? Well, we all have heard the term hacking and hacker\n essentially the term has been associated with something which is bad \nand malicious. Well, when we hear about somebody as a hacker, we are a \nlittle afraid and cautious ok. I mean as if the person is always trying \nto do some harm to somebody else to some other networks, try to steal \nsomething, trying to steal something from some IT infrastructure and so \non and so forth. <\/p>\n\n\n\n<p>But ethical hacking is something different. \nWell, ethical hacking as per the definition if you just look at it, it \nessentially refers to locating the weaknesses and vulnerabilities. It \nmeans suppose you have a network, you have an organizational network, \nyou have an IT, IT infrastructure, you have computers which contains \nsome software, some data, lot of things are there. Now, you try a, I \nmean here you are trying to find out, whether your infrastructural \nnetwork does have some weak points or vulnerabilities through which an \nactual hacker can break into your system, into your network. <\/p>\n\n\n\n<p>So, \nthis ethical hacking is the act of locating weaknesses and \nvulnerabilities in computers and information system in general, it \ncovers everything, it covers networks, it cover databases, everything. \nBut how this is done, this is done by mimicking the behaviour of a real \nhacker as if you are a hacker, you are trying to break into your own \nnetwork, there you will get lot of information about what are the weak \npoints in your own network. So, <\/p>\n\n\n\n<p>this \nterm is important, by replicating the intent and actions of malicious \nhackers, whatever malicious hackers do in reality, you try to mimic \nthat, you try to replicate that ok. <\/p>\n\n\n\n<p>Your objective is to try and \nfind out the vulnerabilities and weak points in your network. Well, you \nhave a good intent, you try to identify the weaknesses and later on \nmaybe the organization will be trying to plug out or stop those \nweaknesses, so that such attacks cannot occur or happen in the future \nok. This ethical hacking is sometimes also referred to by some other \nnames, penetration testing is a well-known terminology which is used \u2014 a\n phrase, intrusion testing, red teaming, these are also terminologies \nwhich are used to mean the same thing. <\/p>\n\n\n\n<p>Well, you can understand \npenetration testing, the literal meaning of this phrase is, you are \ntrying to penetrate into a system; you are trying to penetrate into a \nnetwork, you are testing and find out whether or not you are able to \npenetrate. And if you are able to penetrate which are the points through\n which it is easier to penetrate, these are the objectives ok, all \nright.&nbsp; <\/p>\n\n\n\n<p>So, talking about ethical hacking, there are some \nterminology, let us see. Well ethical hackers are the persons who are \nactually carrying out ethical hacking. Now, they are not some unknown \nentities, they are some organization or persons who are actually hired \nby the company. The company is paying them some money to do a \npenetration testing on their own network and provide them with a list of\n vulnerabilities, so that they can take <\/p>\n\n\n\n<p>some\n action later on ok. So, these ethical hackers are employed by companies\n who typically carry out penetration testing or ethical hacking. \nPenetration testing, as I had said is an attempt to break into a network\n or a system or an infrastructure. <\/p>\n\n\n\n<p>But the difference from \nmalicious attempt is that this is a legal attempt. The company has \npermitted you to run the penetration testing on their own network for \nthe purpose of finding the vulnerabilities. So, this is a legal attempt,\n you are trying to break in and you are trying to find out the weak \nlinks. Well, in penetration testing per se what the tester will do, \ntester will basically generate a report. The report will contain a \ndetailed report; it will contain all the known vulnerabilities that have\n been detected in the network as a result of running the penetration \ntesting process ok. <\/p>\n\n\n\n<p>But normally they do not provide solutions. \nWell, you can also seek solutions for them, but everything comes with an\n extra or additional charge right. So, in contrast, security test is \nanother terminology which is used, which includes penetration test plus \nthis kind of suggestions to plug out the loopholes. So, this includes in\n addition analyzing the company security policies and offering \nsolutions, because ultimately the company will try to secure or protect \ntheir network. Of course, there are issues, there may be some limited \nbudget. So, within that budget whatever best is possible that have to be\n taken care of or incorporated. So, these are some decisions the company\n administration will have to take fine.