{"id":85872,"date":"2017-06-09T16:03:36","date_gmt":"2017-06-09T16:03:36","guid":{"rendered":"https:\/\/webkul.com\/blog\/?p=85872"},"modified":"2017-06-10T04:48:29","modified_gmt":"2017-06-10T04:48:29","slug":"glimpses-security-testing","status":"publish","type":"post","link":"https:\/\/webkul.com\/blog\/glimpses-security-testing\/","title":{"rendered":"Glimpses Of Security Testing"},"content":{"rendered":"<p>The prime objective of Security testing is to find out ways to identify a vulnerability in the system and to ensure that data is protected from hackers. As more and more vital data is stored in web applications,\u00a0proper security testing of web applications is becoming very important. We should do it during test environment.\u00a0To implement security testing approach in our application we can ensure that our application is free to following vulnerabilities.<\/p>\n<h2><strong>SQL Injection:<\/strong><\/h2>\n<p>Many testers are unaware of how SQL queries can be tampered with and assume that an SQL query is a trusted command.SQL injection is a code injection technique that might destroy your database. A successful SQL injection attack can read sensitive data from the database, modify database data (Insert\/update\/delete), also execute administration operations on the database. The data we input in our application are moved to database queries. If any malicious data would be typed, it would be moved to a database\u00a0query, too. In that case, if SQL Injection is possible, any damage could be done to your system&#8217;s data.<\/p>\n<p><strong>The Following things can be done from SQL Injection:<\/strong><\/p>\n<p>1.)\u00a0The user could log in to the application as another user, even as an administrator.<\/p>\n<p>2.) The user could view private information of users like details of other user&#8217;s profiles, their transaction details etc.<\/p>\n<p>3.)<strong>\u00a0<\/strong>The user could change application configuration information and the data of the other users.<\/p>\n<p>4.) The user could modify the database, even delete the database.<\/p>\n<p>5.)\u00a0The user could take control of the database server.<\/p>\n<p>Since the consequences of allowing the SQL injection technique could be very severe, so we should be tested it during the test environment.<\/p>\n<p><strong>How your website can be checked for any SQL Injection vulnerabilities?<\/strong><\/p>\n<p>It is very simple to find out that your website is SQL\u00a0injection protected or not. To check the vulnerable page for sql injection\u00a0vulnerability add a [ &#8216; ] to the URL. \u00a0To check the vulnerable page for sql injection vulnerability add a [ &#8216; ] sign. \u00a0If the page is vulnerable to SQLI it will throw My SQL error. As we got vulnerable url,\u00a0we can any tool to check the level of exploitation. So anyone can dump the complete data with available data. Let&#8217;s take an example-<\/p>\n<pre class=\"brush:xml\">\/\/ a user name\r\n$name = \"John doe\"; \r\n$query = \"SELECT * FROM customers WHERE username = '$name'\";\r\necho \"Normal: \" . $query . \"&lt;br \/&gt;\";\r\n\r\n\/\/ user input that uses SQL Injection\r\n$name_bad = \"' OR 1'\"; \r\n\r\n\/\/ our MySQL query builder, however, not a very safe one\r\n$query_bad = \"SELECT * FROM customers WHERE username = '$name_bad'\";\r\n\r\n\/\/ display what the new query will look like, with injection\r\necho \"Injection: \" . $query_bad;\r\n<\/pre>\n<p>It will display like-<br \/>\nNormal: SELECT * FROM customers WHERE username = &#8216;John doe&#8217;<br \/>\nInjection: SELECT * FROM customers WHERE username = &#8221; OR 1&#8243;<\/p>\n<p>From Normal query\u00a0MySQL statement will just select everything from customers that has a username equal to <i>John doe<\/i>. \u00a0Whereas, the injection attack will change our query behavior.\u00a0This OR clause of 1 will always be <i>true<\/i> and so every single entry in the &#8220;customers&#8221; table would be selected by this statement. You can learn more from this link- <a href=\"http:\/\/www.tizag.com\/mysqlTutorial\/mysql-php-sql-injection.php\" target=\"_blank\" rel=\"noopener noreferrer\">SQL Injection<\/a><\/p>\n<p><strong>What can be done to Prevent SQL Injection attacks<\/strong><strong>?<\/strong><\/p>\n<p>For preventing SQL injection we should validate and sanitize every data. We can validate the data with <strong>(int)<\/strong>.\u00a0Using <strong>(int)<\/strong> forces the data to be an integer.<\/p>\n<p>PHP has a specially-made function to prevent these attacks. All you need to do is use this function <strong><i>mysqli_real_escape_string<\/i><\/strong>.<\/p>\n<p><strong><i>mysqli_real_escape_string<\/i><\/strong>\u00a0take a string that is going to be used in a MySQL query and return the same string with all SQL Injection attempts safely escaped. Basically, it will replace those troublesome quotes(&#8216;) a user might enter with a MySQL-safe substitute, an escaped quote \\&#8217;.