{"id":11736,"date":"2023-03-20T08:28:51","date_gmt":"2023-03-20T08:28:51","guid":{"rendered":"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/deep-dive-into-threat-hunting-purple-teaming-hitb2023hkt\/"},"modified":"2023-07-07T07:19:09","modified_gmt":"2023-07-07T07:19:09","slug":"deep-dive-into-threat-hunting-purple-teaming-hitb2023hkt","status":"publish","type":"product","link":"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/deep-dive-into-threat-hunting-purple-teaming-hitb2023hkt\/","title":{"rendered":"Deep Dive Into Threat Hunting &amp; Purple Teaming"},"content":{"rendered":"<h4><strong><span style=\"color: #993300\">ATTEND IN-PERSON<\/span>: Onsite in Phuket<\/strong><\/h4>\n<h4><strong>DATE: 21-24 August 2023<\/strong><\/h4>\n<h4><strong>TIME: 09:00 to 17:00 ICT\/GMT+7<\/strong><\/h4>\n<table style=\"height: 146px\" width=\"599\">\n<tbody>\n<tr>\n<td><strong>Date<\/strong><\/td>\n<td><strong>Day<\/strong><\/td>\n<td style=\"text-align: left\"><strong>Time<\/strong><\/td>\n<td><strong>Duration<\/strong><\/td>\n<\/tr>\n<tr>\n<td>21 Aug<\/td>\n<td>Monday<\/td>\n<td>0900-17:00 ICT\/GMT+7<\/td>\n<td>8 Hours<\/td>\n<\/tr>\n<tr>\n<td>22 Aug<\/td>\n<td>Tuesday<\/td>\n<td>0900-17:00 ICT\/GMT+7<\/td>\n<td>8 Hours<\/td>\n<\/tr>\n<tr>\n<td>23 Aug<\/td>\n<td>Wednesday<\/td>\n<td>0900-17:00 ICT\/GMT+7<\/td>\n<td>8 Hours<\/td>\n<\/tr>\n<tr>\n<td>24 Aug<\/td>\n<td>Thursday<\/td>\n<td>0900-17:00 ICT\/GMT+7<\/td>\n<td>8 Hours<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr \/>\n<h5>With the rise of APT attacks and targeted ransomware attacks, there\u2019s a huge need for in-depth investigation &amp; threat hunting skills to detect these attacks early on before the cost of the breach gets tripled every day.<\/h5>\n<p>In this training, you will learn how real APT attacks and targeted attacks work, how to in-depth investigation through collecting key artifacts, performing live forensics, memory forensics, and how to automate this across the whole enterprise in Powershell.<\/p>\n<p>As well, you will learn how to perform threat hunting based on the MITRE ATT&amp;CK framework and powered by threat intelligence. Not the Attackers&#8217; IoCs but their tactics, techniques and procedures<\/p>\n<p>&nbsp;<\/p>\n<h5><strong>Agenda<\/strong><\/h5>\n<h5>DAY 1<\/h5>\n<p><strong>Intro to APT Attacks &amp; MITRE ATT&amp;CK<\/strong><br \/>\n\u2022 What is an APT Attack?<br \/>\n\u2022 review over the kill chain<br \/>\n\u2022 MITRE ATT&amp;CK map with techniques and sub techniques<br \/>\n\u2022 Examples of real APT Attack<br \/>\n\u2022 Red Team Tools &amp; Frameworks (PowerSploit, Powershell EMPIRE, Cobalt Strike, Metasploit, Kali Linux)<\/p>\n<p><strong>Intro to Incident Response &amp; Threat Hunting<\/strong><br \/>\n\u2022 The Incident Response Lifecycle<br \/>\n\u2022 how attacks are being discovered (SOC, 3rd party &amp; threat hunting)<br \/>\n\u2022 Security Controls and types of logs in an organization<br \/>\n\u2022 What&#8217;s Threat hunting &amp; why threat hunting?