&nbsp; &nbsp;<\/p>\n\n\n\n<p>So, \nsome of the terminologies that we normally use hacking, hacking broadly \nspeaking, we use this term to refer to a process which involves some \nexpertise. We expect the hackers to be expert in what they are doing. At\n times we also assume that hackers are more intelligent in the persons, \nthan the persons who are trying to protect the network. This assumption \nis always safe to make that will make your network security better ok. <\/p>\n\n\n\n<p>Cracking\n means breaching the security of a some kind of system, it can be \nsoftware, it can be hardware, computers, networks whatever, this is \ncalled cracking, you are trying to crack a system. Spoofing is a kind of\n attack, where the person who is, who is attacking is trying to falsify \nhis or her identity. Suppose, I am trying to enter the system, but I am \nnot telling who I am, I am telling I am Mr. X, Mr. X is somebody else \nright. So, it is the process of faking the originating address in a \npacket, a packet that flows in a network is sometimes called a datagram \nok. So, the address will not be my address, I will be changing the \naddress to somebody else\u2019s address, so that the person who will be \ndetecting that will believe that someone else is trying to do whatever \nis being done ok. <\/p>\n\n\n\n<p>Denial of service is another very important \nkind of an attack which often plagues or affects systems or \ninfrastructures. Well, here the idea is that one or a collection of \ncomputers or routers or whatever you can say, a collection of nodes in \nthe network, they can flood a particular computer or host with enormous \namount of network traffic. The idea is very simple, suppose I want to \nbring a particular server down, I will try to flood it with millions and\n millions of packets, junk packets, so that the server will spend all of\n its time filtering out those junk packets. So, whenever some legitimate\n requests are coming, valid packets are coming, they will find that the \nservice time is exceedingly slow, exceedingly long, this is something \nwhich is called denial of service. <\/p>\n\n\n\n<p>And port scanning is a \nterminology which you use very frequently, well ports in a computer \nsystem this we shall be discussing later. Ports indicate some entry \npoints in the system which connects the incoming connections to some \nprograms or processes running in the system. Say means in a computer \nsystem there can be multiple programs that are running, and these \nprograms can be associated with something called a port number ok. \nWhenever you are trying to attack a system, normally the first step is \nto scan through some dummy packets ping, these are called ping packets \nand try to find out which of the port numbers in the system are active. <\/p>\n\n\n\n<p>Suppose,\n you find out that there are four ports which are active then normally \nthere is a well documented hacking guideline which tells you that for \nthese four ports what are the known vulnerabilities and what are the \nbest ways to attack or get entering those into the system through these \nports. So, this port scanning is the process of identifying which are \nthe active ports which are there and then searching for the \ncorresponding vulnerabilities, so that you can exploit them ok. These \nare called exploits, once you identify the ports you try to find out an \nexploit through which you can get entry into the system, this is roughly\n the idea.&nbsp; <\/p>\n\n\n\n<p>Now, talking about gaining access into the\n system, there are different ways in which you can gain access to a \nsystem. One is you are entering the system through the front door. So, \nthe name is also given front door access. Normally, a system, normally I\n am talking about whenever you try to access the system you try to log \nin, you are validated with respect to some password or something similar\n to that.&nbsp; <\/p>\n\n\n\n<p>So, passwords are the most common ways of gaining \nentry or access to a system in the present day scenario ok. So, the \nfirst attempt through that front door channel will be to guess valid \npassword or try and steal some password. There are many methods that are\n used for this purpose. During this course you will be seeing some of \nthe tools through which you can try and do this ok. This is the front \ndoor. <\/p>\n\n\n\n<p>The second thing is a back door \nwhich normally a person coming is not able to see, but it is there. \nThose of you who know there is a back door, they can only enter through \nthat back door. This is the basic idea. So, back doors are some you can \nsay entry points to a system which had deliberately kept by the \ndevelopers. Well, I am giving an example suppose I buy a router, a \nnetwork router from some company, they give me some root password and \naccess rights, I change the root password. So, I am quite happy that \nmeans, I have sole access to it, I have changed the password, I am safe.