{"id":14975,"date":"2024-02-22T02:57:46","date_gmt":"2024-02-22T02:57:46","guid":{"rendered":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/hacking-cryptography-attacks-tools-techniques-auh2024\/"},"modified":"2024-02-29T03:52:49","modified_gmt":"2024-02-29T03:52:49","slug":"hacking-cryptography-attacks-tools-techniques-auh2024","status":"publish","type":"product","link":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/hacking-cryptography-attacks-tools-techniques-auh2024\/","title":{"rendered":"Hacking Cryptography: Attacks, Tools &amp; Techniques"},"content":{"rendered":"<h4><strong><span style=\"color: #993300\">ATTEND IN-PERSON<\/span>: <\/strong><strong>Onsite at Abu Dhabi<\/strong><\/h4>\n<h4><strong>DATE: 25-27 Nov 2024<\/strong><\/h4>\n<h4><strong>TIME: 09:00 to 17:00 GST\/GMT+4<\/strong><\/h4>\n<table style=\"height: 146px\" width=\"599\">\n<tbody>\n<tr>\n<td><strong>Date<\/strong><\/td>\n<td><strong>Day<\/strong><\/td>\n<td style=\"text-align: left\"><strong>Time<\/strong><\/td>\n<td><strong>Duration<\/strong><\/td>\n<\/tr>\n<tr>\n<td>25 Nov<\/td>\n<td>Monday<\/td>\n<td>09:00 to 17:00 GST\/GMT+4<\/td>\n<td>8 Hours<\/td>\n<\/tr>\n<tr>\n<td>26 Nov<\/td>\n<td>Tuesday<\/td>\n<td>09:00 to 17:00 GST\/GMT+4<\/td>\n<td>8 Hours<\/td>\n<\/tr>\n<tr>\n<td>27 Nov<\/td>\n<td>Wednesday<\/td>\n<td>09:00 to 17:00 GST\/GMT+4<\/td>\n<td>8 Hours<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr \/>\n<div class=\"page\" title=\"Page 1\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h5>Crypto related bugs are super common. OWASP even ranks &#8220;Cryptographic Failure&#8221; as the second most common security vulnerability class in software. Yet, very often these vulnerabilities are overlooked by developers, code auditors, blue teamers and penetration testers alike. Because, let&#8217;s face it: Nobody knows how cryptography works.<\/h5>\n<p>During the course you will:<\/p>\n<ul>\n<li>Understand how modern cryptography works.<\/li>\n<li>Find common crypto vulnerabilities in real software.<\/li>\n<li>Write crypto exploits for real software (and an IoT device).<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>Using case studies from our own pentesting and red teaming engagements, we\u2019ll introduce core concepts of applied cryptography and how they fail in practice.<\/p>\n<p>At the end of the course you will be able to spot an exploitable crypto bug from miles away (and be able to avoid them yourself)! No prior knowledge required.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Key Learning Objectives<\/strong><\/p>\n<ul>\n<li>Learn how modern cryptography operates. Learn what kind of guarantees are given by certain primitives, and which aren&#8217;t.<\/li>\n<li>Understand how crypto primitives are combined into protocols.<\/li>\n<li>Learn how cryptography is often misused in practice and how this misuse can be exploited.<\/li>\n<li>Write exploits for systems using cryptography in an inappropriate way.<\/li>\n<li>Evaluate program code that uses cryptography for proper usage.<\/li>\n<li>Identify cryptographic schemes and potential vulnerabilities in black-box tests.<\/li>\n<\/ul>\n<div class=\"page\" title=\"Page 1\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<h5><\/h5>\n<h5><strong>Agenda<\/strong><\/h5>\n<div class=\"page\" title=\"Page 3\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h5><strong>Day 1:<\/strong><\/h5>\n<ul>\n<li><strong>Introduction to Cryptography<\/strong>\n<ul>\n<li>Basic Terminology<\/li>\n<li>Security Guarantees<\/li>\n<li>Composition of Primitives<\/li>\n<\/ul>\n<\/li>\n<li><strong>Attack Categorization<\/strong>\n<ul>\n<li>Security Objectives and Their Relation to Cryptography<\/li>\n<li>Attack Categorization<\/li>\n<\/ul>\n<\/li>\n<li><strong>Working with Crypto Tools<\/strong>\n<ul>\n<li>Introduction to Cyber Chef<\/li>\n<li>Crypto