{"id":50352,"date":"2022-05-20T09:01:06","date_gmt":"2022-05-20T01:01:06","guid":{"rendered":"https:\/\/version-2.com.sg\/?p=50352"},"modified":"2022-08-19T15:17:00","modified_gmt":"2022-08-19T07:17:00","slug":"john-the-ripper-pt-3","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2022\/05\/john-the-ripper-pt-3\/","title":{"rendered":"John the Ripper Pt. 3"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"50352\" class=\"elementor elementor-50352\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4da8c5f9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4da8c5f9\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;decf9c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-133ba185\" data-id=\"133ba185\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fc2da8d post-content elementor-widget elementor-widget-text-editor\" data-id=\"fc2da8d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<style>\n.post-content h3, h4, h5 { color: #4c4ef0; }\n<\/style>\n\n<p align=\"center\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/uHI_5bthVn6QpKxUOf3BTtWEt-Egsr7wqoDlYaM3sJYIjgYmcGgegzdzmp5I2hYbwqeIUC1uIsM7NtnkLVqKmgrHWXpC1CnnPxKreDXL5f53sVZDuDIqyfEYv0uG28RVSTSCp8Mp?tr=w-1800,c-at_max\" alt=\"\" width=\"958\" height=\"auto\"><\/p>\n\n<h3 style=\"font-size: 24px;\"><strong><span>Intro<\/span><\/strong><\/h3>\n<p><span style=\"font-size: 16px;\"><span>It should come as no surprise that John can also deal with .zip and .rar archives. John does this by leveraging the <\/span><strong><span>zip2john<\/span><\/strong><span> and <\/span><strong><span>rar2john<\/span><\/strong><span> utilities, built in the tool, so that it can ingest something that it will know how to use. The syntax is pretty much the same, and by now, you should be quite familiar with it; still, we will use this article to show some examples of how we can make our .zip and .rar archives John-ready. As we will see, this is akin to the <\/span><strong><span>unshadow <\/span><\/strong><span>tool we\u2019ve used previously.<\/span><\/span><\/p>\n<h3 style=\"font-size: 24px;\"><strong><span>zip2john<\/span><\/strong><\/h3>\n<p><span style=\"font-size: 16px;\"><span>As mentioned, similar to <\/span><em><span>unshadow<\/span><\/em><span>, John has the inbuilt tool that\u2019s called <\/span><strong><span>zip2john<\/span><\/strong><span>, which we use to convert our target .zip archive into a format john will know what to do with, and, we hope, crack successfully.<\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 16px;\">The basic syntax looks something like this:<\/span><\/p>\n<p style=\"text-align: center;\"><span style=\"font-size: 16px;\"><strong><span>zip2john [target_zip_file] &gt; [output_file]<\/span><\/strong><\/span><\/p>\n<p><span style=\"font-size: 16px;\">Flags:<\/span><\/p>\n<p><span style=\"font-size: 16px;\"><strong><span>target_zip_file<\/span><\/strong><span> \u2013 this is the path to our password protected protected .zip archive<\/span><\/span><\/p>\n<p><span style=\"font-size: 16px;\"><strong><span>&gt;<\/span><\/strong><span> &#8211; greater than sign which redirects our command results to a specified output file<\/span><\/span><\/p>\n<p><span style=\"font-size: 16px;\"><strong><span>output_file<\/span><\/strong><span> \u2013 in this file we store our output<\/span><\/span><\/p>\n<p><span style=\"font-size: 16px;\">So, our command will look something like this:<\/span><\/p>\n<p style=\"text-align: center;\"><span style=\"font-size: 16px;\"><strong><span>zip2john target_archive.zip &gt; zip_hash.txt<\/span><\/strong><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 16px;\">Once we\u2019ve successfully obtained the zip_hash.txt output file, we simply supply it to John. And yes, we can use the wordlists too. Thus, we just had a couple of extra steps before we return to using John as we\u2019ve already learned previously.