\n <\/p>\n\n\n\n<p>But sometimes it may happen if something goes down, the company \nmight automatically modify or configure, reconfigure the router through \nthat back door. They will not even ask you at times. They will \nautomatically enter the router through that backdoor entry, there will \nbe some special password through which they can possibly enter and they \ncan make some changes inside. Such back doors are known to exist in many\n systems, not only hardware systems also many of these software systems,\n software packages ok. Well, usually developers keep it as debugging or \ndiagnostic tools, but sometimes these are also used for malicious \npurposes ok. <\/p>\n\n\n\n<p>Then comes the Trojan horses. Now, if you remember \nthe story of the Trojan horse where it is something which was hidden \ninside a horse, some warriors were hidden inside a horse. Suddenly some \ntime one night, they just comes out and start creating havoc. Trojan \nhorse is also in terms of a computer system something very similar. Here\n let us think of a software first. So, it is a software code that is \nhidden inside a larger software. Well, as a user you are not even aware \nthat such a Trojan is there inside the software ok. <\/p>\n\n\n\n<p>Now, what \nhappens sometimes that Trojan software can start running and can do lot \nof malicious things in your system. For example, they can install some \nback doors through which other persons or other packets can gain entry \ninto your system. Nowadays, you will also learn as part of the course \nlater, Trojans can also exists in hardware. Whenever you built a chip, \nyou fabricate a chip, without your knowledge, some additional circuitry \ncan get fabricated which can allow unauthorized access or use of your \nchip, of your system during its actual runtime ok. <\/p>\n\n\n\n<p>And lastly \ncome software vulnerabilities exploitation. Well, when a software is \ndeveloped by a company, that software is sold, with time some \nvulnerabilities might get detected. Normally, those vulnerabilities are \npublished in the website of that company that well, <\/p>\n\n\n\n<p>these\n are the vulnerabilities please install this patch to stop or overcome \nthat vulnerability. But everyone do not see that message and do not \ninstall the patch. But as a hacker if you go there and see that well \nthese are the vulnerabilities in that software, you try to find out \nwhere all that software is installed and you try to break into those in \nusing those vulnerable points ok. <\/p>\n\n\n\n<p>And this kind of software \nvulnerabilities are typically used, you can say as a playground for the \nfirst time hackers. Sometimes they are called script kiddies. The \nhackers who are just learning how to hack and that is the best place \nmeans already in some website it is mentioned that these are the \nvulnerabilities, they just try to hack and see that whether they are \nable to do it or not all right. <\/p>\n\n\n\n<p>Now, once a hacker gains \naccess inside a system, there can be a number of things that can be \ndone. For example, every system usually has a log which monitors that \nwho is logging into the system at what time, what commands they are \nrunning and so on and so forth. So, if the hacker gets into the system, \nthe first thing he or she will possibly try to do is modify the log, so \nthat their tracks are erased. <\/p>\n\n\n\n<p> So, if the system administrator \nlooks at the log later on, they will not understand that well an hacking\n actually happened or not. So, some entries in the log file can get \ndeleted; can be deleted, some files may be stolen, sometimes after \nstealing the files, files can be destroyed also ok, some files might get\n modified, like you have heard of defacement of <\/p>\n\n\n\n<p>websites,\n some hackers break into a website and change the contents of the page \nto something malicious, so that people know that well we came here, we \nhacked your system, just to cause mischief well. <\/p>\n\n\n\n<p>Installing \nbackdoors is more dangerous. So, you will not understand what has \nhappened, but someone has opened a back door through which anyone can \nenter into a system whenever they want ok. And from your system, some \nother systems can be attacked. Suppose in a network, there are 100 \ncomputers, someone gains entry into one of the systems, one of the \ncomputers; from there the other 99 computers can be attacked if they \nwant to, right, ok. <\/p>\n\n\n\n<p>Now, talking about the roles of the \ntesters, who are carrying out the security testing and penetration \ntesting. Well, I talked about script kiddies, the beginners who have \njust learned how to break into systems. They are typically young or \ninexperienced hackers. So, usually what they do, they look at some \nexisting websites, lot of such hacking documentations are there, from \nthere they typically copy codes, run them on the system and see that \nwhether actually the attacks are happening as it has been published or \ndiscussed in those websites, right. <\/p>\n\n\n\n<p>But experienced penetration \ntesters they do not copy codes from such other places, they usually \ndevelop scripts, they use a set of tools and they run a set of scripts \nusing which they run those tools in some specific ways to carry out \nspecific things. And these tools or <\/p>\n\n\n\n<p>these\n scripts are typically written in different scripting language like \nPerl, Python, JavaScript, they can be written also in language like C, \nC++ and so on. <\/p>\n\n\n\n<p>(Refer Slide Time: 21:30) <\/p>\n\n\n\n<p>Now, \nbroadly the penetration testing methodologies if you think about, first \nthing is that the person who is doing penetration testing, he or she \nmust have all the set of tools at his or her disposal. This is sometimes\n called a tiger box. Tiger box basically is a collection of operating \nsystems and hacking tools which typically is installed in a portable \nsystem like a laptop, from there wherever the person wants to carry out \npenetration