{"id":8491,"date":"2021-03-29T22:27:37","date_gmt":"2021-03-29T19:27:37","guid":{"rendered":"https:\/\/kifarunix.com\/?p=8491"},"modified":"2024-03-19T18:19:25","modified_gmt":"2024-03-19T15:19:25","slug":"install-libmodsecurity-with-apache-on-debian","status":"publish","type":"post","link":"https:\/\/kifarunix.com\/install-libmodsecurity-with-apache-on-debian\/","title":{"rendered":"Install LibModsecurity with Apache on Debian 10"},"content":{"rendered":"\n<p>Welcome to our guide on how to install LibModsecurity with Apache on Debian 10. <a rel=\"noreferrer noopener\" href=\"https:\/\/github.com\/SpiderLabs\/ModSecurity\" target=\"_blank\">Libmodsecurity (Modsecurity v3)<\/a>, is an open source, cross platform web application firewall (WAF) developed by Trustwave&#8217;s SpiderLabs. It is a complete rewrite of ModSecurity v2 and it provides a robust event-based programming language which protects web applications against a wide range of attacks such as SQL injection, Cross-site Scripting (XSS), Local File Include, Remote File Include e.tc. It also allows for HTTP traffic monitoring, logging and real-time analysis.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Installing Modsecurity3 with Apache on Debian 10<\/h2>\n\n\n\n<h2 class=\"wp-block-heading\">Prerequisites<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Run System Update<\/h3>\n\n\n\n<p>Resynchronize your system packages to their latest versions.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>apt update<\/code><\/pre>\n\n\n\n<pre id=\"block-b3c4cf48-fc75-42aa-b629-71048959c853\" class=\"wp-block-preformatted\">apt upgrade<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\">Install LAMP Stack<\/h3>\n\n\n\n<p>Well, if you are running a web application, that needs LAMP stack, go ahead and setup LAMP stack.<\/p>\n\n\n\n<p>However, in this demo setup, we will just install Apache, which is enough to demonstrate how ModSecurity 3 works.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>apt install apache2<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\">Install Required Build Tools and Dependencies<\/h3>\n\n\n\n<p>To install Libmodsecurity or Modsecurity v3 on Debian 10, we are going to build it from source. Hence, you need to install some required build tools and dependencies for a successful build.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>apt install g++ flex bison curl apache2-dev doxygen libyajl-dev ssdeep liblua5.2-dev libgeoip-dev libtool dh-autoreconf libcurl4-gnutls-dev libxml2 libpcre++-dev libxml2-dev git<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\">Compile and Install LibModsecurity on Debian 10<\/h3>\n\n\n\n<p>Once your system is setup, you can proceed to install Modsecurity v3 on Debian 10.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Download LibModsecurity Source Code<\/h3>\n\n\n\n<p>To install the latest stable version of <strong>LibModsecurity<\/strong>, you need to compile it from the source.<\/p>\n\n\n\n<p>Therefore, navigate to&nbsp;<a rel=\"noreferrer noopener\" class=\"rank-math-link\" href=\"https:\/\/github.com\/SpiderLabs\/ModSecurity\/releases\/\" target=\"_blank\">ModSecurity releases page<\/a>&nbsp;and download ModSecurity source code. You can simply use wget to pull it.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>wget https:\/\/github.com\/SpiderLabs\/ModSecurity\/releases\/download\/v3.0.4\/modsecurity-v3.0.4.tar.gz<\/code><\/pre>\n\n\n\n<p>Extract the ModSecurity source code.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>tar xzf modsecurity-v3.0.4.tar.gz<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\">Compile and Install LibModsecurity<\/h3>\n\n\n\n<p>Navigate to the LibModsecurity source directory, configure, compile and install it<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>cd modsecurity-v3.0.4<\/code><\/pre>\n\n\n\n<p>Configure LibModsecurity to adapt it to your system and check if any required dependency is missing.