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 16px;\">More simply put, we can say to John, something like this:<\/span><\/p>\n<p style=\"text-align: center;\"><span style=\"font-size: 16px;\"><strong><span>john \u2013wordlist=\/usr\/share\/wordlists\/rockyou.txt zip_hash.txt<\/span><\/strong><\/span><\/p>\n<p><span style=\"font-size: 16px;\">As you can see, this is something that we\u2019ve already learned, and we\u2019ve just used the zip2john utility to prepare our archive for John to work with.&nbsp;<\/span><\/p>\n<p><span style=\"font-size: 16px;\">Let\u2019s quickly cover rar2john next, and then we will go over some examples.<\/span><\/p>\n\n<h3 style=\"font-size: 24px;\"><strong><span>rar2john<\/span><\/strong><\/h3>\n<p><span style=\"font-size: 16px;\">The same as zip files, rar can also compress various files and folders. It does so by using the Winrar archive manager.<\/span><\/p>\n<p><span style=\"font-size: 16px;\">We use it in the same way as zip2john. First, we use rar2john to make the .rar archive ready for John \u2013 by obtaining its hash, then we supply the said hash to John to try and crack it.<\/span><\/p>\n<p><span style=\"font-size: 16px;\">The syntax is the same as for zip2john:<\/span><\/p>\n<p style=\"text-align: center;\"><span style=\"font-size: 16px;\"><strong><span>rar2john [target_rar_file] &gt; [output_file]<\/span><\/strong><\/span><\/p>\n<p><span style=\"font-size: 16px;\">Flags:<\/span><\/p>\n<p><span style=\"font-size: 16px;\"><strong><span>target_rar_file<\/span><\/strong><span> \u2013 this is the path to our password protected protected ..rar archive<\/span><\/span><\/p>\n<p><span style=\"font-size: 16px;\"><strong><span>&gt;<\/span><\/strong><span> &#8211; greater than sign which redirects our command results to a specified output file<\/span><\/span><\/p>\n<p><span style=\"font-size: 16px;\"><strong><span>output_file<\/span><\/strong><span> \u2013 in this file we store our output<\/span><\/span><\/p>\n<p><span style=\"font-size: 16px;\">It will look something like this:<\/span><\/p>\n<p style=\"text-align: center;\"><span style=\"font-size: 16px;\"><strong><span>rar2john rar_archive.rar &gt; rar_hash.txt<\/span><\/strong><\/span><\/p>\n<p><span style=\"font-size: 16px;\"><span>Now we just use John, the way we\u2019ve learned, giving it our <\/span><em><span>rar_hash.txt<\/span><\/em><span> file:<\/span><\/span><\/p>\n<p style=\"text-align: center;\"><span style=\"font-size: 16px;\"><strong><span>john \u2013wordlist=\/usr\/share\/wordlists\/rockyou.txt rar_hash.txt<\/span><\/strong><\/span><\/p>\n\n<h3 style=\"font-size: 18px;\"><strong><span>Examples<\/span><\/strong><\/h3>\n<p><span style=\"font-size: 16px;\">Now that we\u2019ve covered some basic stuff, let\u2019s look at some examples.<\/span><\/p>\n<p><br><span style=\"font-size: 16px;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/T5EUXnt6mU0EyOddslSMA0R32ftwnMlsES6sbIc6F7Lf9Cvpr9KJEJOzMXAwc_x9v_v5cumOszYaQPAsGYTLpYC8QOMh16zRlm-FDEmvHGOvXHWTx_yFhZBItEDLG_MKuZHFIuuZ\" width=\"368\" height=\"179\"><\/span><\/p>\n<p><span style=\"font-size: 16px;\"><span>We have a .zip archive, called <\/span><strong><span>testZip1.zip <\/span><\/strong><span>with three files inside, called <\/span><strong><span>pass.txt<\/span><\/strong><span>, <\/span><strong><span>sop.txt<\/span><\/strong><span>, and <\/span><strong><span>supersecret.txt.