testing, he or she can run the correct tool from there and \ntry to mount a virtual attack on that system, and see whether there are \nany vulnerabilities or not. <\/p>\n\n\n\n<p>So, this kind of tools helps \npenetration testers and security tester to conduct vulnerability \nassessment and attacks. This tiger box contains a set of all useful \ntools that are required for that ok. Now, for doing this penetration \ntesting, from the point of view of the tester, the best thing is white \nbox model. Where the company on whose behalf you are doing the testing \ntells the tester everything about the network and the network \ninfrastructure, they provide you with a circuit diagram with all the \ndetails ok, means about the network topology, what kind of new \ntechnologies are used in the network everything.&nbsp; <\/p>\n\n\n\n<p>And also the \ntester if they require, whenever they require, they are authorized to \ninterview the IT personnel. Many times it is required in a company, if \nyou interview people, you will get to know a lot of things that how the \ninformation processing is carried out inside the <\/p>\n\n\n\n<p>company,\n what are the possible vulnerabilities that they feel there are ok. So, \nthis white box model makes the testers job a lot easier, because all the\n information about the network whatever is available is made available \nor given to the tester ok. <\/p>\n\n\n\n<p>Now, the exact reverse\n is the black box model. Black box model says that tester is not given \ndetails about the network. So, it is not that the person who is asking \nthe tester to test, is deliberately not giving, maybe the person is not \ncompetent enough and does not know the relevant information to be shared\n with the tester. So, tester will have to dig into the environment and \nfind out whatever relevant information is required. <\/p>\n\n\n\n<p>So, the \nburden is on the tester to find out all the details that may be \nrequired. In practice usually we have something in between, we do not \nhave white box, we do not also have black box, we have something called \nthe gray box model. What is grey box model? It is some kind of a hybrid \nof the white box and black box model. The company will provide the \ntester with partial information about the network and the other things. <\/p>\n\n\n\n<p>\n Well, why partial? Because the company may be knowing the details of \nsome of the subsystems, but for some other subsystem the details may not\n be available to them also. So, they cannot provide any detail for that \nok. They have just bought it and installed it something like that. So, \nthese are broadly the approaches.&nbsp; <\/p>\n\n\n\n<p>Now,\n there are some legal issues also. Well, it varies from country to \ncountry. Well, in our country it is not that rigid, there are some other\n countries where it is extremely rigid, that means you are not possibly \nallowed to install some kind of software on your computers. So, these \nlaws that involve technologies, particularly IT, they are changing and \ndeveloping very fast with time. It is very difficult to keep track of \nthese changes, what is the latest law of the land ok.&nbsp; <\/p>\n\n\n\n<p>Now, it is\n always good to know the exact set of rules that pertain in the place of\n your work, where you are working, what are the laws, what are the \nrules, so that you should be know what is allowed and what is not \nallowed, maybe you are using something or doing something in good faith,\n but possibly it is illegal in that state or that country ok, may be, \nyou may be in trouble later on, all right.&nbsp; <\/p>\n\n\n\n<p> \nSo, the laws of the land are very important to know. Some of the tools \nyou are using on your computer may be illegal in that country. So, you \nmust be know about these things. The cyber crimes, punishment on cyber \ncrime, these are becoming more and more crucial and severe with every \npassing day. So, these are a few things people should be extremely \ncautious about. <\/p>\n\n\n\n<p>But certain things are quite obvious that\n you should not do certain things legally that everyone understands that\n accessing a computer without permission is clear. So, it is my <\/p>\n\n\n\n<p>computer,\n why you are you accessing without my permission that is something \nillegal. Installing worms or viruses that is also supposed to be \nillegal, I have not installed worms and viruses, so I have also not \nasked you to install. So, why have you installed or injected these kind \nof worms or viruses in my computer ok. Denial of service attacks, well \nhackers do mount this kind of attacks, but these are illegal, some \nservices or servers are installed to provide some service to customers. <\/p>\n\n\n\n<p>So,\n if someone tries to deny those services that is something which is not \npermissible right. Then something similar to that denying users access \nto some networking resources, because you should be aware whatever you \nare doing maybe as part of ethical hacking, maybe as part of the work \nwhich company has asked you to do. Maybe you are doing something inside \nyour, the network of the company, but you should be careful, you should \nnot prevent the customers of that company from doing their job, this is \nvery important ok. So, your action should not be disruptive in terms of \ntheir business.