<br \/>\n\u2022 Types of Threat hunting<br \/>\n\u2022 The threat hunting process step by step<br \/>\n\u2022 Intelligence-based Threat hunting<\/p>\n<p><strong>Building Your Purple Team Cloud Lab<\/strong><br \/>\n\u2022 Build Your honeypot Domain in the Cloud (AWS &amp; Terraform)<br \/>\n\u2022 Intro to Threat Hunting ELK (HELK) for Log Analysis<br \/>\n\u2022 Intro to Atomic Red Team For Purple Teaming<br \/>\n\u2022 Intro to Caldera For Advanced Red Teaming Activities<br \/>\n\u2022 Access The Lab (Hands-on)<\/p>\n<p><strong>Initial Access &amp; Log Analysis:<\/strong><br \/>\n\u2022 Spearphishing Attacks with malicious attachment<br \/>\n\u2022 Spearphishing attacks with links<br \/>\n\u2022 Spearphishing attacks using social media<br \/>\n\u2022 Credential pharming<br \/>\n\u2022 Detecting Spearphishing using EDR Logs<br \/>\n\u2022 Advanced execution techniques<br \/>\n\u2022 Analyze attacks using sysmon &amp; Splunk (Hands-on)<br \/>\n\u2022 Convert your threat hunting hypothesis into an alert<br \/>\n\u2022 Write your own SIGMA rules (Hands-on)<\/p>\n<p>&nbsp;<\/p>\n<h5>DAY 2:<\/h5>\n<p><strong>Packet Analysis &amp; Malware Exfiltration:<\/strong><br \/>\n\u2022 Hunting the evil in packets<br \/>\n\u2022 Hunting for Malware Exfiltration methods<br \/>\n\u2022 Hunting for Downloaders, malicious documents, exploits and others<br \/>\n\u2022 Detecting IP Flux, DNS Flux, DNS over HTTPS<br \/>\n\u2022 Malicious bits transfer, malware communicating through legitimate websites<br \/>\n\u2022 Detecting peer-to-peer communication, Remote COM Objects and suspicious RDP Tunneling<br \/>\n\u2022 Hands-on analysis using Wireshark &amp; Microsoft Network Monitor<br \/>\n\u2022 Hunting the evil in Zeek logs<br \/>\n\u2022 In-Depth Packet Investigation using Zeek logs (Hand-on)<\/p>\n<p><strong>Malware In-Depth &amp; Malware Functionalities<\/strong><br \/>\n\u2022 Types of Malware<br \/>\n\u2022 Malware Functionalities in-depth: Downloaders &amp; Droppers<br \/>\n\u2022 Malware Functionalities in-depth: Keyloggers<br \/>\n\u2022 Malware Functionalities in-depth: Banking Trojans &amp; Man-In-The-Browser<br \/>\n\u2022 Malware Functionalities in-depth: Ransomware<br \/>\n\u2022 Basic Static Analysis: Strings<br \/>\n\u2022 Basic Static Analysis: APIs<br \/>\n\u2022 Basic Static Analysis: Packing &amp; Obfuscation<br \/>\n\u2022 Write Your Own Yara Rule<\/p>\n<p><strong>Maintaining Persistence In-Depth (Advanced Techniques)<\/strong><br \/>\n\u2022 Maintain Persistence in the victim machine<br \/>\n\u2022 Advanced Persistence methods<br \/>\n\u2022 Disguise the malware inside a legitimate process (Malware-as-a-DLL)<br \/>\n\u2022 Persistence through DLL Injection<\/p>\n<h5>DAY 3:<\/h5>\n<p><strong>In Depth Investigation &amp; Forensics<\/strong><br \/>\n\u2022 Why in-depth investigation?<br \/>\n\u2022 Detecting malware persistence: Autoruns registry keys and options<br \/>\n\u2022 Detecting malware persistence: Scheduled tasks and jobs<br \/>\n\u2022 Detecting malware persistence: BITs jobs<br \/>\n\u2022 Detecting malware persistence: Image File Execution Options &amp; File Association<br \/>\n\u2022 Detecting Malware &amp; Malicious Documents Execution (Prefetch, MRU, Shims \u2026 etc)<br \/>\n\u2022 $MFT structure and cavity searching<br \/>\n\u2022 How to perform Forensics Triage With KAPE (Hands-on)<\/p>\n<p><strong>Malware Defense Evasion Techniques<\/strong><br \/>\n\u2022 Process Injection (DLL &amp; Shellcode Injection)<br \/>\n\u2022 Advanced Process Injection (APC Queue Injection)<br \/>\n\u2022 Network Defense Evasion: HTML Smuggling<br \/>\n\u2022 Network Defense Evasion: Legitimate Websites<br \/>\n\u2022 Network Defense Evasion: Cohort Channels<br \/>\n\u2022 Use of legitimate