<\/span><\/strong><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 16px;\"><span>To digress for a bit: it would be terrible if we saw something like this on our test, as an attacker. The naming convention here in our article is there for our convenience and illustrative purposes. Nobody should have a file called <\/span><strong><span>sop.txt<\/span><\/strong><span> (which usually stands for standard operating procedure). <\/span><strong><span>Pass.txt<\/span><\/strong><span> and <\/span><strong><span>supersecret.txt<\/span><\/strong><span> even less so, for obvious reasons.<\/span><\/span><\/p>\n<p><span style=\"font-size: 16px;\">Going back to our .zip cracking, we give John a command asking it to make an output file it can understand, and try to crack it. (image below)<\/span><\/p>\n<p><br><span style=\"font-size: 16px;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/3YpMe97c9onNAzX2xP2pIP_bckYs4Zu5VnwbYCv2zXihZTxSc5KfFBrxQd5jMNVBpShBTiJ93pr-MwCC7khnf10Cyy4Rk_CIIKzFDCKLjMhF-80oOWRu2TcKtn2pXqPnyaJcf0wg\" width=\"512\" height=\"272\"><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 16px;\">We just gave John our output file (in this case test1.hashes), and it cracked our password. Note that you can make your output file to be of any format, for further processing\/manipulation. Use what makes the most sense for your purposes.<\/span><\/p>\n<p><span style=\"font-size: 16px;\">Since we have our password, we show it with John, and try to open our password protected archive, which prompts us:<\/span><\/p>\n<p><br><span style=\"font-size: 16px;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/xlPYFjQNW81sAq5wtjP2ICMZ3NDDWfWULUae0kb2qZS46TqfbKF6ip3VkMUf_72zAtUgBij5y8a_9qmTiXEm-9a2D72dcOtkiY_Cz_-14cMFmgXv6cwgshlHnF6Soz3H13Cg6xIJ\" width=\"538\" height=\"226\"><\/span><br><br><br><\/p>\n<p><span style=\"font-size: 16px;\">Finally, we have our cracked .zip archive, and contents opened, of one of the files:<\/span><\/p>\n<p><br><span style=\"font-size: 16px;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/n9BYq-1ixUbnstNqjyEwlhPBnN8jG2n3RRPe1UcWl1bKDSuVQRVKrhH9wcI0seD036CrgVlS-xp46RUW6aWNFW63QQ6KKVHTk3yBD6e56EWvrQoAbXJ4x8TJV3x-YnmB64TPEpDs\" width=\"320\" height=\"267\"><\/span><\/p>\n<p><span style=\"font-size: 16px;\">Let\u2019s look at some more examples.<\/span><\/p>\n<p><br><span style=\"font-size: 16px;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/7D1-JqYtZdZbF3JKi9jNLzuF4DY0NYZ5Ik9fdj-fyHHBoUB_OBSYmKZ7VQHkC_4C5IbIlMJOogNyfD4dSLTjlkGPTYqF7rDkalOsX_G8lCuxnIuy3hUzpQoa9_l3Tg8HfbYcJROM\" width=\"341\" height=\"321\"><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 16px;\"><span>We password protect our .rar archive, called <\/span><strong><span>safe.rar<\/span><\/strong><span>, as we can see \u2013 password is <\/span><strong><em><span>password1<\/span><\/em><\/strong><span>. Inside, we have put two files, called <\/span><strong><em><span>pass.txt<\/span><\/em><\/strong><span>, and <\/span><strong><em><span>pass2.txt<\/span><\/em><\/strong><span>, respectively. We now need to make something John can use, out of our .rar archive:<\/span><\/span><\/p>\n<p><br><span style=\"font-size: 16px;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/yyW9wAlsc8xUJdhyiZrsCLe9WvLFmt9V813PnWwgu3kHdCeQnKKKiU4X9fNd-akKJ_AiJZ-ttGY3-hjxpMRLlCQEYJS5oosx-DoZp6gWnXsB7_60o4Mv5_JQG2m-ptDWLG-TKC0v\" width=\"271\" height=\"42\"><\/span><\/p>\n<p><span style=\"font-size: 16px;\"><span>Now we ask John to crack our new file, called <\/span><strong><em><span>rar_cracked.hash<\/span><\/em><\/strong><strong><span>, <\/span><\/strong><span>for demonstration, we passed no arguments\/options to John first.