{"id":10,"date":"2025-01-06T17:33:27","date_gmt":"2025-01-06T17:33:27","guid":{"rendered":"https:\/\/nomadsec.io\/blog\/?p=10"},"modified":"2026-05-07T18:34:00","modified_gmt":"2026-05-07T18:34:00","slug":"the-power-of-doubt-a-red-team-triumph-in-social-engineering","status":"publish","type":"post","link":"https:\/\/nomadsec.io\/blog\/2025\/01\/06\/the-power-of-doubt-a-red-team-triumph-in-social-engineering\/","title":{"rendered":"The Power of Doubt: A Red Team Triumph in Social Engineering"},"content":{"rendered":"<p>In the world of cybersecurity, the battle often begins and ends with human behavior. During a recent physical penetration test against a major enterprise, two Nomad Security red team operators demonstrated just how critical\u2014and precarious\u2014this human element can be. This is their story of gaining access to one of the most secure areas of the organization, and how three near-captures turned into opportunities for triumph.<\/p>\n<h2 id=\"the-test-begins-entry-by-confidence\"><strong>The Test Begins: Entry by Confidence<\/strong><\/h2>\n<p>The operation started at the organization&#8217;s sprawling headquarters, a fortress of badge readers, biometric locks, and eagle-eyed security personnel. Our mission was clear: simulate the tactics of a determined adversary to test the organization&#8217;s physical and digital security. The end goal? Gaining access to the secure datacenter housing critical servers.<\/p>\n<p>The first challenge was gaining access to the building itself. The team opted for a common but effective tactic: tailgating. By lingering near the main entrance during a busy period, they waited for an employee to hold the door open out of courtesy. A smile, a quick &#8220;Thanks!&#8221; and they were in.<\/p>\n<p>But their luck almost ran out early. A sharp-eyed receptionist called out to them, &#8220;Excuse me, do you have an appointment?&#8221; One operator, carrying a clipboard and wearing a generic company-branded shirt, responded, &#8220;Oh, we\u2019re just here to inspect the HVAC system\u2014we\u2019ve been called to check on some irregular noise complaints. Is that not on the log?&#8221; Their casual tone and confident demeanor diffused the situation, and the receptionist, clearly busy, waved them on.<\/p>\n<h2 id=\"close-call-1-too-close-for-comfort\"><strong>Close Call #1: Too Close for Comfort<\/strong><\/h2>\n<p>Once inside, the operators headed toward the elevator banks. A security guard intercepted them, asking to see badges. This was their first real test.<\/p>\n<p>\u201cOh shoot,\u201d said one operator, patting his pockets. \u201cI think I left it on my desk. Can we go back to our floor to grab it?\u201d<\/p>\n<p>The guard frowned but seemed reluctant to make a scene. \u201cWhat floor are you on?\u201d<\/p>\n<p>\u201cSeventh,\u201d the operator replied confidently, using the generic layout knowledge gathered during reconnaissance. The guard begrudgingly swiped them through the elevator bank, muttering something about checking later. Another hurdle cleared\u2014thanks to the natural human inclination to avoid unnecessary conflict.<\/p>\n<h2 id=\"close-call-2-the-janitor%E2%80%99s-closet-incident\"><strong>Close Call #2: The Janitor\u2019s Closet Incident<\/strong><\/h2>\n<p>On the seventh floor, the team\u2019s goal was to locate a workstation left unlocked or with weak credentials to escalate privileges. They discovered an unattended janitor\u2019s closet, perfect for staging their gear and reviewing their next moves. Unfortunately, their activity drew the attention of a passing employee who stopped and asked, \u201cWhat are you guys doing in there?\u201d<\/p>\n<p>Quick thinking saved the day. One operator waved a rag, saying, \u201cSpill in the hallway. Just grabbing supplies.\u201d Despite the presence of two laptops and unloaded backpacks spilling electronic gear across the table, the employee hesitated but moved on, perhaps uncomfortable pressing further. This moment was another reminder of how often people choose to give strangers the benefit of the doubt rather than risk confrontation.