{"id":1998,"date":"2016-04-13T13:33:52","date_gmt":"2016-04-13T11:33:52","guid":{"rendered":"http:\/\/securite.intrinsec.com\/?p=1998"},"modified":"2016-04-13T13:33:52","modified_gmt":"2016-04-13T11:33:52","slug":"write-up-sthack","status":"publish","type":"post","link":"https:\/\/www.intrinsec.com\/en\/write-up-sthack\/","title":{"rendered":"Write-up \u2013 Stack"},"content":{"rendered":"<p style=\"text-align: left;\">We were present at the <a href=\"https:\/\/www.sthack.fr\/\">Stack <\/a>This year again for the CTF team event. The challenge brought together 35 teams, and we finished in 8th place.<sup>th<\/sup> position with 15850 points in total:<\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/04\/1.png\" rel=\"attachment wp-att-2002\"><img fetchpriority=\"high\" decoding=\"async\" class=\"size-full wp-image-2002 aligncenter\" src=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/04\/1.png\" alt=\"1\" width=\"991\" height=\"573\" \/><\/a><\/p>\n<p style=\"text-align: left;\">One of the challenges worth 4200 points, which according to the organizers had a low success rate, was the &quot;See you on the other side&quot; system challenge:<\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/04\/2.png\" rel=\"attachment wp-att-2003\"><img decoding=\"async\" class=\"size-full wp-image-2003 aligncenter\" src=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/04\/2.png\" alt=\"2\" width=\"965\" height=\"357\" \/><\/a><\/p>\n<p style=\"text-align: left;\">This challenge consisted solely of analyzing a network capture:<\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/04\/3.png\" rel=\"attachment wp-att-2004\"><img decoding=\"async\" class=\"size-full wp-image-2004 aligncenter\" src=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/04\/3.png\" alt=\"3\" width=\"672\" height=\"164\" \/><\/a><\/p>\n<p style=\"text-align: left;\">Upon opening it, we notice that this capture only contains Wifi traffic corresponding to the 802.11 standard:<\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/04\/4.png\" rel=\"attachment wp-att-2005\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-2005 aligncenter\" src=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/04\/4.png\" alt=\"4\" width=\"818\" height=\"671\" \/><\/a><\/p>\n<p style=\"text-align: left;\">An analysis of all the frames indicates that they are encrypted using the WEP protocol:<\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/04\/5.png\" rel=\"attachment wp-att-2006\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-2006 aligncenter\" src=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/04\/5.png\" alt=\"5\" width=\"792\" height=\"223\" \/><\/a><\/p>\n<p style=\"text-align: left;\">The use of the tool &quot;\u00ab\u00a0<strong>Aircrack-ng<\/strong>\u00a0\u00bbThis allows us to perform a brute-force attack on this capture and thus easily recover the WEP encryption key used:<\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/04\/6.png\" rel=\"attachment wp-att-2007\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-2007 aligncenter\" src=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/04\/6.png\" alt=\"6\" width=\"966\" height=\"528\" \/><\/a><\/p>\n<p style=\"text-align: left;\">This key can then be used to decrypt all traffic:<\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/04\/7.png\" rel=\"attachment wp-att-2008\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-2008 aligncenter\" src=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/04\/7.png\" alt=\"7\" width=\"818\" height=\"806\" \/><\/a><\/p>\n<p style=\"text-align: left;\">Traffic analysis reveals the sending of a file &quot;leo.tar.bz2&quot; via the FTP protocol to an external server with IP address 52.49.251.67:<\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/04\/8.png\" rel=\"attachment wp-att-2009\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-2009 aligncenter\" src=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/04\/8.png\" alt=\"8\" width=\"1065\" height=\"806\" \/><\/a><\/p>\n<p style=\"text-align: left;\">Once extracted, this archive contains a number of files:<\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/04\/9.png\" rel=\"attachment wp-att-2010\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-2010 aligncenter\" src=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/04\/9.png\" alt=\"9\" width=\"481\" height=\"148\" \/><\/a><\/p>\n<p style=\"text-align: left;\">In addition to images of our favorite Pok\u00e9mon, 3 files are present in the &quot;.ssh&quot; folder:<\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/04\/10.png\" rel=\"attachment wp-att-2011\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-2011 aligncenter\" src=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/04\/10.png\" alt=\"10\" width=\"582\" height=\"542\" \/><\/a><\/p>\n<p style=\"text-align: left;\">So we have a private key, but not the IP address to connect to. A quick look at the &quot;know_hosts&quot; file reveals that it is... hashed using the SHA1 algorithm:<\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/04\/11.png\" rel=\"attachment wp-att-2012\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-2012 aligncenter\" src=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/04\/11.png\" alt=\"11\" width=\"730\" height=\"74\" \/><\/a><\/p>\n<p style=\"text-align: left;\">We therefore need to perform a &quot;brute force&quot; type attack on the target server&#039;s IP address.