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>.\/build.sh<\/code><\/pre>\n\n\n\n<p>You can safely ignore the&nbsp;<code><strong>fatal: not a git repository (or any of the parent directories): .git<\/strong><\/code> error messages.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>.\/configure<\/code><\/pre>\n\n\n\n<p>Be sure to fix any dependency issue, if any, before you can proceed to compile and install libModsecurity.<\/p>\n\n\n\n<p>If the configure script above completes with no error, proceed to compile and install LibModSecurity on Debian 10.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>make<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>make install<\/code><\/pre>\n\n\n\n<p>LibModSecurity aka ModSecurity v3 has now been installed on Debian 10<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Install ModSecurity-Apache Connector<\/h2>\n\n\n\n<p>The ModSecurity-apache connector provides a communication channel between Apache and libModsecurity. Now that libmodsecurity is installed, follow through the following steps to install Modsecurity Apache connector.<\/p>\n\n\n\n<p>Clone the git repository for the ModSecurity Apache connector.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>cd ~\ngit clone https:\/\/github.com\/SpiderLabs\/ModSecurity-apache<\/code><\/pre>\n\n\n\n<p>Navigate to ModSecurity-apache directory and run the following commands to compile and install it.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>cd ModSecurity-apache<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>.\/autogen.sh<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>.\/configure --with-libmodsecurity=\/usr\/local\/modsecurity\/<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>make\nmake install<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\">Configure Apache with LibModsecurity<\/h2>\n\n\n\n<h4 class=\"wp-block-heading\">Load the Apache ModSecurity Connector Module<\/h4>\n\n\n\n<p>Configure Apache to load Modsecurity Apache connector module by adding the line below to the main Apache configuration file.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>echo \"LoadModule security3_module \/usr\/lib\/apache2\/modules\/mod_security3.so\" | sudo tee -a \/etc\/apache2\/apache2.conf<\/code><\/pre>\n\n\n\n<h4 class=\"wp-block-heading\">Configure ModSecurity<\/h4>\n\n\n\n<p>Create ModSecurity configuration directory under <code>\/etc\/apache2<\/code><\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>sudo mkdir \/etc\/apache2\/modsecurity.d<\/code><\/pre>\n\n\n\n<p>Copy the sample ModSecurity configuration file from the source code directory to the ModSec configuration directory created above renaming it as follows.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>sudo cp ~\/modsecurity-v3.0.4\/modsecurity.conf-recommended \/etc\/apache2\/modsecurity.d\/modsecurity.conf<\/code><\/pre>\n\n\n\n<p>Also copy the <code>unicode.mapping<\/code> file from ModSecurity source directory to Apache Modsecurity configuration directory.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>sudo cp ~\/modsecurity-v3.0.4\/unicode.mapping \/etc\/apache2\/modsecurity.d\/<\/code><\/pre>\n\n\n\n<p>Turn on ModSecurity by changing the value of <code>SecRuleEngine<\/code> to <code>On<\/code>.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>sed -i 's\/SecRuleEngine DetectionOnly\/SecRuleEngine On\/' \/etc\/apache2\/modsecurity.d\/modsecurity.conf<\/code><\/pre>\n\n\n\n<p>Next, you need to configure ModSecurity rules. Therefore, create a file where you can define the rules to include, say, <code>\/etc\/apache2\/modsecurity.d\/modsec_rules.conf<\/code>.