&nbsp; <\/p>\n\n\n\n<p>So, in a nutshell to \nsummarize, this ethical hacking well if you are a security tester, so \nwhat are the things you need to know or you need to do? Well, the first \nthing clearly is, you should have a sound knowledge of networking and \ncomputer technology. So, you see as part of this course, we will devote a\n significant amount of time discussing or brushing up the relevant \nbackgrounds of networking technology, because these are very important \nin actually understanding what you are doing, how are you doing and why \nare you doing. <\/p>\n\n\n\n<p>And also you cannot do \neverything yourself on your own, you need to communicate with other \npeople that art is also something to be mastered. You need to interact \nwith other people. This quality is also very important. <\/p>\n\n\n\n<p>And of \ncourse, I have mentioned the laws of the land are very important to \nunderstand and you should have the necessary tools at your disposal. \nSome of the tools may be freely available; some of the tools may have to\n be purchased, some you may develop on your own. So, you should have the\n entire set of tools at your disposal before you can qualify yourself to\n be a good network, you can say ethical hacker, penetration tester or a \nsecurity tester ok, fine. <\/p>\n\n\n\n<p>Now, about this course very \nbriefly speaking, very broadly speaking, we shall be covering relevant \nnetwork technologies as I had said, understanding some basic networking \nconcepts are very important to understand how these tools work. If you \ndo not understand the networking concepts, we will not be able to use \nthe tools at all ok.&nbsp; <\/p>\n\n\n\n<p>Basic cryptographic concepts are required, \nbecause whenever you are trying to stop some of the weak points or \nvulnerabilities, often you will have to use some kind of cryptographic \ntechniques or cryptographic solutions. So, you need to understand what \nare the things that are possible and what are not possible in terms of \ncryptography techniques ok. <\/p>\n\n\n\n<p>Well, we shall \nlook at some of the case studies of secure applications to understand \nhow these cryptographic primitives are put into practice to develop \nsecure applications. Then we shall be looking at unconventional attacks,\n some of the attacks which are hardware based attacks, which are very \ninteresting and very recent and they are very unconventional. We shall \nbe discussing about such kind of attacks. And a significant part of this\n course, we will concentrate on demonstrating various tools, how we can \nactually mount this kind of penetration testing and other kind of \nattacks on your system, on your network and so on and so forth ok. <\/p>\n\n\n\n<p>So,  with this I come to the end of this first lecture. And I would expect  that the lectures that are yet to come would be very useful for you in  understanding the broad subject of ethical hacking and motivate you in  the subject to possibly become an ethical hacker in the future. <\/p>\n\n\n\n<p>Who this course is for: <\/p>\n\n\n\n<ul><li>Who wants to start a new Career or just want to know more About Ethica Hacking<\/li><\/ul>\n\n\n\n<div class=\"wp-block-button aligncenter\"><a class=\"wp-block-button__link has-background\" href=\"https:\/\/www.udemy.com\/course\/ethical-hacking-from-top-university-professor\/?couponCode=79C229A0AF09567850CD\" style=\"background-color:#900000;border-radius:29px\" target=\"_blank\" rel=\"noreferrer noopener\">Get the course<\/a><\/div>\n<div id=\"dcapp-677741056\" class=\"dcapp-after-content dcapp-entity-placement\" style=\"margin-top: 5px;margin-bottom: 5px;\"><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-7454916351629321\" crossorigin=\"anonymous\"><\/script><ins class=\"adsbygoogle\" style=\"display:block;\" data-ad-client=\"ca-pub-7454916351629321\" \ndata-ad-slot=\"1642816558\" \ndata-ad-format=\"auto\"><\/ins>\n<script> \n(adsbygoogle = window.adsbygoogle || []).push({}); \n<\/script>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>23 Hours of HD VIdeo<\/p>\n","protected":false},"author":1,"featured_media":533,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"categories":[1],"tags":[362,104,363,37,365,364],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/dc-apps.net\/freeudemy\/wp-json\/wp\/v2\/posts\/532"}],"collection":[{"href":"https:\/\/dc-apps.net\/freeudemy\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dc-apps.net\/freeudemy\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dc-apps.net\/freeudemy\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dc-apps.net\/freeudemy\/wp-json\/wp\/v2\/comments?post=532"}],"version-history":[{"count":0,"href":"https:\/\/dc-apps.net\/freeudemy\/wp-json\/wp\/v2\/posts\/532\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dc-apps.net\/freeudemy\/wp-json\/wp\/v2\/media\/533"}],"wp:attachment":[{"href":"https:\/\/dc-apps.net\/freeudemy\/wp-json\/wp\/v2\/media?parent=532"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dc-apps.net\/freeudemy\/wp-json\/wp\/v2\/categories?post=532"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dc-apps.net\/freeudemy\/wp-json\/wp\/v2\/tags?post=532"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}