tools: CryCry Toolkit and OpenSSL<\/li>\n<li>Challenge Lab: CryCry, OpenSSL and Cyber Chef<\/li>\n<\/ul>\n<\/li>\n<li><strong>Hacking Encryption<\/strong>\n<ul>\n<li>Stream Ciphers\n<ul>\n<li>Introduction to Stream Ciphers<\/li>\n<li>Real World Examples of Vulnerabilities<\/li>\n<li>Attacks on Stream Cipher Uses<\/li>\n<li>Challenge Lab: (Ab)using Stream Ciphers<\/li>\n<\/ul>\n<\/li>\n<li>Block Ciphers\n<ul>\n<li>Introduction to Block Ciphers<\/li>\n<li>Modes of Operation<\/li>\n<li>Real World Examples of Vulnerabilities<\/li>\n<li>Attacks on Block Cipher Uses<\/li>\n<li>Challenge Lab: (Ab)using Block Ciphers<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><strong>Hash Functions<\/strong>\n<ul>\n<li>Introduction to Hash Functions<\/li>\n<li>Real World Examples of Vulnerabilities<\/li>\n<li>Password Storage &amp; Cracking<\/li>\n<li>Challenge Lab: (Ab)using Hash Functions and PW Cracking<\/li>\n<\/ul>\n<\/li>\n<li><strong>Message Authentication Codes and Authenticated Encryption<\/strong>\n<ul>\n<li>Introduction to Message Authentication Codes<\/li>\n<li>Pitfalls on trivial constructions<\/li>\n<li>Real World Examples of Vulnerabilities<\/li>\n<li>Challenge Lab: (Ab)using MACs and AuthEnc<\/li>\n<\/ul>\n<\/li>\n<li><strong>Attacks on Entropy and Randomness<\/strong>\n<ul>\n<li>Generating Secure Keys with OS Entropy Pools<\/li>\n<li>Misuse of Pseudo Random Number Generators<\/li>\n<li>Backdoors and Cleptography<\/li>\n<li>Real World Examples of Vulnerabilities<\/li>\n<li>Challenge Lab: Keys and Randomness<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<div class=\"page\" title=\"Page 4\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h5>Day 2:<\/h5>\n<ul>\n<li><strong>Asymmetric Crypto with RSA and ECC<\/strong>\n<ul>\n<li>Introduction to RSA and ECC<\/li>\n<li>Key Formats<\/li>\n<li>Key Sizes and Brute Force<\/li>\n<li>Real World Examples of Vulnerabilities<\/li>\n<li>Challenge Lab: RSA and ECC<\/li>\n<\/ul>\n<\/li>\n<li><strong>Public Key Infrastructure and Certificates<\/strong>\n<ul>\n<li>Introduction to Certificates<\/li>\n<li>x509 Certificate Structure and Features<\/li>\n<li>Common Certificate Pitfalls<\/li>\n<li>Chain of Trust and PKI services<\/li>\n<li>TOFU Principle and Man-In-The-Middle Threats<\/li>\n<li>Challenge Lab: Certificates and PubKeys<\/li>\n<\/ul>\n<\/li>\n<li><strong>TLS and Man in the Middle<\/strong>\n<ul>\n<li>Introduction to TLS and similar protocols<\/li>\n<li>TLS Security parameters<\/li>\n<li>Exploiting a Man-In-The-Middle position for TLS and VPN<\/li>\n<li>Intercepting and Decrypting TLS Traffic for Application Testing<\/li>\n<li>Defeat Public Key Pinning with Dynamic instrumentation<\/li>\n<li>Challenge Lab: Intercepting TLS<\/li>\n<\/ul>\n<\/li>\n<li><strong>JWTs and JOSE<\/strong>\n<ul>\n<li>Introduction to JSON Web Tokens and Javascript Object Signing and Encryption<\/li>\n<li>Real World Examples of Vulnerabilities<\/li>\n<li>Challenge Lab: Exploiting JWT<\/li>\n<\/ul>\n<\/li>\n<li><strong>Passkeys, WebAuthn, FIDO and 2nd Factor Solutions<\/strong>\n<ul>\n<li>Introduction to Password-Less Authentication<\/li>\n<li>TOTP Algorithms and Seeds<\/li>\n<li>Passkeys, FIDO2 and WebAuthn<\/li>\n<li>Footguns and Examples of Vulnerabilities<\/li>\n<\/ul>\n<\/li>\n<li><strong>Post-Quantum Cryptography<\/strong>\n<ul>\n<li>Introduction to Post-Quantum Algorithms<\/li>\n<li>Post-Quantum Signatures and KEMs<\/li>\n<li>Upcoming Post-Quantum Standards<\/li>\n<li>Challenge Lab: Using OpenSSL with Post-Quantum (20 min)<\/li>\n<\/ul>\n<\/li>\n<li><strong>Farewell<\/strong>\n<ul>\n<li>Outlook on future developments<\/li>\n<li>Presentation of Take Home Challenges<\/li>\n<li>Recap &#8211; Cryptography<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>ATTEND IN-PERSON: Onsite at Abu Dhabi DATE: 25-27 Nov 2024 TIME: 09:00 to 17:00 GST\/GMT+4 Date