applications for Applocker bypass<br \/>\n\u2022 Detecting &amp; preventing the abuse of the legitimate applications<br \/>\n\u2022 Sysmon &amp; EDR Bypass Techniques<\/p>\n<p><strong>Memory Forensics<\/strong><br \/>\n\u2022 Intro to Memory Forensics &amp; Volatility<br \/>\n\u2022 Capture a full memory dump<br \/>\n\u2022 Extract suspicious &amp; hidden processes<br \/>\n\u2022 Detecting memory injection, process hollowing &amp; API hooking<br \/>\n\u2022 Detect suspicious network communication &amp; extract network packets<br \/>\n\u2022 Detect malware persistence Functionalities using registry hives<br \/>\n\u2022 Detect the initial access using Prefetch files &amp; MFT extraction<br \/>\n\u2022 Extract windows event logs from memory<\/p>\n<p>&nbsp;<\/p>\n<h5>DAY 4:<\/h5>\n<p><strong>Privilege Escalation Techniques<\/strong><br \/>\n\u2022 UAC bypass techniques<br \/>\n\u2022 Abuse services for privilege escalation<br \/>\n\u2022 DLL Order Hijacking<br \/>\n\u2022 Best practicies for detecting &amp; preventing privilege escalation<\/p>\n<p><strong>Incident Response in an Enterprise: Powershell Intro<\/strong><br \/>\n\u2022 Intro to Powershell<br \/>\n\u2022 Powershell Remoting<br \/>\n\u2022 Logon Types and Powershell vs RDP<br \/>\n\u2022 Collect &amp; Analyze Malicious Artifacts using Kansa<br \/>\n\u2022 Collect Minidumps using Powershell<br \/>\n\u2022 Detect suspicious processes using Powershell<br \/>\n\u2022 Automating Artifacts collection &amp; analysis for threat intelligence<\/p>\n<p><strong>Impersonating Users: Credential Theft &amp; Token Impersonalization <\/strong><br \/>\n\u2022 Detecting &amp; Hunting Lsass Memory dump<br \/>\n\u2022 Detecting &amp; Hunting Token Impersonation<br \/>\n\u2022 Hands-on AD Vulnerability Scanning using PingCastle<\/p>\n<p><strong>Detection &amp; Prevention Lateral Movements<\/strong><br \/>\n\u2022 Intro Authentication Mechanisms in Active Directory (NTLM &amp; Kerberos)<br \/>\n\u2022 Understand domain account permissions and access level<br \/>\n\u2022 NTLM Attacks: Pass The Hash<br \/>\n\u2022 Kerberos Attacks: Pass The Ticket<br \/>\n\u2022 Kerberos Attacks: Overpass The Hash<br \/>\n\u2022 Silver &amp; Golden Tickets and Kerberoasting Attacks<br \/>\n\u2022 Hardening Your AD (LAPS, gMSA \u2026 etc)<br \/>\n\u2022 Building a Secure Multi-Tiered Environment<\/p>\n","protected":false},"excerpt":{"rendered":"<p>ATTEND IN-PERSON: Onsite in Phuket DATE: 21-24 August 2023 TIME: 09:00 to 17:00 ICT\/GMT+7 Date Day Time Duration 21 Aug Monday 0900-17:00 ICT\/GMT+7 8 Hours 22 Aug Tuesday 0900-17:00 ICT\/GMT+7 8 Hours 23 Aug Wednesday 0900-17:00 ICT\/GMT+7 8 Hours 24 Aug Thursday 0900-17:00 ICT\/GMT+7 8 Hours With the rise of APT attacks and targeted ransomware [&hellip;]<\/p>\n","protected":false},"featured_media":11735,"template":"","meta":{"_acf_changed":false},"product_cat":[59,77,57],"product_tag":[],"class_list":{"0":"post-11736","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-4-day-training","7":"product_cat-hitb2023hkt","8":"product_cat-in-person","10":"first","11":"instock","12":"featured","13":"shipping-taxable","14":"purchasable","15":"product-type-simple"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Deep Dive Into Threat Hunting &amp; Purple Teaming - HITB (in)Cyber 2024 - Abu Dhabi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/deep-dive-into-threat-hunting-purple-teaming-hitb2023hkt\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Deep