<\/span><\/span><\/p>\n<p><br><span style=\"font-size: 16px;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/LtzpGL1p3dLqPUfJzEeAXwaM4QPLw5APPiiRGAbTn5nnSExKd1Bm2ORaDxBGTfQ08b3LVAzncv7_c6P6B54WBRY0gIvSwe1_-ixgNoD4JwQHwoA5HepUQo2nYpHmOqWbRVz-0iZh\" width=\"464\" height=\"320\"><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 16px;\">When we ask John to crack something, without giving other arguments, it will go through the default modes, with their default settings. (That\u2019s why it started with single crack mode first, in the image above)<\/span><\/p>\n<p><span style=\"font-size: 16px;\"><span>Since we know our password is really weak, and we don\u2019t want to wait that much, we use our trusty <\/span><strong><em><span>rockyou.txt<\/span><\/em><\/strong><span> wordlist:<\/span><\/span><\/p>\n<p><br><span style=\"font-size: 16px;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/uHI_5bthVn6QpKxUOf3BTtWEt-Egsr7wqoDlYaM3sJYIjgYmcGgegzdzmp5I2hYbwqeIUC1uIsM7NtnkLVqKmgrHWXpC1CnnPxKreDXL5f53sVZDuDIqyfEYv0uG28RVSTSCp8Mp\" width=\"474\" height=\"172\"><\/span><\/p>\n<p><span style=\"font-size: 16px;\"><span>Our wordlist mode works immediately, giving us the password we were looking for \u2013 <\/span><strong><em><span>password1<\/span><\/em><\/strong><span>, as shown above.<\/span><\/span><\/p>\n<p><span style=\"font-size: 16px;\">We then try to open our archive, finally:<\/span><\/p>\n<p><br><span style=\"font-size: 16px;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/pPH6wBqNpv2cPnGCjhPojJVAZgL0X_r13_JKbJowL1cveFGqS14N3jpiWyUAyctIEbLFNxetrsdGslZdCxFfV8fJGg-90j50kZQkJnJCU7_VrM8F2y6vIE8-71shNTxXuHN4DO8o\" width=\"360\" height=\"215\"><\/span><\/p>\n<p><span style=\"font-size: 16px;\"><span>As we can see, we get a popup saying we need to enter our password to access <\/span><strong><em><span>safe.rar<\/span><\/em><\/strong><em><span>, <\/span><\/em><span>which we type in:<\/span><\/span><\/p>\n<p><br><span style=\"font-size: 16px;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/jWybYh_v7LoVAszWMAXEqQVuvQwNtjFvm7abfwaGKKItaFfQZNQOqGFeef190SAEqte8r7e2PR8Nw9Y9RS18CNPJF2FR83_lZmkiwSq0VcuGi-U3pakUaqB6HHaFBwlDGHDSXa_a\" width=\"252\" height=\"132\"><\/span><\/p>\n<p><span style=\"font-size: 16px;\">Et voila! We have managed to access the .rar archive:<\/span><\/p>\n<p><br><span style=\"font-size: 16px;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/HJD4_6WgSHT0rF29ePHUzXS7_ykJ4sdty65_zFRNKNkj5LHH6FVeTilen8rewW2pYtTpEFyEICzEHqKMu90_ylTSNPu461Ir3Yam5xGs3CmGD2uOVjrtH27hsculIECcb5ZkhVbt\" width=\"428\" height=\"387\"><\/span><\/p>\n<p><span style=\"font-size: 16px;\"><span>From the image above \u2013 two files, called <\/span><strong><em><span>pass.txt<\/span><\/em><\/strong><span> and <\/span><strong><em><span>pass2.txt<\/span><\/em><\/strong><span>, as mentioned previously \u2013 and their contents.<\/span><\/span><\/p>\n\n<h3 style=\"font-size: 24px;\"><strong><span>Conclusion<\/span><\/strong><\/h3>\n<p><span>We\u2019ve seen how we can use John to crack password protected .zip and .rar archives, and how it&#8217;s just one extra step after what we\u2019ve already covered previously. Please note, though, that we were using just the <\/span><strong><span>rockyou.txt <\/span><\/strong><span>wordlist in our examples, and there are many wordlists out there, of different sizes (which can definitely speed up your attempts), purpose\/type (why stop at passwords? We can also have URLs, web shells, fuzzing payloads, etc). Personally, I like to start off with the shortest wordlist that suits my particular need, as it is simply the fastest way. After that, if I don\u2019t crack anything, I can easily switch to some larger lists.