<\/p>\n<p style=\"text-align: left;\">But which IP range should be used? The tool &quot;\u00ab\u00a0<strong>whois<\/strong>\u00a0\u00bb&quot;on the IP address &quot;52.49.162.186&quot; gives us several pieces of information, including the IP range &quot;52.48.0.0\/14&quot;:<\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/04\/12.png\" rel=\"attachment wp-att-2013\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-2013 aligncenter\" src=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/04\/12.png\" alt=\"12\" width=\"510\" height=\"201\" \/><\/a><\/p>\n<p style=\"text-align: left;\">The following Python script (<a href=\"https:\/\/github.com\/Churro\/bruteforce-known-hosts\">https:\/\/github.com\/Churro\/bruteforce-known-hosts<\/a>) allows brute-forcing the identified IP range to search for the target server:<\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/04\/13.png\" rel=\"attachment wp-att-2014\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-2014 aligncenter\" src=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/04\/13.png\" alt=\"13\" width=\"844\" height=\"325\" \/><\/a><\/p>\n<p style=\"text-align: left;\">Bingo!!!<\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/04\/14.png\" rel=\"attachment wp-att-2015\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-2015 aligncenter\" src=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/04\/14.png\" alt=\"14\" width=\"636\" height=\"70\" \/><\/a><\/p>\n<p style=\"text-align: left;\">All that remains is to connect to the server and retrieve the flag. We therefore try several accounts and thus find the correct user account (leo):<\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/04\/15.png\" rel=\"attachment wp-att-2016\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-2016 aligncenter\" src=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/04\/15.png\" alt=\"15\" width=\"548\" height=\"462\" \/><\/a><\/p>\n<p style=\"text-align: left;\">Once connected, the &quot;teleporter_code&quot; file seems interesting to us:<\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/04\/16.png\" rel=\"attachment wp-att-2017\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-2017 aligncenter\" src=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/04\/16.png\" alt=\"16\" width=\"468\" height=\"245\" \/><\/a><\/p>\n<p style=\"text-align: left;\">Of course, access permissions on it are restricted:<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/04\/17.png\" rel=\"attachment wp-att-2018\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2018\" src=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/04\/17.png\" alt=\"17\" width=\"384\" height=\"54\" \/><\/a><\/p>\n<p style=\"text-align: left;\">Privilege elevation is therefore necessary. A quick search for files belonging to the user &quot;tp&quot; and having the suid bit set reveals an interesting binary:<\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/04\/18.png\" rel=\"attachment wp-att-2019\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-2019 aligncenter\" src=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/04\/18.png\" alt=\"18\" width=\"672\" height=\"38\" \/><\/a><\/p>\n<p style=\"text-align: left;\">Using one of the tool&#039;s features, we can execute system commands:<\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/04\/19.png\" rel=\"attachment wp-att-2020\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-2020 aligncenter\" src=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/04\/19.png\" alt=\"19\" width=\"583\" height=\"429\" \/><\/a><\/p>\n<p style=\"text-align: left;\">And thus retrieve the flag for this challenge:<\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/04\/20.png\" rel=\"attachment wp-att-2021\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-2021 aligncenter\" src=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/04\/20.png\" alt=\"20\" width=\"227\" height=\"125\" \/><\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>We were at the Sthack again this year for the CTF team competition. The [\u2026]<\/p>","protected":false},"author":22,"featured_media":2022,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[19,22],"tags":[],"class_list":["post-1998","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-soc-securite-operationnelle","category-veille-securite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Write-up \u2013 Sthack - INTRINSEC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intrinsec.com\/en\/write-up-sthack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Write-up \u2013 Sthack\" \/>\n<meta property=\"og:description\" content=\"Nous \u00e9tions pr\u00e9sents \u00e0 la Sthack cette ann\u00e9e encore pour le CTF en \u00e9quipe. Le [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intrinsec.com\/en\/write-up-sthack\/\" \/>\n<meta property=\"og:site_name\" content=\"INTRINSEC\" \/>\n<meta property=\"article:published_time\" content=\"2016-04-13T11:33:52+00:00\" \/>\n<meta name=\"author\" content=\"Walid ARNOULT\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Walid ARNOULT\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/write-up-sthack\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/write-up-sthack\\\/\"},\"author\":{\"name\":\"Walid ARNOULT\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/9dd16d3e1ff8da71d0dc1b9573880ef0\"},\"headline\":\"Write-up \u2013 