<\/p>\n\n\n\n<pre class=\"scroll-box\"><code>cat &gt; \/etc\/apache2\/modsecurity.d\/modsec_rules.conf &lt;&lt; 'EOL'\nInclude \"\/etc\/apache2\/modsecurity.d\/modsecurity.conf\"\nInclude \"\/etc\/apache2\/modsecurity.d\/owasp-crs\/crs-setup.conf\"\nInclude \"\/etc\/apache2\/modsecurity.d\/owasp-crs\/rules\/*.conf\"\nEOL\n<\/code><\/pre>\n\n\n\n<p>Since we have included the OWASP Rules as part of ModSecurity 3 rules, proceed to install them.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Install OWASP ModSecurity Core Rule Set (CRS) on Debian<\/h4>\n\n\n\n<p>The <strong>OWASP ModSecurity Core Rule Set (CRS)<\/strong> is a set of generic attack detection rules for use with ModSecurity. It aims at protecting the web applications from a wide range of attacks, including the OWASP Top Ten, minimum of false alerts.<\/p>\n\n\n\n<p>Clone the CRS from <a rel=\"noreferrer noopener\" href=\"https:\/\/github.com\/SpiderLabs\/owasp-modsecurity-crs\/\" target=\"_blank\">GitHub repository<\/a> to <code>\/etc\/apache2\/modsecurity.d\/<\/code> as shown below;<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>git clone https:\/\/github.com\/SpiderLabs\/owasp-modsecurity-crs.git \/etc\/apache2\/modsecurity.d\/owasp-crs<\/code><\/pre>\n\n\n\n<p>Next, rename <code>crs-setup.conf.example<\/code> to <code>crs-setup.conf<\/code>.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>sudo cp \/etc\/apache2\/modsecurity.d\/owasp-crs\/crs-setup.conf{.example,}<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\">Activate ModSecurity<\/h3>\n\n\n\n<p>After all that, activate the modsecurity on the default site configuration file or on any virtual host configuration file. In this guide, we are using Apache&#8217;s default site configuration file.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>cp \/etc\/apache2\/sites-available\/000-default.conf{,.old}<\/code><\/pre>\n\n\n\n<p>See our sample default site virtual host configuration with no comments;<\/p>\n\n\n\n<pre class=\"scroll-box\"><code>cat &gt; \/etc\/apache2\/sites-available\/000-default.conf &lt;&lt; 'EOL'\n&lt;VirtualHost *:80&gt;\n\tmodsecurity on\n\tmodsecurity_rules_file \/etc\/apache2\/modsecurity.d\/modsec_rules.conf \n\tServerAdmin webmaster@localhost\n\tDocumentRoot \/var\/www\/html\n\tErrorLog ${APACHE_LOG_DIR}\/error.log\n\tCustomLog ${APACHE_LOG_DIR}\/access.log combined\n&lt;\/VirtualHost&gt;\nEOL\n<\/code><\/pre>\n\n\n\n<p>The lines;<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>\tmodsecurity on\n\tmodsecurity_rules_file \/etc\/apache2\/modsecurity.d\/modsec_rules.conf <\/code><\/pre>\n\n\n\n<p>Turns on Modsecurity and specifies the location of the Modsecurity rules.<\/p>\n\n\n\n<p>Check Apache for configuration errors and restart it.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>apachectl -t<\/code><\/pre>\n\n\n\n<p>If there is no error, you should get the output, <strong>Syntax OK<\/strong>.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>systemctl restart apache2<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\">Testing Modsecurity<\/h3>\n\n\n\n<p>Next, test the effectiveness of Modsecurity, for example, command injection. Run the command below;<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>curl localhost?doc=\/bin\/ls<\/code><\/pre>\n\n\n\n<pre class=\"scroll-box\"><code>&lt;!DOCTYPE HTML PUBLIC \"-\/\/IETF\/\/DTD HTML 2.0\/\/EN\"&gt;\n&lt;html&gt;&lt;head&gt;\n&lt;title&gt;403 Forbidden&lt;\/title&gt;\n&lt;\/head&gt;&lt;body&gt;\n&lt;h1&gt;Forbidden&lt;\/h1&gt;\n&lt;p&gt;You don't have permission to access this resource.