<\/span><\/p>\n<p style=\"text-align: justify; font-size: 16px;\"><span>One awesome resource would be the <\/span><a href=\"https:\/\/www.openwall.com\/wordlists\/\" target=\"_blank\" rel=\"noopener\"><span><span style=\"font-size: 16px;\">Openwall wordlists<\/span><\/span><\/a><span> found on Openwall website \u2013 which is John the Ripper\u2019s original website. There you can find some publicly downloadable lists, as well as paid ones, which can dramatically increase your password recovery potential, as that particular collection has 20+ languages, over 40 million entries, and also has pre-applied mangling rules (in this way you can do other likely password variations \u2013 adding digits instead of words, capitalization, etc.)<\/span><\/p>\n<p style=\"text-align: justify; font-size: 16px;\"><span>Before finishing, we would like to add that the best way to get these materials to \u2018stick\u2019 is to go and try for yourself. So, go fire up a VM, make some archives, add some files to it, password protect it, and attempt to crack it! (Once you master the easy ones, like in our examples, it&#8217;s time to start attacking some more complex passwords, and that\u2019s where the greatest fun begins)<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8085a61 post-content elementor-widget elementor-widget-shortcode\" data-id=\"8085a61\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"39690\" class=\"elementor elementor-39690\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ff2a228 elementor-widget elementor-widget-text-editor\" data-id=\"ff2a228\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><\/p>\n<p><b>About VRX<\/b><br><b>VRX&nbsp;<\/b>is a consolidated vulnerability management platform that protects assets in real time. Its rich, integrated features efficiently pinpoint and remediate the largest risks to your cyber infrastructure. Resolve the most pressing threats with efficient automation features and precise contextual analysis.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Intro It should come as no surprise that John can also  [&hellip;]<\/p>","protected":false},"author":143524195,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[488,476,61],"tags":[477,489],"class_list":["post-50352","post","type-post","status-publish","format-standard","hentry","category-488","category-vrx","category-press-release","tag-vrx","tag-489"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>John the Ripper Pt. 3 - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.vicarius.io\/blog\/john-the-ripper-pt-3\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"John the Ripper Pt. 3 - Version 2\" \/>\n<meta property=\"og:description\" content=\"Intro It should come as no surprise that John can also [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.vicarius.io\/blog\/john-the-ripper-pt-3\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-20T01:01:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-19T07:17:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/lh3.googleusercontent.com\/uHI_5bthVn6QpKxUOf3BTtWEt-Egsr7wqoDlYaM3sJYIjgYmcGgegzdzmp5I2hYbwqeIUC1uIsM7NtnkLVqKmgrHWXpC1CnnPxKreDXL5f53sVZDuDIqyfEYv0uG28RVSTSCp8Mp?tr=w-1800,c-at_max\" \/>\n<meta