<\/p>\n<h2 id=\"the-culmination-biometric-access-achieved\"><strong>The Culmination: Biometric Access Achieved<\/strong><\/h2>\n<p>The team\u2019s ultimate goal was the datacenter on the lower level, secured with biometric locks. To gain access, they needed domain admin credentials and the biometric data of an authorized custodian. They had identified a likely target during reconnaissance: a mid-level IT administrator whose workstation was located across the hall from the datacenter.<\/p>\n<p>Using a compromised password obtained through an NTLM Relay attack that was later cracked offline (a classic yet all-too-common vulnerability), they gained access to the administrator\u2019s workstation. From there, they escalated privileges to domain admin, allowing them to manipulate the biometric authentication database. They copied and supplemented the custodian\u2019s biometric data with their own using the fingerprint scanner at the custodian&#8217;s workstation left unattended during their lunch break.<\/p>\n<p>Armed with fake biometric credentials, they made their way to the datacenter. The biometric reader scanned one operator\u2019s fingerprint\u2014and granted access. They were in.<\/p>\n<h2 id=\"close-call-3-the-final-challenge\"><strong>Close Call #3: The Final Challenge<\/strong><\/h2>\n<p>As they entered the datacenter, they had several free minutes to walk down the aisles of servers, capturing pictures of themselves as evidence of their presence. Once they had sufficiently proven they had unrestricted access, they turned to exit. Just in that moment, a security officer patrolling the area spotted them. \u201cWhat are you doing here?\u201d he demanded. The operators, anticipating this scenario, played innocent. \u201cSorry, we are here to replace some air filters for the ducts, but I think we took a wrong turn.\u201d<\/p>\n<p>The officer escorted them out but didn\u2019t raise an alarm. By the time anyone thought to verify their story, the team had gathered the evidence they needed and left the premises.<\/p>\n<h2 id=\"lessons-learned-the-power-of-awareness\"><strong>Lessons Learned: The Power of Awareness<\/strong><\/h2>\n<p>This test revealed the significant gaps in the organization\u2019s physical security, most of which stemmed from human behavior. The operators were caught red-handed three times, yet not once did anyone escalate the issue. Instead, each encounter ended with the employees assuming innocence or ignorance.<\/p>\n<p>Key takeaways:<\/p>\n<ol>\n<li><strong>Train Employees to Act on Doubts:<\/strong> Employees must understand the importance of reporting suspicious behavior, even if they\u2019re unsure. Encourage a \u201csee something, say something\u201d culture.<\/li>\n<li><strong>Empower Employees to Escalate:<\/strong> Provide clear protocols for reporting and following up on potential security incidents.<\/li>\n<li><strong>Regular Drills and Reinforcement:<\/strong> Conduct regular social engineering drills to test and reinforce employees\u2019 vigilance and response protocols.<\/li>\n<li><strong>Strengthen Physical Security Measures:<\/strong> Implement stricter access controls and ensure employees are trained to verify credentials without hesitation.<\/li>\n<\/ol>\n<p>This operation underscores an essential truth: technology alone can\u2019t protect an organization. People are the first line of defense\u2014and the weakest link. Only by fostering a culture of awareness and accountability can businesses truly fortify their security.<\/p>\n<p>At Nomad Security, we don\u2019t just find vulnerabilities\u2014we help organizations build stronger defenses. Because in the end, it\u2019s not just about testing your systems; it\u2019s about empowering your people.