{"id":460,"date":"2025-02-09T14:49:16","date_gmt":"2025-02-09T13:49:16","guid":{"rendered":"https:\/\/bergee.it\/blog\/?p=460"},"modified":"2026-04-27T22:18:25","modified_gmt":"2026-04-27T20:18:25","slug":"how-i-hacked-xxxx-for-fun-and-profit","status":"publish","type":"post","link":"https:\/\/bergee.it\/blog\/how-i-hacked-xxxx-for-fun-and-profit\/","title":{"rendered":"How I hacked XXXX for fun and !profit"},"content":{"rendered":"<p>I am a little bit late but Happy New Year \ud83d\ude42<\/p>\n<p>In the beginning of the year I decided to hack one company, let&#8217;s call it XXX as I can&#8217;t give the real name. The company is running VDP program and offers only letters of appreciacion. So I wanted to get one. I started my recon by google dorking with these dorks:<\/p>\n<blockquote><p>site: *.XXX ext:jsp<\/p>\n<p>site:*.XXX ext:php<\/p>\n<p>site:*.XXX ext:asp<\/p><\/blockquote>\n<p>I found the JSP site, looking pretty legacy, which allowed some data searching. So I ran the BURP and started playing with the site. I looked through the requests one by one but found nothing pretty interesting. So I started testing parameters for XSS, html injection but found nothing. I also tried array-based injection\u00a0 &#8211; instead of value I put [] as an array, it often leads to unexpected results, but nothing. I also tried\u00a0 adding &#8216; to the end of parameters, hoping for SQL error or at least error 500 which could indicate blind SQL injection but nothing. One mistake I made back then was I omitted some parameteres and focused only on \u00a0the one\u00a0 getting the user input value directly, not the one that were kind of control parameters adding by the app itself.<\/p>\n<p>I was about to give up but somehow I put &#8216; in the end of the control parameter. Suddenly, in the response I saw an SQL error&#8230; what? Good old SQL injection just like that? Yes that was it. This is heavily redacted request:<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-470\" src=\"https:\/\/bergee.it\/blog\/wp-content\/uploads\/2025\/02\/aaaaaaaaaaaaaa.jpg\" alt=\"\" width=\"1057\" height=\"455\" srcset=\"https:\/\/bergee.it\/blog\/wp-content\/uploads\/2025\/02\/aaaaaaaaaaaaaa.jpg 1057w, https:\/\/bergee.it\/blog\/wp-content\/uploads\/2025\/02\/aaaaaaaaaaaaaa-300x129.jpg 300w, https:\/\/bergee.it\/blog\/wp-content\/uploads\/2025\/02\/aaaaaaaaaaaaaa-1024x441.jpg 1024w, https:\/\/bergee.it\/blog\/wp-content\/uploads\/2025\/02\/aaaaaaaaaaaaaa-768x331.jpg 768w, https:\/\/bergee.it\/blog\/wp-content\/uploads\/2025\/02\/aaaaaaaaaaaaaa-850x366.jpg 850w\" sizes=\"auto, (max-width: 1057px) 100vw, 1057px\" \/><\/p>\n<p>Ok, I&#8217;ve got the SQL injection, but what now. To prove the impact I had to extract some real data such as username, database name or tables name. The error points to Oracle database which fortunately I am pretty familiar with as the developer\u00a0 but not from the SQL injection point of view :). At first I figured out I can post only this one parameter (type) to throw the error. The error says it is procedure, so we can assume the sql is something like:<\/p>\n<blockquote><p>begin some_procedure(param1,param2,type); end;<\/p><\/blockquote>\n<p>that&#8217;s why I tried to close the query and see what happened:<\/p>\n<blockquote><p>type=All&#8217;); select 1 from dual; end;&#8211;<\/p><\/blockquote>\n<p>but another error has happend. I was trying some more payloads to end the query and begin another one, always ending up with some errors. I took a break.