Day Time Duration 25 Nov Monday 09:00 to 17:00 GST\/GMT+4 8 Hours 26 Nov Tuesday 09:00 to 17:00 GST\/GMT+4 8 Hours 27 Nov Wednesday 09:00 to 17:00 GST\/GMT+4 8 Hours Crypto related bugs are super common. OWASP even ranks [&hellip;]<\/p>\n","protected":false},"featured_media":14974,"template":"","meta":{"_acf_changed":false},"product_cat":[61,90,92,57],"product_tag":[],"class_list":{"0":"post-14975","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-3-day-training","7":"product_cat-auh2024","8":"product_cat-auh2024-training","9":"product_cat-in-person","11":"first","12":"outofstock","13":"featured","14":"shipping-taxable","15":"purchasable","16":"product-type-simple"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Hacking Cryptography: Attacks, Tools &amp; Techniques - HITBSecConf2024 - Abu Dhabi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/hacking-cryptography-attacks-tools-techniques-auh2024\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hacking Cryptography: Attacks, Tools &amp; Techniques - HITBSecConf2024 - Abu Dhabi\" \/>\n<meta property=\"og:description\" content=\"ATTEND IN-PERSON: Onsite at Abu Dhabi DATE: 25-27 Nov 2024 TIME: 09:00 to 17:00 GST\/GMT+4 Date Day Time Duration 25 Nov Monday 09:00 to 17:00 GST\/GMT+4 8 Hours 26 Nov Tuesday 09:00 to 17:00 GST\/GMT+4 8 Hours 27 Nov Wednesday 09:00 to 17:00 GST\/GMT+4 8 Hours Crypto related bugs are super common. OWASP even ranks [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/hacking-cryptography-attacks-tools-techniques-auh2024\/\" \/>\n<meta property=\"og:site_name\" content=\"HITBSecConf2024 - Abu Dhabi\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-29T03:52:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-content\/uploads\/sites\/23\/2024\/02\/Hacking-Cryptography-ruben-product-photo.png\" \/>\n\t<meta property=\"og:image:width\" content=\"540\" \/>\n\t<meta property=\"og:image:height\" content=\"670\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/hacking-cryptography-attacks-tools-techniques-auh2024\/\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/hacking-cryptography-attacks-tools-techniques-auh2024\/\",\"name\":\"Hacking Cryptography: Attacks, Tools &amp; Techniques - HITBSecConf2024 - Abu Dhabi\",\"isPartOf\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/hacking-cryptography-attacks-tools-techniques-auh2024\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/hacking-cryptography-attacks-tools-techniques-auh2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-content\/uploads\/sites\/23\/2024\/02\/Hacking-Cryptography-ruben-product-photo.png\",\"datePublished\":\"2024-02-22T02:57:46+00:00\",\"dateModified\":\"2024-02-29T03:52:49+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/hacking-cryptography-attacks-tools-techniques-auh2024\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/hacking-cryptography-attacks-tools-techniques-auh2024\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/hacking-cryptography-attacks-tools-techniques-auh2024\/#primaryimage\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-content\/uploads\/sites\/23\/2024\/02\/Hacking-Cryptography-ruben-product-photo.png\",\"contentUrl\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-content\/uploads\/sites\/23\/2024\/02\/Hacking-Cryptography-ruben-product-photo.png\",\"width\":540,\"height\":670},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/hacking-cryptography-attacks-tools-techniques-auh2024\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Shop\",\"item\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/shop\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Hacking Cryptography: Attacks, Tools &amp; Techniques\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/#website\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/\",\"name\":\"HITBSecConf2024 - Abu Dhabi\",\"description\":\"Nov 25 - 28, Abu Dhabi, UAE\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hacking Cryptography: Attacks, Tools &amp; Techniques - HITBSecConf2024 - Abu Dhabi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/hacking-cryptography-attacks-tools-techniques-auh2024\/","og_locale":"en_US","og_type":"article","og_title":"Hacking Cryptography: Attacks, Tools &amp; Techniques - HITBSecConf2024 - Abu Dhabi","og_description":"ATTEND IN-PERSON: Onsite at Abu Dhabi DATE: 25-27 Nov 2024 TIME: 09:00 to 17:00 GST\/GMT+4 Date Day Time Duration 25 Nov Monday 09:00 to 17:00 GST\/GMT+4 8 Hours 26 Nov Tuesday 09:00 to 17:00 GST\/GMT+4 8 Hours 27 Nov Wednesday 09:00 to 17:00 GST\/GMT+4 8 Hours Crypto related bugs are super common. OWASP even ranks [&hellip;]","og_url":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/hacking-cryptography-attacks-tools-techniques-auh2024\/","og_site_name":"HITBSecConf2024 - Abu Dhabi","article_modified_time":"2024-02-29T03:52:49+00:00","og_image":[{"width":540,"height":670,"url":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-content\/uploads\/sites\/23\/2024\/02\/Hacking-Cryptography-ruben-product-photo.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/hacking-cryptography-attacks-tools-techniques-auh2024\/","url":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/hacking-cryptography-attacks-tools-techniques-auh2024\/","name":"Hacking Cryptography: Attacks, Tools &amp; Techniques - HITBSecConf2024 - Abu Dhabi","isPartOf":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/hacking-cryptography-attacks-tools-techniques-auh2024\/#primaryimage"},"image":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/hacking-cryptography-attacks-tools-techniques-auh2024\/#primaryimage"},"thumbnailUrl":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-content\/uploads\/sites\/23\/2024\/02\/Hacking-Cryptography-ruben-product-photo.png","datePublished":"2024-02-22T02:57:46+00:00","dateModified":"2024-02-29T03:52:49+00:00","breadcrumb":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/hacking-cryptography-attacks-tools-techniques-auh2024\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/hacking-cryptography-attacks-tools-techniques-auh2024\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/hacking-cryptography-attacks-tools-techniques-auh2024\/#primaryimage","url":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-content\/uploads\/sites\/23\/2024\/02\/Hacking-Cryptography-ruben-product-photo.png","contentUrl":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-content\/uploads\/sites\/23\/2024\/02\/Hacking-Cryptography-ruben-product-photo.png","width":540,"height":670},{"@type":"BreadcrumbList","@id":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/hacking-cryptography-attacks-tools-techniques-auh2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/"},{"@type":"ListItem","position":2,"name":"Shop","item":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/shop\/"},{"@type":"ListItem","position":3,"name":"Hacking Cryptography: Attacks, Tools &amp; Techniques"}]},{"@type":"WebSite","@id":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/#website","url":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/","name":"HITBSecConf2024 - Abu Dhabi","description":"Nov 25 - 28, Abu Dhabi, UAE","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-json\/wp\/v2\/product\/14975"}],"collection":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-json\/wp\/v2\/media\/14974"}],"wp:attachment":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-json\/wp\/v2\/media?parent=14975"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-json\/wp\/v2\/product_cat?post=14975"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-json\/wp\/v2\/product_tag?post=14975"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}