Dive Into Threat Hunting &amp; Purple Teaming - HITB (in)Cyber 2024 - Abu Dhabi\" \/>\n<meta property=\"og:description\" content=\"ATTEND IN-PERSON: Onsite in Phuket DATE: 21-24 August 2023 TIME: 09:00 to 17:00 ICT\/GMT+7 Date Day Time Duration 21 Aug Monday 0900-17:00 ICT\/GMT+7 8 Hours 22 Aug Tuesday 0900-17:00 ICT\/GMT+7 8 Hours 23 Aug Wednesday 0900-17:00 ICT\/GMT+7 8 Hours 24 Aug Thursday 0900-17:00 ICT\/GMT+7 8 Hours With the rise of APT attacks and targeted ransomware [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/deep-dive-into-threat-hunting-purple-teaming-hitb2023hkt\/\" \/>\n<meta property=\"og:site_name\" content=\"HITB (in)Cyber 2024 - Abu Dhabi\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-07T07:19:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-content\/uploads\/sites\/21\/2023\/03\/3.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/deep-dive-into-threat-hunting-purple-teaming-hitb2023hkt\/\",\"url\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/deep-dive-into-threat-hunting-purple-teaming-hitb2023hkt\/\",\"name\":\"Deep Dive Into Threat Hunting &amp; Purple Teaming - HITB (in)Cyber 2024 - Abu Dhabi\",\"isPartOf\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/deep-dive-into-threat-hunting-purple-teaming-hitb2023hkt\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/deep-dive-into-threat-hunting-purple-teaming-hitb2023hkt\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-content\/uploads\/sites\/21\/2023\/03\/3.jpg\",\"datePublished\":\"2023-03-20T08:28:51+00:00\",\"dateModified\":\"2023-07-07T07:19:09+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/deep-dive-into-threat-hunting-purple-teaming-hitb2023hkt\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/deep-dive-into-threat-hunting-purple-teaming-hitb2023hkt\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/deep-dive-into-threat-hunting-purple-teaming-hitb2023hkt\/#primaryimage\",\"url\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-content\/uploads\/sites\/21\/2023\/03\/3.jpg\",\"contentUrl\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-content\/uploads\/sites\/21\/2023\/03\/3.jpg\",\"width\":1200,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/deep-dive-into-threat-hunting-purple-teaming-hitb2023hkt\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Shop\",\"item\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/shop\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Deep Dive Into Threat Hunting &amp; Purple Teaming\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/#website\",\"url\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/\",\"name\":\"HITB (in)Cyber 2024 - Abu Dhabi\",\"description\":\"May 14 - 16, Etihad Arena \",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Deep Dive Into Threat Hunting &amp; Purple Teaming - HITB (in)Cyber 2024 - Abu Dhabi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/deep-dive-into-threat-hunting-purple-teaming-hitb2023hkt\/","og_locale":"en_US","og_type":"article","og_title":"Deep Dive Into Threat Hunting &amp; Purple Teaming - HITB (in)Cyber 2024 - Abu Dhabi","og_description":"ATTEND IN-PERSON: Onsite in Phuket DATE: 21-24 August 2023 TIME: 09:00 to 17:00 ICT\/GMT+7 Date Day Time Duration 21 Aug Monday 0900-17:00 ICT\/GMT+7 8 Hours 22 Aug