&lt;\/p&gt;\n&lt;hr&gt;\n&lt;address&gt;Apache\/2.4.41 (Debian) Server at localhost Port 80&lt;\/address&gt;\n&lt;\/body&gt;&lt;\/html&gt;\n<\/code><\/pre>\n\n\n\n<p>Check Modsecurity logs;<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>tail \/var\/log\/modsec_audit.log<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>ModSecurity: Warning. Matched \"Operator `PmFromFile' with parameter `unix-shell.data' against variable `ARGS:doc' (Value: `\/bin\/ls' ) &#91;file \"\/etc\/apache2\/modsecurity.d\/owasp-crs\/rules\/REQUEST-932-APPLICATION-ATTACK-RCE.conf\"] &#91;line \"496\"] &#91;id \"932160\"] &#91;rev \"\"] &#91;msg \"Remote Command Execution: Unix Shell Code Found\"] &#91;data \"Matched Data: bin\/ls found within ARGS:doc: \/bin\/ls\"] &#91;severity \"2\"] &#91;ver \"OWASP_CRS\/3.2.0\"] &#91;maturity \"0\"] &#91;accuracy \"0\"] &#91;tag \"application-multi\"] &#91;tag \"language-shell\"] &#91;tag \"platform-unix\"] &#91;tag \"attack-rce\"] &#91;tag \"paranoia-level\/1\"] &#91;tag \"OWASP_CRS\"] &#91;tag \"OWASP_CRS\/WEB_ATTACK\/COMMAND_INJECTION\"] &#91;tag \"WASCTC\/WASC-31\"] &#91;tag \"OWASP_TOP_10\/A1\"] &#91;tag \"PCI\/6.5.2\"] &#91;hostname \"127.0.1.1\"] &#91;uri \"\/\"] &#91;unique_id \"161428003146.366446\"] &#91;ref \"o1,6v10,7t:urlDecodeUni,t:cmdLine,t:normalizePath,t:lowercase\"]<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>ModSecurity: Access denied with code 403 (phase 2). Matched \"Operator `Ge' with parameter `5' against variable `TX:ANOMALY_SCORE' (Value: `5' ) &#91;file \"\/etc\/apache2\/modsecurity.d\/owasp-crs\/rules\/REQUEST-949-BLOCKING-EVALUATION.conf\"] &#91;line \"80\"] &#91;id \"949110\"] &#91;rev \"\"] &#91;msg \"Inbound Anomaly Score Exceeded (Total Score: 5)\"] &#91;data \"\"] &#91;severity \"2\"] &#91;ver \"OWASP_CRS\/3.2.0\"] &#91;maturity \"0\"] &#91;accuracy \"0\"] &#91;tag \"application-multi\"] &#91;tag \"language-multi\"] &#91;tag \"platform-multi\"] &#91;tag \"attack-generic\"] &#91;hostname \"127.0.1.1\"] &#91;uri \"\/\"] &#91;unique_id \"161428003146.366446\"] &#91;ref \"\"]<\/code><\/pre>\n\n\n\n<p>Access the site from browser and test command injection attack, <code><strong>http:\/\/domain.name\/?exec=\/bin\/bash<\/strong><\/code>.<\/p>\n\n\n\n<div><a href=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2021\/03\/modsecurity-debian-10.png\" class=\"td-modal-image\"><div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1008\" height=\"272\" src=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2021\/03\/modsecurity-debian-10.png\" alt=\"Install LibModsecurity with Apache on Debian 10\" class=\"wp-image-8496\" title=\"\" srcset=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2021\/03\/modsecurity-debian-10.png?v=1617045984 1008w, https:\/\/kifarunix.com\/wp-content\/uploads\/2021\/03\/modsecurity-debian-10-768x207.png?v=1617045984 768w\" sizes=\"(max-width: 1008px) 100vw, 1008px\" \/><\/figure><\/div><\/a><\/div>\n\n\n\n<p>Tailing the Apache error logs;<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>tail -f \/var\/log\/apache2\/error.log<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>&#91;Thu Feb 25 19:29:06.385428 2021] &#91;:error] &#91;pid 38210] &#91;client 192.168.57.1:45916] ModSecurity: Warning. Matched \"Operator `PmFromFile' with parameter `unix-shell.data' against variable `ARGS:exec' (Value: `\/bin\/bash' ) &#91;file \"\/etc\/apache2\/modsecurity.d\/owasp-crs\/rules\/REQUEST-932-APPLICATION-ATTACK-RCE.conf\"] &#91;line \"496\"] &#91;id \"932160\"] &#91;rev \"\"] &#91;msg \"Remote Command Execution: Unix Shell Code Found\"] &#91;data \"Matched Data: bin\/bash found within ARGS:exec: \/bin\/bash\"] &#91;severity \"2\"] &#91;ver \"OWASP_CRS\/3.2.0\"] &#91;maturity \"0\"] &#91;accuracy \"0\"] &#91;tag \"application-multi\"] &#91;tag \"language-shell\"] &#91;tag \"platform-unix\"] &#91;tag \"attack-rce\"] &#91;tag \"paranoia-level\/1\"] &#91;tag \"OWASP_CRS\"] &#91;tag \"OWASP_CRS\/WEB_ATTACK\/COMMAND_INJECTION\"] &#91;tag \"WASCTC\/WASC-31\"] &#91;tag \"OWASP_TOP_10\/A1\"] &#91;tag \"PCI\/6.5.2\"] &#91;hostname \"127.0.1.1\"] &#91;uri \"\/\"] &#91;unique_id \"161428134623.117562\"] &#91;ref \"o1,8v11,9t:urlDecodeUni,t:cmdLine,t:normalizePath,t:lowercase\"]<\/code><\/pre>\n\n\n\n<p>As a result, this confirms that the Modsecurity is functioning as expected.