<\/p>\n<p>Several hours later I came back with the fresh mind and new idea &#8211; what if I concatenate the value of type parameter with something else , so the injection would be:<\/p>\n<blockquote><p>type=x&#8217;||&#8217;abc&#8217;)&#8211;<\/p><\/blockquote>\n<p>and guess what? It worked , there was no error and I got no data , means that&#8217;s the right way of exploiting that. Now I had to check if I can run my own queries. I tried this:<\/p>\n<blockquote><p>type=x&#8217;||(select &#8216;abc&#8217; from dual))&#8211;<\/p><\/blockquote>\n<p>and I got some strage syntax error. I figured out this might be due to the space signs so I recall the old trick replacing them with sql comments , so the we got this payload now:<\/p>\n<blockquote><p>type=x&#8217;||(select\/**\/&#8217;abc&#8217;\/**\/from dual))&#8211;<\/p><\/blockquote>\n<p>This worked perfectly. Again\u00a0 &#8211; success &#8211; no error and no data. But If a get no data in response how can I retrieve anything? The answer is special oracle function that returns the data inside of the error message. After some googling I found the perfect candidate for this:<\/p>\n<blockquote><p>ctxsys.drithsx.sn(1,(sql query to execute))<\/p><\/blockquote>\n<p>And to be honest, I don&#8217;t know what this function is doing, but this query returned the username (starting with N in this picture) as the part of the error message:<\/p>\n<blockquote><p>type=x&#8217;||(ctxsys.drithsx.sn(1,(select\/**\/user\/**\/from\/**\/dual))))&#8211;<\/p><\/blockquote>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-471\" src=\"https:\/\/bergee.it\/blog\/wp-content\/uploads\/2025\/02\/sql_i_username_redacted_small.jpg\" alt=\"\" width=\"1056\" height=\"563\" srcset=\"https:\/\/bergee.it\/blog\/wp-content\/uploads\/2025\/02\/sql_i_username_redacted_small.jpg 1056w, https:\/\/bergee.it\/blog\/wp-content\/uploads\/2025\/02\/sql_i_username_redacted_small-300x160.jpg 300w, https:\/\/bergee.it\/blog\/wp-content\/uploads\/2025\/02\/sql_i_username_redacted_small-1024x546.jpg 1024w, https:\/\/bergee.it\/blog\/wp-content\/uploads\/2025\/02\/sql_i_username_redacted_small-768x409.jpg 768w, https:\/\/bergee.it\/blog\/wp-content\/uploads\/2025\/02\/sql_i_username_redacted_small-850x453.jpg 850w\" sizes=\"auto, (max-width: 1056px) 100vw, 1056px\" \/><\/p>\n<p>I also extracted database name with the following payload:<\/p>\n<blockquote><p>type=x&#8217;||(ctxsys.drithsx.sn(1,(select\/**\/ora_database_name\/**\/from\/**\/dual))))&#8211;<\/p><\/blockquote>\n<p>Finally I sent the report and got P1 two days later.<\/p>\n<p>Reward: letter of recognition<\/p>\n<p>See you next bug<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I am a little bit late but Happy New Year \ud83d\ude42 In the beginning of the year I decided to hack one company, let&#8217;s call it XXX as I can&#8217;t give the real name. The company is running VDP program and offers only letters of appreciacion. So I wanted to get one. I started my&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[33,29],"tags":[22],"class_list":["post-460","post","type-post","status-publish","format-standard","hentry","category-vdp","category-write-up","tag-sql-injection"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How I hacked XXXX for fun and !profit - Bergee&#039;s Stories on Bug Hunting<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bergee.it\/blog\/how-i-hacked-xxxx-for-fun-and-profit\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How I hacked XXXX for fun and !profit - Bergee&#039;s Stories on Bug Hunting\" \/>\n<meta property=\"og:description\" content=\"I am a little bit late but Happy New Year \ud83d\ude42 In the beginning of the year I decided to hack one company, let&#8217;s call it XXX as I can&#8217;t give the real name. The company is running VDP program and offers only letters of appreciacion. So I wanted to get one. I started my...