\u00a0So please do use the\u00a0<strong><i>mysqli_real_escape_string()\u00a0<\/i><\/strong>function to help prevent SQL Injection\u00a0attacks on your websites.<\/p>\n<p>So we can check our application&#8217;s code that is it validated\/sanitized or not.<\/p>\n<h2><strong>Cross Site Scripting:\u00a0<\/strong><\/h2>\n<p><strong>XSS<\/strong> (Cross-Site Scripting) is a widespread vulnerability that affects many web applications.\u00a0<b>XSS<\/b> enables attackers to inject client-side scripts into web pages viewed by other users.\u00a0The <strong>XSS<\/strong> scripts injected into a site can leak out sensitive data and information.<\/p>\n<p><strong>How does it work?\u00a0<\/strong><\/p>\n<p>On a web page, we generally interact with input boxes however, there are text areas that act as the document objects. They take\u00a0input from the\u00a0users and these are easily vulnerable.<\/p>\n<p>An XSS attack can execute malicious script anywhere in the web app. Here\u2019s a quick example:<\/p>\n<pre class=\"brush:xml\">&lt;input type=\"text\" name=\"firstname\" value=\"&lt;script&gt;alert('Script Injected');&lt;\/script&gt;\" &gt;\r\n\r\n<\/pre>\n<p>&nbsp;<\/p>\n<p><strong>We can understand it using different scenarios like-<\/strong><\/p>\n<p>A script is sent as a request in an input and this is then shown as a response on the web page.<\/p>\n<p>The script is executed when the user runs the application.<\/p>\n<p><strong>How to prevent XSS?<\/strong><\/p>\n<p>We can overcome from XSS attack using HTML escape\/decode before inserting untrusted data into HTML element. Using <strong>html_entity_decode()<\/strong> function we can convert all HTML entities in the string to their applicable characters.<\/p>\n<p>We will learn more on Security testing in another blog.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h2><\/h2>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The prime objective of Security testing is to find out ways to identify a vulnerability in the system and to ensure that data is protected from hackers. As more and more vital data is stored in web applications,\u00a0proper security testing of web applications is becoming very important. We should do it during test environment.\u00a0To implement <a href=\"https:\/\/webkul.com\/blog\/glimpses-security-testing\/\">[&#8230;]<\/a><\/p>\n","protected":false},"author":36,"featured_media":86026,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4901,4902],"tags":[4904,4905,4903,4906],"class_list":["post-85872","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-testing","category-sql-injection","tag-security-testing","tag-sql-injection","tag-web-testing","tag-xss-attack"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Glimpses Of Security Testing - Webkul Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/webkul.com\/blog\/glimpses-security-testing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Glimpses Of Security Testing - Webkul Blog\" \/>\n<meta property=\"og:description\" content=\"The prime objective of Security testing is to find out ways to identify a vulnerability in the system and to ensure that data is protected from hackers. As more and more vital data is stored in web applications,\u00a0proper security testing of web applications is becoming very important. We should do it during test environment.\u00a0To implement [...]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/webkul.com\/blog\/glimpses-security-testing\/\" \/>\n<meta property=\"og:site_name\" content=\"Webkul Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/webkul\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-06-09T16:03:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-06-10T04:48:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2017\/06\/download-1-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"825\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Shikha Bhardwaj\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@webkul\" \/>\n<meta name=\"twitter:site\" content=\"@webkul\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Shikha Bhardwaj\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/webkul.com\/blog\/glimpses-security-testing\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/webkul.com\/blog\/glimpses-security-testing\/\"},\"author\":{\"name\":\"Shikha Bhardwaj\",\"@id\":\"https:\/\/webkul.com\/blog\/#\/schema\/person\/e44090b9dd8c2c58a3c78aa1d884c030\"},\"headline\":\"Glimpses Of Security Testing\",\"datePublished\":\"2017-06-09T16:03:36+00:00\",\"dateModified\":\"2017-06-10T04:48:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/webkul.com\/blog\/glimpses-security-testing\/\"},\"wordCount\":790,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/webkul.