Tuesday 0900-17:00 ICT\/GMT+7 8 Hours 23 Aug Wednesday 0900-17:00 ICT\/GMT+7 8 Hours 24 Aug Thursday 0900-17:00 ICT\/GMT+7 8 Hours With the rise of APT attacks and targeted ransomware [&hellip;]","og_url":"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/deep-dive-into-threat-hunting-purple-teaming-hitb2023hkt\/","og_site_name":"HITB (in)Cyber 2024 - Abu Dhabi","article_modified_time":"2023-07-07T07:19:09+00:00","og_image":[{"width":1200,"height":900,"url":"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-content\/uploads\/sites\/21\/2023\/03\/3.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/deep-dive-into-threat-hunting-purple-teaming-hitb2023hkt\/","url":"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/deep-dive-into-threat-hunting-purple-teaming-hitb2023hkt\/","name":"Deep Dive Into Threat Hunting &amp; Purple Teaming - HITB (in)Cyber 2024 - Abu Dhabi","isPartOf":{"@id":"https:\/\/conference.hitb.org\/hitbincyber2024\/#website"},"primaryImageOfPage":{"@id":"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/deep-dive-into-threat-hunting-purple-teaming-hitb2023hkt\/#primaryimage"},"image":{"@id":"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/deep-dive-into-threat-hunting-purple-teaming-hitb2023hkt\/#primaryimage"},"thumbnailUrl":"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-content\/uploads\/sites\/21\/2023\/03\/3.jpg","datePublished":"2023-03-20T08:28:51+00:00","dateModified":"2023-07-07T07:19:09+00:00","breadcrumb":{"@id":"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/deep-dive-into-threat-hunting-purple-teaming-hitb2023hkt\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conference.hitb.org\/hitbincyber2024\/product\/deep-dive-into-threat-hunting-purple-teaming-hitb2023hkt\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/deep-dive-into-threat-hunting-purple-teaming-hitb2023hkt\/#primaryimage","url":"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-content\/uploads\/sites\/21\/2023\/03\/3.jpg","contentUrl":"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-content\/uploads\/sites\/21\/2023\/03\/3.jpg","width":1200,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/deep-dive-into-threat-hunting-purple-teaming-hitb2023hkt\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conference.hitb.org\/hitbincyber2024\/"},{"@type":"ListItem","position":2,"name":"Shop","item":"https:\/\/conference.hitb.org\/hitbincyber2024\/shop\/"},{"@type":"ListItem","position":3,"name":"Deep Dive Into Threat Hunting &amp; Purple Teaming"}]},{"@type":"WebSite","@id":"https:\/\/conference.hitb.org\/hitbincyber2024\/#website","url":"https:\/\/conference.hitb.org\/hitbincyber2024\/","name":"HITB (in)Cyber 2024 - Abu Dhabi","description":"May 14 - 16, Etihad Arena ","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conference.hitb.org\/hitbincyber2024\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-json\/wp\/v2\/product\/11736"}],"collection":[{"href":"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-json\/wp\/v2\/media\/11735"}],"wp:attachment":[{"href":"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-json\/wp\/v2\/media?parent=11736"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-json\/wp\/v2\/product_cat?post=11736"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-json\/wp\/v2\/product_tag?post=11736"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}