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bergee.it\/blog\/how-i-hacked-xxxx-for-fun-and-profit\/\" \/>\n<meta property=\"og:site_name\" content=\"Bergee&#039;s Stories on Bug Hunting\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-09T13:49:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-27T20:18:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/bergee.it\/blog\/wp-content\/uploads\/2025\/02\/aaaaaaaaaaaaaa.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1057\" \/>\n\t<meta property=\"og:image:height\" content=\"455\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"bergee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/bergee\" \/>\n<meta name=\"twitter:site\" content=\"@bergee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"bergee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/bergee.it\\\/blog\\\/how-i-hacked-xxxx-for-fun-and-profit\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bergee.it\\\/blog\\\/how-i-hacked-xxxx-for-fun-and-profit\\\/\"},\"author\":{\"name\":\"bergee\",\"@id\":\"https:\\\/\\\/bergee.it\\\/blog\\\/#\\\/schema\\\/person\\\/a37382384cc58e596119b1eec4869d73\"},\"headline\":\"How I hacked XXXX for fun and !profit\",\"datePublished\":\"2025-02-09T13:49:16+00:00\",\"dateModified\":\"2026-04-27T20:18:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/bergee.it\\\/blog\\\/how-i-hacked-xxxx-for-fun-and-profit\\\/\"},\"wordCount\":664,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/bergee.it\\\/blog\\\/#\\\/schema\\\/person\\\/a37382384cc58e596119b1eec4869d73\"},\"image\":{\"@id\":\"https:\\\/\\\/bergee.it\\\/blog\\\/how-i-hacked-xxxx-for-fun-and-profit\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bergee.it\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/aaaaaaaaaaaaaa.jpg\",\"keywords\":[\"sql injection\"],\"articleSection\":[\"vdp\",\"write-up\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/bergee.it\\\/blog\\\/how-i-hacked-xxxx-for-fun-and-profit\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/bergee.it\\\/blog\\\/how-i-hacked-xxxx-for-fun-and-profit\\\/\",\"url\":\"https:\\\/\\\/bergee.it\\\/blog\\\/how-i-hacked-xxxx-for-fun-and-profit\\\/\",\"name\":\"How I hacked XXXX for fun and !profit - Bergee&#039;s Stories on Bug Hunting\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bergee.it\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/bergee.it\\\/blog\\\/how-i-hacked-xxxx-for-fun-and-profit\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/bergee.it\\\/blog\\\/how-i-hacked-xxxx-for-fun-and-profit\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bergee.it\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/aaaaaaaaaaaaaa.jpg\",\"datePublished\":\"2025-02-09T13:49:16+00:00\",\"dateModified\":\"2026-04-27T20:18:25+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/bergee.it\\\/blog\\\/how-i-hacked-xxxx-for-fun-and-profit\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/bergee.it\\\/blog\\\/how-i-hacked-xxxx-for-fun-and-profit\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/bergee.it\\\/blog\\\/how-i-hacked-xxxx-for-fun-and-profit\\\/#primaryimage\",\"url\":\"https:\\\/\\\/bergee.it\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/aaaaaaaaaaaaaa.jpg\",\"contentUrl\":\"https:\\\/\\\/bergee.it\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/aaaaaaaaaaaaaa.jpg\",\"width\":1057,\"height\":455},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/bergee.it\\\/blog\\\/how-i-hacked-xxxx-for-fun-and-profit\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/bergee.it\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How