name=\"author\" content=\"version2hk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"version2hk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.vicarius.io\\\/blog\\\/john-the-ripper-pt-3#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/05\\\/john-the-ripper-pt-3\\\/\"},\"author\":{\"name\":\"version2hk\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\"},\"headline\":\"John the Ripper Pt. 3\",\"datePublished\":\"2022-05-20T01:01:06+00:00\",\"dateModified\":\"2022-08-19T07:17:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/05\\\/john-the-ripper-pt-3\\\/\"},\"wordCount\":1172,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.vicarius.io\\\/blog\\\/john-the-ripper-pt-3#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/lh3.googleusercontent.com\\\/uHI_5bthVn6QpKxUOf3BTtWEt-Egsr7wqoDlYaM3sJYIjgYmcGgegzdzmp5I2hYbwqeIUC1uIsM7NtnkLVqKmgrHWXpC1CnnPxKreDXL5f53sVZDuDIqyfEYv0uG28RVSTSCp8Mp?tr=w-1800,c-at_max\",\"keywords\":[\"vRx\",\"2022\"],\"articleSection\":[\"2022\",\"vRx\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/05\\\/john-the-ripper-pt-3\\\/\",\"url\":\"https:\\\/\\\/www.vicarius.io\\\/blog\\\/john-the-ripper-pt-3\",\"name\":\"John the Ripper Pt. 3 - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.vicarius.io\\\/blog\\\/john-the-ripper-pt-3#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.vicarius.io\\\/blog\\\/john-the-ripper-pt-3#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/lh3.googleusercontent.com\\\/uHI_5bthVn6QpKxUOf3BTtWEt-Egsr7wqoDlYaM3sJYIjgYmcGgegzdzmp5I2hYbwqeIUC1uIsM7NtnkLVqKmgrHWXpC1CnnPxKreDXL5f53sVZDuDIqyfEYv0uG28RVSTSCp8Mp?tr=w-1800,c-at_max\",\"datePublished\":\"2022-05-20T01:01:06+00:00\",\"dateModified\":\"2022-08-19T07:17:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.vicarius.io\\\/blog\\\/john-the-ripper-pt-3#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.vicarius.io\\\/blog\\\/john-the-ripper-pt-3\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.vicarius.io\\\/blog\\\/john-the-ripper-pt-3#primaryimage\",\"url\":\"https:\\\/\\\/lh3.googleusercontent.com\\\/uHI_5bthVn6QpKxUOf3BTtWEt-Egsr7wqoDlYaM3sJYIjgYmcGgegzdzmp5I2hYbwqeIUC1uIsM7NtnkLVqKmgrHWXpC1CnnPxKreDXL5f53sVZDuDIqyfEYv0uG28RVSTSCp8Mp?tr=w-1800,c-at_max\",\"contentUrl\":\"https:\\\/\\\/lh3.googleusercontent.com\\\/uHI_5bthVn6QpKxUOf3BTtWEt-Egsr7wqoDlYaM3sJYIjgYmcGgegzdzmp5I2hYbwqeIUC1uIsM7NtnkLVqKmgrHWXpC1CnnPxKreDXL5f53sVZDuDIqyfEYv0uG28RVSTSCp8Mp?tr=w-1800,c-at_max\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.vicarius.io\\\/blog\\\/john-the-ripper-pt-3#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"John the Ripper Pt. 3\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\",\"name\":\"version2hk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"caption\":\"version2hk\"},\"sameAs\":[\"http:\\\/\\\/version2xfortcom.wordpress.com\"],\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/version2hk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"John the Ripper Pt. 3 - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.vicarius.io\/blog\/john-the-ripper-pt-3","og_locale":"en_US","og_type":"article","og_title":"John the Ripper Pt. 3 - Version 2","og_description":"Intro It should come as no surprise that John can also [&hellip;]","og_url":"https:\/\/www.vicarius.io\/blog\/john-the-ripper-pt-3","og_site_name":"Version 2","article_published_time":"2022-05-20T01:01:06+00:00","article_modified_time":"2022-08-19T07:17:00+00:00","og_image":[{"url":"https:\/\/lh3.googleusercontent.com\/uHI_5bthVn6QpKxUOf3BTtWEt-Egsr7wqoDlYaM3sJYIjgYmcGgegzdzmp5I2hYbwqeIUC1uIsM7NtnkLVqKmgrHWXpC1CnnPxKreDXL5f53sVZDuDIqyfEYv0uG28RVSTSCp8Mp?tr=w-1800,c-at_max","type":"","width":"","height":""}],"author":"version2hk","twitter_card":"summary_large_image","twitter_misc":{"Written