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the world of cybersecurity, the battle often begins and ends with human behavior. During a recent physical penetration test against a major enterprise, two Nomad Security red team operators demonstrated just how critical\u2014and precarious\u2014this human element can be. This is their story of gaining access to one of the most secure areas of the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[24,34,10,33],"tags":[3],"class_list":["post-10","post","type-post","status-publish","format-standard","hentry","category-advisory","category-engagements","category-offensive-security","category-pentest","tag-hacking"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Power of Doubt: A Red Team Triumph in Social Engineering - The Horizon Dispatch<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nomadsec.io\/blog\/2025\/01\/06\/the-power-of-doubt-a-red-team-triumph-in-social-engineering\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Power of Doubt: A Red Team Triumph in Social Engineering - The Horizon Dispatch\" \/>\n<meta property=\"og:description\" content=\"In the world of cybersecurity, the battle often begins and ends with human behavior. During a recent physical penetration test against a major enterprise, two Nomad Security red team operators demonstrated just how critical\u2014and precarious\u2014this human element can be. This is their story of gaining access to one of the most secure areas of the [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nomadsec.io\/blog\/2025\/01\/06\/the-power-of-doubt-a-red-team-triumph-in-social-engineering\/\" \/>\n<meta property=\"og:site_name\" content=\"The Horizon Dispatch\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-06T17:33:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-07T18:34:00+00:00\" \/>\n<meta name=\"author\" content=\"nomadsec\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@nomadsec_io\" \/>\n<meta name=\"twitter:site\" content=\"@nomadsec_io\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"nomadsec\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nomadsec.io\\\/blog\\\/2025\\\/01\\\/06\\\/the-power-of-doubt-a-red-team-triumph-in-social-engineering\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nomadsec.io\\\/blog\\\/2025\\\/01\\\/06\\\/the-power-of-doubt-a-red-team-triumph-in-social-engineering\\\/\"},\"author\":{\"name\":\"nomadsec\",\"@id\":\"https:\\\/\\\/nomadsec.io\\\/blog\\\/#\\\/schema\\\/person\\\/3de6ea5b8ec6b473ca61974c11db0bfd\"},\"headline\":\"The Power of Doubt: A Red Team Triumph in Social Engineering\",\"datePublished\":\"2025-01-06T17:33:27+00:00\",\"dateModified\":\"2026-05-07T18:34:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nomadsec.io\\\/blog\\\/2025\\\/01\\\/06\\\/the-power-of-doubt-a-red-team-triumph-in-social-engineering\\\/\"},\"wordCount\":990,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nomadsec.io\\\/blog\\\/#organization\"},\"keywords\":[\"Hacking\"],\"articleSection\":[\"Advisory\",\"Engagements\",\"Offensive Security\",\"Pentest\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nomadsec.io\\\/blog\\\/2025\\\/01\\\/06\\\/the-power-of-doubt-a-red-team-triumph-in-social-engineering\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nomadsec.io\\\/blog\\\/2025\\\/01\\\/06\\\/the-power-of-doubt-a-red-team-triumph-in-social-engineering\\\/\",\"url\":\"https:\\\/\\\/nomadsec.io\\\/blog\\\/2025\\\/01\\\/06\\\/the-power-of-doubt-a-red-team-triumph-in-social-engineering\\\/\",\"name\":\"The Power of Doubt: A Red Team Triumph in Social Engineering - The Horizon Dispatch\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nomadsec.io\\\/blog\\\/#website\"},\"datePublished\":\"2025-01-06T17:33:27+00:00\",\"dateModified\":\"2026-05-07T18:34:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nomadsec.io\\\/blog\\\/2025\\\/01\\\/06\\\/the-power-of-doubt-a-red-team-triumph-in-social-engineering\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nomadsec.io\\\/blog\\\/2025\\\/01\\\/06\\\/the-power-of-doubt-a-red-team-triumph-in-social-engineering\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nomadsec.io\\\/blog\\\/2025\\\/01\\\/06\\\/the-power-of-doubt-a-red-team-triumph-in-social-engineering\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nomadsec.io\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Power of Doubt: A Red Team Triumph in Social Engineering\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nomadsec.io\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/nomadsec.io\\\/blog\\\/\",\"name\":\"The Horizon Dispatch\",\"description\":\"Field reports from working operators.