Sthack\",\"datePublished\":\"2016-04-13T11:33:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/write-up-sthack\\\/\"},\"wordCount\":429,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/write-up-sthack\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"articleSection\":[\"SOC S\u00e9curit\u00e9 Op\u00e9rationnelle\",\"Veille S\u00e9curit\u00e9\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.intrinsec.com\\\/write-up-sthack\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/write-up-sthack\\\/\",\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/write-up-sthack\\\/\",\"name\":\"Write-up \u2013 Sthack - INTRINSEC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/write-up-sthack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/write-up-sthack\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2016-04-13T11:33:52+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/9dd16d3e1ff8da71d0dc1b9573880ef0\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/write-up-sthack\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.intrinsec.com\\\/write-up-sthack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/write-up-sthack\\\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/write-up-sthack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.intrinsec.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Write-up \u2013 Sthack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#website\",\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/\",\"name\":\"INTRINSEC\",\"description\":\"Notre m\u00e9tier , Prot\u00e9ger le v\u00f4tre\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.intrinsec.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/9dd16d3e1ff8da71d0dc1b9573880ef0\",\"name\":\"Walid ARNOULT\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/?s=96&d=retro&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/?s=96&d=retro&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/?s=96&d=retro&r=g\",\"caption\":\"Walid ARNOULT\"},\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/en\\\/author\\\/walid-arnoult\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Write-up \u2013 Sthack - INTRINSEC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intrinsec.com\/en\/write-up-sthack\/","og_locale":"en_US","og_type":"article","og_title":"Write-up \u2013 Sthack","og_description":"Nous \u00e9tions pr\u00e9sents \u00e0 la Sthack cette ann\u00e9e encore pour le CTF en \u00e9quipe. Le [&hellip;]","og_url":"https:\/\/www.intrinsec.com\/en\/write-up-sthack\/","og_site_name":"INTRINSEC","article_published_time":"2016-04-13T11:33:52+00:00","author":"Walid ARNOULT","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Walid ARNOULT","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.intrinsec.com\/write-up-sthack\/#article","isPartOf":{"@id":"https:\/\/www.intrinsec.com\/write-up-sthack\/"},"author":{"name":"Walid ARNOULT","@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/9dd16d3e1ff8da71d0dc1b9573880ef0"},"headline":"Write-up \u2013 Sthack","datePublished":"2016-04-13T11:33:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intrinsec.com\/write-up-sthack\/"},"wordCount":429,"commentCount":0,"image":{"@id":"https:\/\/www.intrinsec.com\/write-up-sthack\/#primaryimage"},"thumbnailUrl":"","articleSection":["SOC S\u00e9curit\u00e9 Op\u00e9rationnelle","Veille S\u00e9curit\u00e9"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intrinsec.com\/write-up-sthack\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.intrinsec.com\/write-up-sthack\/","url":"https:\/\/www.intrinsec.com\/write-up-sthack\/","name":"Write-up \u2013 Sthack - INTRINSEC","isPartOf":{"@id":"https:\/\/www.intrinsec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intrinsec.com\/write-up-sthack\/#primaryimage"},"image":{"@id":"https:\/\/www.intrinsec.com\/write-up-sthack\/#primaryimage"},"thumbnailUrl":"","datePublished":"2016-04-13T11:33:52+00:00","author":{"@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/9dd16d3e1ff8da71d0dc1b9573880ef0"},"breadcrumb":{"@id":"https:\/\/www.intrinsec.com\/write-up-sthack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intrinsec.com\/write-up-sthack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.intrinsec.com\/write-up-sthack\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/www.intrinsec.com\/write-up-sthack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.intrinsec.com\/"},{"@type":"ListItem","position":2,"name":"Write-up \u2013 Sthack"}]},{"@type":"WebSite","@id":"https:\/\/www.intrinsec.com\/#website","url":"https:\/\/www.intrinsec.com\/","name":"INTRINSEC","description":"Our job is to protect yours.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intrinsec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/9dd16d3e1ff8da71d0dc1b9573880ef0","name":"Walid ARNOULT","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=retro&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=retro&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=retro&r=g","caption":"Walid ARNOULT"},"url":"https:\/\/www.intrinsec.com\/en\/author\/walid-arnoult\/"}]}},"_links":{"self":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts\/1998","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/comments?post=1998"}],"version-history":[{"count":0,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts\/1998\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/media?parent=1998"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/categories?post=1998"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/tags?post=1998"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}