by":"version2hk","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.vicarius.io\/blog\/john-the-ripper-pt-3#article","isPartOf":{"@id":"https:\/\/version-2.com\/2022\/05\/john-the-ripper-pt-3\/"},"author":{"name":"version2hk","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db"},"headline":"John the Ripper Pt. 3","datePublished":"2022-05-20T01:01:06+00:00","dateModified":"2022-08-19T07:17:00+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2022\/05\/john-the-ripper-pt-3\/"},"wordCount":1172,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.vicarius.io\/blog\/john-the-ripper-pt-3#primaryimage"},"thumbnailUrl":"https:\/\/lh3.googleusercontent.com\/uHI_5bthVn6QpKxUOf3BTtWEt-Egsr7wqoDlYaM3sJYIjgYmcGgegzdzmp5I2hYbwqeIUC1uIsM7NtnkLVqKmgrHWXpC1CnnPxKreDXL5f53sVZDuDIqyfEYv0uG28RVSTSCp8Mp?tr=w-1800,c-at_max","keywords":["vRx","2022"],"articleSection":["2022","vRx","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2022\/05\/john-the-ripper-pt-3\/","url":"https:\/\/www.vicarius.io\/blog\/john-the-ripper-pt-3","name":"John the Ripper Pt. 3 - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.vicarius.io\/blog\/john-the-ripper-pt-3#primaryimage"},"image":{"@id":"https:\/\/www.vicarius.io\/blog\/john-the-ripper-pt-3#primaryimage"},"thumbnailUrl":"https:\/\/lh3.googleusercontent.com\/uHI_5bthVn6QpKxUOf3BTtWEt-Egsr7wqoDlYaM3sJYIjgYmcGgegzdzmp5I2hYbwqeIUC1uIsM7NtnkLVqKmgrHWXpC1CnnPxKreDXL5f53sVZDuDIqyfEYv0uG28RVSTSCp8Mp?tr=w-1800,c-at_max","datePublished":"2022-05-20T01:01:06+00:00","dateModified":"2022-08-19T07:17:00+00:00","breadcrumb":{"@id":"https:\/\/www.vicarius.io\/blog\/john-the-ripper-pt-3#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.vicarius.io\/blog\/john-the-ripper-pt-3"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.vicarius.io\/blog\/john-the-ripper-pt-3#primaryimage","url":"https:\/\/lh3.googleusercontent.com\/uHI_5bthVn6QpKxUOf3BTtWEt-Egsr7wqoDlYaM3sJYIjgYmcGgegzdzmp5I2hYbwqeIUC1uIsM7NtnkLVqKmgrHWXpC1CnnPxKreDXL5f53sVZDuDIqyfEYv0uG28RVSTSCp8Mp?tr=w-1800,c-at_max","contentUrl":"https:\/\/lh3.googleusercontent.com\/uHI_5bthVn6QpKxUOf3BTtWEt-Egsr7wqoDlYaM3sJYIjgYmcGgegzdzmp5I2hYbwqeIUC1uIsM7NtnkLVqKmgrHWXpC1CnnPxKreDXL5f53sVZDuDIqyfEYv0uG28RVSTSCp8Mp?tr=w-1800,c-at_max"},{"@type":"BreadcrumbList","@id":"https:\/\/www.vicarius.io\/blog\/john-the-ripper-pt-3#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"John the Ripper Pt. 3"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db","name":"version2hk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","caption":"version2hk"},"sameAs":["http:\/\/version2xfortcom.wordpress.com"],"url":"https:\/\/version-2.com\/en\/author\/version2hk\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-d68","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/50352","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/143524195"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=50352"}],"version-history":[{"count":1,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/50352\/revisions"}],"predecessor-version":[{"id":50389,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/50352\/revisions\/50389"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=50352"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=50352"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=50352"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}