I hacked XXXX for fun and !profit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/bergee.it\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/bergee.it\\\/blog\\\/\",\"name\":\"Bergee&#039;s Stories on Bug Hunting\",\"description\":\"hacking, cyber security and programming\",\"publisher\":{\"@id\":\"https:\\\/\\\/bergee.it\\\/blog\\\/#\\\/schema\\\/person\\\/a37382384cc58e596119b1eec4869d73\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/bergee.it\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/bergee.it\\\/blog\\\/#\\\/schema\\\/person\\\/a37382384cc58e596119b1eec4869d73\",\"name\":\"bergee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/bergee.it\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/berdzi_drawing_150x150_x.png\",\"url\":\"https:\\\/\\\/bergee.it\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/berdzi_drawing_150x150_x.png\",\"contentUrl\":\"https:\\\/\\\/bergee.it\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/berdzi_drawing_150x150_x.png\",\"width\":129,\"height\":150,\"caption\":\"bergee\"},\"logo\":{\"@id\":\"https:\\\/\\\/bergee.it\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/berdzi_drawing_150x150_x.png\"},\"sameAs\":[\"http:\\\/\\\/localhost\\\/wordpress\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/bartlomiej-bergier\",\"https:\\\/\\\/x.com\\\/https:\\\/\\\/twitter.com\\\/bergee\"],\"url\":\"https:\\\/\\\/bergee.it\\\/blog\\\/author\\\/bergee\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How I hacked XXXX for fun and !profit - Bergee&#039;s Stories on Bug Hunting","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bergee.it\/blog\/how-i-hacked-xxxx-for-fun-and-profit\/","og_locale":"en_US","og_type":"article","og_title":"How I hacked XXXX for fun and !profit - Bergee&#039;s Stories on Bug Hunting","og_description":"I am a little bit late but Happy New Year \ud83d\ude42 In the beginning of the year I decided to hack one company, let&#8217;s call it XXX as I can&#8217;t give the real name. The company is running VDP program and offers only letters of appreciacion. So I wanted to get one. I started my...","og_url":"https:\/\/bergee.it\/blog\/how-i-hacked-xxxx-for-fun-and-profit\/","og_site_name":"Bergee&#039;s Stories on Bug Hunting","article_published_time":"2025-02-09T13:49:16+00:00","article_modified_time":"2026-04-27T20:18:25+00:00","og_image":[{"width":1057,"height":455,"url":"https:\/\/bergee.it\/blog\/wp-content\/uploads\/2025\/02\/aaaaaaaaaaaaaa.jpg","type":"image\/jpeg"}],"author":"bergee","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/bergee","twitter_site":"@bergee","twitter_misc":{"Written by":"bergee","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/bergee.it\/blog\/how-i-hacked-xxxx-for-fun-and-profit\/#article","isPartOf":{"@id":"https:\/\/bergee.it\/blog\/how-i-hacked-xxxx-for-fun-and-profit\/"},"author":{"name":"bergee","@id":"https:\/\/bergee.it\/blog\/#\/schema\/person\/a37382384cc58e596119b1eec4869d73"},"headline":"How I hacked XXXX for fun and !profit","datePublished":"2025-02-09T13:49:16+00:00","dateModified":"2026-04-27T20:18:25+00:00","mainEntityOfPage":{"@id":"https:\/\/bergee.it\/blog\/how-i-hacked-xxxx-for-fun-and-profit\/"},"wordCount":664,"commentCount":0,"publisher":{"@id":"https:\/\/bergee.it\/blog\/#\/schema\/person\/a37382384cc58e596119b1eec4869d73"},"image":{"@id":"https:\/\/bergee.it\/blog\/how-i-hacked-xxxx-for-fun-and-profit\/#primaryimage"},"thumbnailUrl":"https:\/\/bergee.it\/blog\/wp-content\/uploads\/2025\/02\/aaaaaaaaaaaaaa.jpg","keywords":["sql