\",\"publisher\":{\"@id\":\"https:\\\/\\\/nomadsec.io\\\/blog\\\/#organization\"},\"alternateName\":\"Nomad Security\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nomadsec.io\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nomadsec.io\\\/blog\\\/#organization\",\"name\":\"The Horizon Dispatch\",\"alternateName\":\"Nomad Security\",\"url\":\"https:\\\/\\\/nomadsec.io\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nomadsec.io\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nomadsec.io\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/cropped-logo-trans.png\",\"contentUrl\":\"https:\\\/\\\/nomadsec.io\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/cropped-logo-trans.png\",\"width\":190,\"height\":190,\"caption\":\"The Horizon Dispatch\"},\"image\":{\"@id\":\"https:\\\/\\\/nomadsec.io\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/nomadsec_io\",\"https:\\\/\\\/bsky.app\\\/profile\\\/nomadsec.io\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/nomadsec\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nomadsec.io\\\/blog\\\/#\\\/schema\\\/person\\\/3de6ea5b8ec6b473ca61974c11db0bfd\",\"name\":\"nomadsec\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/088d58a10bd97ee28c988477af74b81f3c02dbd8cc6bee2782717b907a5b6ff6?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/088d58a10bd97ee28c988477af74b81f3c02dbd8cc6bee2782717b907a5b6ff6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/088d58a10bd97ee28c988477af74b81f3c02dbd8cc6bee2782717b907a5b6ff6?s=96&d=mm&r=g\",\"caption\":\"nomadsec\"},\"sameAs\":[\"https:\\\/\\\/nomadsec.io\\\/blog\"],\"url\":\"https:\\\/\\\/nomadsec.io\\\/blog\\\/author\\\/nomadsec\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Power of Doubt: A Red Team Triumph in Social Engineering - The Horizon Dispatch","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nomadsec.io\/blog\/2025\/01\/06\/the-power-of-doubt-a-red-team-triumph-in-social-engineering\/","og_locale":"en_US","og_type":"article","og_title":"The Power of Doubt: A Red Team Triumph in Social Engineering - The Horizon Dispatch","og_description":"In the world of cybersecurity, the battle often begins and ends with human behavior. During a recent physical penetration test against a major enterprise, two Nomad Security red team operators demonstrated just how critical\u2014and precarious\u2014this human element can be. This is their story of gaining access to one of the most secure areas of the [&hellip;]","og_url":"https:\/\/nomadsec.io\/blog\/2025\/01\/06\/the-power-of-doubt-a-red-team-triumph-in-social-engineering\/","og_site_name":"The Horizon Dispatch","article_published_time":"2025-01-06T17:33:27+00:00","article_modified_time":"2026-05-07T18:34:00+00:00","author":"nomadsec","twitter_card":"summary_large_image","twitter_creator":"@nomadsec_io","twitter_site":"@nomadsec_io","twitter_misc":{"Written by":"nomadsec","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nomadsec.io\/blog\/2025\/01\/06\/the-power-of-doubt-a-red-team-triumph-in-social-engineering\/#article","isPartOf":{"@id":"https:\/\/nomadsec.io\/blog\/2025\/01\/06\/the-power-of-doubt-a-red-team-triumph-in-social-engineering\/"},"author":{"name":"nomadsec","@id":"https:\/\/nomadsec.io\/blog\/#\/schema\/person\/3de6ea5b8ec6b473ca61974c11db0bfd"},"headline":"The Power of Doubt: A Red Team Triumph in Social Engineering","datePublished":"2025-01-06T17:33:27+00:00","dateModified":"2026-05-07T18:34:00+00:00","mainEntityOfPage":{"@id":"https:\/\/nomadsec.io\/blog\/2025\/01\/06\/the-power-of-doubt-a-red-team-triumph-in-social-engineering\/"},"wordCount":990,"commentCount":0,"publisher":{"@id":"https:\/\/nomadsec.io\/blog\/#organization"},"keywords":["Hacking"],"articleSection":["Advisory","Engagements","Offensive