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/webkul.com\/blog\/glimpses-security-testing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2017\/06\/download-1-1.png\",\"keywords\":[\"security testing\",\"SQL injection\",\"Web testing\",\"XSS attack\"],\"articleSection\":[\"Security Testing\",\"SQL injection\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/webkul.com\/blog\/glimpses-security-testing\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/webkul.com\/blog\/glimpses-security-testing\/\",\"url\":\"https:\/\/webkul.com\/blog\/glimpses-security-testing\/\",\"name\":\"Glimpses Of Security Testing - Webkul Blog\",\"isPartOf\":{\"@id\":\"https:\/\/webkul.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/webkul.com\/blog\/glimpses-security-testing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/webkul.com\/blog\/glimpses-security-testing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2017\/06\/download-1-1.png\",\"datePublished\":\"2017-06-09T16:03:36+00:00\",\"dateModified\":\"2017-06-10T04:48:29+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/webkul.com\/blog\/glimpses-security-testing\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/webkul.com\/blog\/glimpses-security-testing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/webkul.com\/blog\/glimpses-security-testing\/#primaryimage\",\"url\":\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2017\/06\/download-1-1.png\",\"contentUrl\":\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2017\/06\/download-1-1.png\",\"width\":825,\"height\":260},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/webkul.com\/blog\/glimpses-security-testing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/webkul.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Glimpses Of Security Testing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/webkul.com\/blog\/#website\",\"url\":\"https:\/\/webkul.com\/blog\/\",\"name\":\"Webkul Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/webkul.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/webkul.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/webkul.com\/blog\/#organization\",\"name\":\"WebKul Software Private Limited\",\"url\":\"https:\/\/webkul.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/webkul.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/08\/webkul-logo-accent-sq.png\",\"contentUrl\":\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/08\/webkul-logo-accent-sq.png\",\"width\":380,\"height\":380,\"caption\":\"WebKul Software Private Limited\"},\"image\":{\"@id\":\"https:\/\/webkul.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/webkul\/\",\"https:\/\/x.com\/webkul\",\"https:\/\/www.instagram.com\/webkul\/\",\"https:\/\/www.linkedin.com\/company\/webkul\",\"https:\/\/www.youtube.com\/user\/webkul\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/webkul.com\/blog\/#\/schema\/person\/e44090b9dd8c2c58a3c78aa1d884c030\",\"name\":\"Shikha Bhardwaj\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/webkul.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8ada4c680b1ae3947314d3784bd12a6c5787f89723b2479a4261308bae1c1e0e?s=96&d=https%3A%2F%2Fcdnblog.webkul.com%2Fblog%2Fwp-content%2Fuploads%2F2019%2F10%2Feva.png&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8ada4c680b1ae3947314d3784bd12a6c5787f89723b2479a4261308bae1c1e0e?s=96&d=https%3A%2F%2Fcdnblog.webkul.com%2Fblog%2Fwp-content%2Fuploads%2F2019%2F10%2Feva.png&r=g\",\"caption\":\"Shikha Bhardwaj\"},\"url\":\"https:\/\/webkul.com\/blog\/author\/shikha\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Glimpses Of Security Testing - Webkul Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/webkul.com\/blog\/glimpses-security-testing\/","og_locale":"en_US","og_type":"article","og_title":"Glimpses Of Security Testing - Webkul Blog","og_description":"The prime objective of Security testing is to find out ways to identify a vulnerability in the system and to ensure that data is protected from hackers. As more and more vital data is stored in web applications,\u00a0proper security testing of web applications is becoming very important. We should do it during test environment.\u00a0To implement [...]","og_url":"https:\/\/webkul.com\/blog\/glimpses-security-testing\/","og_site_name":"Webkul Blog","article_publisher":"https:\/\/www.facebook.com\/webkul\/","article_published_time":"2017-06-09T16:03:36+00:00","article_modified_time":"2017-06-10T04:48:29+00:00","og_image":[{"width":825,"height":260,"url":"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2017\/06\/download-1-1.png","type":"image\/png"}],"author":"Shikha Bhardwaj","twitter_card":"summary_large_image","twitter_creator":"@webkul","twitter_site":"@webkul","twitter_misc":{"Written by":"Shikha Bhardwaj","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/webkul.com\/blog\/glimpses-security-testing\/#article","isPartOf":{"@id":"https:\/\/webkul.com\/blog\/glimpses-security-testing\/"},"author":{"name":"Shikha