injection"],"articleSection":["vdp","write-up"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/bergee.it\/blog\/how-i-hacked-xxxx-for-fun-and-profit\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/bergee.it\/blog\/how-i-hacked-xxxx-for-fun-and-profit\/","url":"https:\/\/bergee.it\/blog\/how-i-hacked-xxxx-for-fun-and-profit\/","name":"How I hacked XXXX for fun and !profit - Bergee&#039;s Stories on Bug Hunting","isPartOf":{"@id":"https:\/\/bergee.it\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/bergee.it\/blog\/how-i-hacked-xxxx-for-fun-and-profit\/#primaryimage"},"image":{"@id":"https:\/\/bergee.it\/blog\/how-i-hacked-xxxx-for-fun-and-profit\/#primaryimage"},"thumbnailUrl":"https:\/\/bergee.it\/blog\/wp-content\/uploads\/2025\/02\/aaaaaaaaaaaaaa.jpg","datePublished":"2025-02-09T13:49:16+00:00","dateModified":"2026-04-27T20:18:25+00:00","breadcrumb":{"@id":"https:\/\/bergee.it\/blog\/how-i-hacked-xxxx-for-fun-and-profit\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bergee.it\/blog\/how-i-hacked-xxxx-for-fun-and-profit\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/bergee.it\/blog\/how-i-hacked-xxxx-for-fun-and-profit\/#primaryimage","url":"https:\/\/bergee.it\/blog\/wp-content\/uploads\/2025\/02\/aaaaaaaaaaaaaa.jpg","contentUrl":"https:\/\/bergee.it\/blog\/wp-content\/uploads\/2025\/02\/aaaaaaaaaaaaaa.jpg","width":1057,"height":455},{"@type":"BreadcrumbList","@id":"https:\/\/bergee.it\/blog\/how-i-hacked-xxxx-for-fun-and-profit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/bergee.it\/blog\/"},{"@type":"ListItem","position":2,"name":"How I hacked XXXX for fun and !profit"}]},{"@type":"WebSite","@id":"https:\/\/bergee.it\/blog\/#website","url":"https:\/\/bergee.it\/blog\/","name":"Bergee&#039;s Stories on Bug Hunting","description":"hacking, cyber security and programming","publisher":{"@id":"https:\/\/bergee.it\/blog\/#\/schema\/person\/a37382384cc58e596119b1eec4869d73"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bergee.it\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/bergee.it\/blog\/#\/schema\/person\/a37382384cc58e596119b1eec4869d73","name":"bergee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/bergee.it\/blog\/wp-content\/uploads\/2022\/08\/berdzi_drawing_150x150_x.png","url":"https:\/\/bergee.it\/blog\/wp-content\/uploads\/2022\/08\/berdzi_drawing_150x150_x.png","contentUrl":"https:\/\/bergee.it\/blog\/wp-content\/uploads\/2022\/08\/berdzi_drawing_150x150_x.png","width":129,"height":150,"caption":"bergee"},"logo":{"@id":"https:\/\/bergee.it\/blog\/wp-content\/uploads\/2022\/08\/berdzi_drawing_150x150_x.png"},"sameAs":["http:\/\/localhost\/wordpress","https:\/\/www.linkedin.com\/in\/bartlomiej-bergier","https:\/\/x.com\/https:\/\/twitter.com\/bergee"],"url":"https:\/\/bergee.it\/blog\/author\/bergee\/"}]}},"_links":{"self":[{"href":"https:\/\/bergee.it\/blog\/wp-json\/wp\/v2\/posts\/460","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bergee.it\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bergee.it\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bergee.it\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bergee.it\/blog\/wp-json\/wp\/v2\/comments?post=460"}],"version-history":[{"count":8,"href":"https:\/\/bergee.it\/blog\/wp-json\/wp\/v2\/posts\/460\/revisions"}],"predecessor-version":[{"id":477,"href":"https:\/\/bergee.it\/blog\/wp-json\/wp\/v2\/posts\/460\/revisions\/477"}],"wp:attachment":[{"href":"https:\/\/bergee.it\/blog\/wp-json\/wp\/v2\/media?parent=460"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bergee.it\/blog\/wp-json\/wp\/v2\/categories?post=460"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bergee.it\/blog\/wp-json\/wp\/v2\/tags?post=460"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}