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Reference:<\/h3>\n\n\n\n<p><a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/github.com\/SpiderLabs\/ModSecurity-apache\" target=\"_blank\">ModSecurity-apache<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/github.com\/SpiderLabs\/ModSecurity\" target=\"_blank\" rel=\"noopener\">ModSecurity<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Related Guides<\/h3>\n\n\n\n<p><a aria-label=\" (opens in a new tab)\" href=\"https:\/\/kifarunix.com\/restrict-access-to-wordpress-login-page-to-specific-ips-with-libmodsecurity\/\" target=\"_blank\" rel=\"noreferrer noopener\" class=\"rank-math-link\">Restrict Access to WordPress Login Page to Specific IPs with libModSecurity<\/a><\/p>\n\n\n\n<p><a aria-label=\" (opens in a new tab)\" href=\"https:\/\/kifarunix.com\/create-kibana-visualization-dashboards-for-modsecurity-logs\/\" target=\"_blank\" rel=\"noreferrer noopener\" class=\"rank-math-link\">Create Kibana Visualization Dashboards for ModSecurity Logs<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/kifarunix.com\/process-and-visualize-modsecurity-logs-on-elk-stack\/\" target=\"_blank\" aria-label=\" (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"rank-math-link\">Process and Visualize ModSecurity Logs on ELK Stack<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/kifarunix.com\/configure-libmodsecurity-with-nginx-on-centos-8\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Configure LibModsecurity with Nginx on CentOS 8<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/kifarunix.com\/install-libmodsecurity-with-apache-on-fedora-30-29-centos-7\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Install LibModsecurity with Apache on Fedora 30\/29\/CentOS 7<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Welcome to our guide on how to install LibModsecurity with Apache on Debian 10. Libmodsecurity (Modsecurity v3), is an open source, cross platform web application<\/p>\n","protected":false},"author":1,"featured_media":8493,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"rank_math_lock_modified_date":false,"footnotes":""},"categories":[121],"tags":[3358,3359,3356,1140,3357],"class_list":["post-8491","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-howtos","tag-debian-10-modsecurity","tag-install-modsecurity-3","tag-install-modsecurity-3-debian","tag-libmodsecurity","tag-modsecurity-3-debian","generate-columns","tablet-grid-50","mobile-grid-100","grid-parent","grid-50","resize-featured-image"],"_links":{"self":[{"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/posts\/8491"}],"collection":[{"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/comments?post=8491"}],"version-history":[{"count":7,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/posts\/8491\/revisions"}],"predecessor-version":[{"id":21871,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/posts\/8491\/revisions\/21871"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/media\/8493"}],"wp:attachment":[{"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/media?parent=8491"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/categories?post=8491"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/tags?post=8491"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}