Bhardwaj","@id":"https:\/\/webkul.com\/blog\/#\/schema\/person\/e44090b9dd8c2c58a3c78aa1d884c030"},"headline":"Glimpses Of Security Testing","datePublished":"2017-06-09T16:03:36+00:00","dateModified":"2017-06-10T04:48:29+00:00","mainEntityOfPage":{"@id":"https:\/\/webkul.com\/blog\/glimpses-security-testing\/"},"wordCount":790,"commentCount":0,"publisher":{"@id":"https:\/\/webkul.com\/blog\/#organization"},"image":{"@id":"https:\/\/webkul.com\/blog\/glimpses-security-testing\/#primaryimage"},"thumbnailUrl":"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2017\/06\/download-1-1.png","keywords":["security testing","SQL injection","Web testing","XSS attack"],"articleSection":["Security Testing","SQL injection"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/webkul.com\/blog\/glimpses-security-testing\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/webkul.com\/blog\/glimpses-security-testing\/","url":"https:\/\/webkul.com\/blog\/glimpses-security-testing\/","name":"Glimpses Of Security Testing - Webkul Blog","isPartOf":{"@id":"https:\/\/webkul.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/webkul.com\/blog\/glimpses-security-testing\/#primaryimage"},"image":{"@id":"https:\/\/webkul.com\/blog\/glimpses-security-testing\/#primaryimage"},"thumbnailUrl":"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2017\/06\/download-1-1.png","datePublished":"2017-06-09T16:03:36+00:00","dateModified":"2017-06-10T04:48:29+00:00","breadcrumb":{"@id":"https:\/\/webkul.com\/blog\/glimpses-security-testing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/webkul.com\/blog\/glimpses-security-testing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/webkul.com\/blog\/glimpses-security-testing\/#primaryimage","url":"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2017\/06\/download-1-1.png","contentUrl":"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2017\/06\/download-1-1.png","width":825,"height":260},{"@type":"BreadcrumbList","@id":"https:\/\/webkul.com\/blog\/glimpses-security-testing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/webkul.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Glimpses Of Security Testing"}]},{"@type":"WebSite","@id":"https:\/\/webkul.com\/blog\/#website","url":"https:\/\/webkul.com\/blog\/","name":"Webkul Blog","description":"","publisher":{"@id":"https:\/\/webkul.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/webkul.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/webkul.com\/blog\/#organization","name":"WebKul Software Private Limited","url":"https:\/\/webkul.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/webkul.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/08\/webkul-logo-accent-sq.png","contentUrl":"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/08\/webkul-logo-accent-sq.png","width":380,"height":380,"caption":"WebKul Software Private Limited"},"image":{"@id":"https:\/\/webkul.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/webkul\/","https:\/\/x.com\/webkul","https:\/\/www.instagram.com\/webkul\/","https:\/\/www.linkedin.com\/company\/webkul","https:\/\/www.youtube.com\/user\/webkul\/"]},{"@type":"Person","@id":"https:\/\/webkul.com\/blog\/#\/schema\/person\/e44090b9dd8c2c58a3c78aa1d884c030","name":"Shikha Bhardwaj","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/webkul.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8ada4c680b1ae3947314d3784bd12a6c5787f89723b2479a4261308bae1c1e0e?s=96&d=https%3A%2F%2Fcdnblog.webkul.com%2Fblog%2Fwp-content%2Fuploads%2F2019%2F10%2Feva.png&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8ada4c680b1ae3947314d3784bd12a6c5787f89723b2479a4261308bae1c1e0e?s=96&d=https%3A%2F%2Fcdnblog.webkul.com%2Fblog%2Fwp-content%2Fuploads%2F2019%2F10%2Feva.png&r=g","caption":"Shikha Bhardwaj"},"url":"https:\/\/webkul.com\/blog\/author\/shikha\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/webkul.com\/blog\/wp-json\/wp\/v2\/posts\/85872","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/webkul.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/webkul.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/webkul.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/webkul.com\/blog\/wp-json\/wp\/v2\/comments?post=85872"}],"version-history":[{"count":19,"href":"https:\/\/webkul.com\/blog\/wp-json\/wp\/v2\/posts\/85872\/revisions"}],"predecessor-version":[{"id":86035,"href":"https:\/\/webkul.com\/blog\/wp-json\/wp\/v2\/posts\/85872\/revisions\/86035"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/webkul.com\/blog\/wp-json\/wp\/v2\/media\/86026"}],"wp:attachment":[{"href":"https:\/\/webkul.com\/blog\/wp-json\/wp\/v2\/media?parent=85872"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/webkul.com\/blog\/wp-json\/wp\/v2\/categories?post=85872"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/webkul.com\/blog\/wp-json\/wp\/v2\/tags?post=85872"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}