Security","Pentest"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nomadsec.io\/blog\/2025\/01\/06\/the-power-of-doubt-a-red-team-triumph-in-social-engineering\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nomadsec.io\/blog\/2025\/01\/06\/the-power-of-doubt-a-red-team-triumph-in-social-engineering\/","url":"https:\/\/nomadsec.io\/blog\/2025\/01\/06\/the-power-of-doubt-a-red-team-triumph-in-social-engineering\/","name":"The Power of Doubt: A Red Team Triumph in Social Engineering - The Horizon Dispatch","isPartOf":{"@id":"https:\/\/nomadsec.io\/blog\/#website"},"datePublished":"2025-01-06T17:33:27+00:00","dateModified":"2026-05-07T18:34:00+00:00","breadcrumb":{"@id":"https:\/\/nomadsec.io\/blog\/2025\/01\/06\/the-power-of-doubt-a-red-team-triumph-in-social-engineering\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nomadsec.io\/blog\/2025\/01\/06\/the-power-of-doubt-a-red-team-triumph-in-social-engineering\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/nomadsec.io\/blog\/2025\/01\/06\/the-power-of-doubt-a-red-team-triumph-in-social-engineering\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nomadsec.io\/blog\/"},{"@type":"ListItem","position":2,"name":"The Power of Doubt: A Red Team Triumph in Social Engineering"}]},{"@type":"WebSite","@id":"https:\/\/nomadsec.io\/blog\/#website","url":"https:\/\/nomadsec.io\/blog\/","name":"The Horizon Dispatch","description":"Field reports from working operators.","publisher":{"@id":"https:\/\/nomadsec.io\/blog\/#organization"},"alternateName":"Nomad Security","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nomadsec.io\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/nomadsec.io\/blog\/#organization","name":"The Horizon Dispatch","alternateName":"Nomad Security","url":"https:\/\/nomadsec.io\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nomadsec.io\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/nomadsec.io\/blog\/wp-content\/uploads\/2026\/01\/cropped-logo-trans.png","contentUrl":"https:\/\/nomadsec.io\/blog\/wp-content\/uploads\/2026\/01\/cropped-logo-trans.png","width":190,"height":190,"caption":"The Horizon Dispatch"},"image":{"@id":"https:\/\/nomadsec.io\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/nomadsec_io","https:\/\/bsky.app\/profile\/nomadsec.io","https:\/\/www.linkedin.com\/company\/nomadsec"]},{"@type":"Person","@id":"https:\/\/nomadsec.io\/blog\/#\/schema\/person\/3de6ea5b8ec6b473ca61974c11db0bfd","name":"nomadsec","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/088d58a10bd97ee28c988477af74b81f3c02dbd8cc6bee2782717b907a5b6ff6?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/088d58a10bd97ee28c988477af74b81f3c02dbd8cc6bee2782717b907a5b6ff6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/088d58a10bd97ee28c988477af74b81f3c02dbd8cc6bee2782717b907a5b6ff6?s=96&d=mm&r=g","caption":"nomadsec"},"sameAs":["https:\/\/nomadsec.io\/blog"],"url":"https:\/\/nomadsec.io\/blog\/author\/nomadsec\/"}]}},"_links":{"self":[{"href":"https:\/\/nomadsec.io\/blog\/wp-json\/wp\/v2\/posts\/10","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nomadsec.io\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nomadsec.io\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nomadsec.io\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nomadsec.io\/blog\/wp-json\/wp\/v2\/comments?post=10"}],"version-history":[{"count":1,"href":"https:\/\/nomadsec.io\/blog\/wp-json\/wp\/v2\/posts\/10\/revisions"}],"predecessor-version":[{"id":25,"href":"https:\/\/nomadsec.io\/blog\/wp-json\/wp\/v2\/posts\/10\/revisions\/25"}],"wp:attachment":[{"href":"https:\/\/nomadsec.io\/blog\/wp-json\/wp\/v2\/media?parent=10"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nomadsec.io\/blog\/wp-json\/wp\/v2\/categories?post=10"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nomadsec.io\/blog\/wp-json\/wp\/v2\/tags?post=10"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}