{"id":617,"date":"2022-09-06T15:48:51","date_gmt":"2022-09-06T10:18:51","guid":{"rendered":"https:\/\/legacit.com\/blog\/?p=617"},"modified":"2022-09-06T15:54:05","modified_gmt":"2022-09-06T10:24:05","slug":"dont-delay-do-website-security-testing-today","status":"publish","type":"post","link":"https:\/\/legacit.com\/blog\/dont-delay-do-website-security-testing-today\/","title":{"rendered":"Don\u2019t Delay, Do Website Security Testing Today!"},"content":{"rendered":"<h3><b>Website Security Testing<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Website security testing is a key part of developing secure web applications. This is performed by people or automated tools to discover vulnerabilities in websites and web apps. To reduce risk, developers and testers should follow best practices to develop and perform <a href=\"https:\/\/legacit.com\/blog\/what-is-web-application-security-testing-its-types-tips-for-testing\/\">website security testing<\/a>. Best practices include choosing a security testing framework, selecting the right <a href=\"https:\/\/legacit.com\/blog\/top-ten-mobile-app-testing-tools-enlisted\/\">tools<\/a>, and following a structured approach to identify vulnerabilities. The approach and results of testing should be documented so that organizations can assess the adequacy of their current security status and make improvements as needed.<\/span><\/p>\n<h3><b>Terms Associated with <a href=\"https:\/\/legacit.com\/blog\/the-much-crucial-web-application-security\/\">Website Security Testing<\/a><\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Vulnerability<\/b><span style=\"font-weight: 400;\">: Vulnerability refers to the weakness in the web app that is caused by bugs etc.\u00a0\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>URL Manipulation<\/b><span style=\"font-weight: 400;\">: Different web apps communicate added info between clients (browsers) and servers in the URL. Changing some info in URL(s) can at times result in an unexpected behavior at the server-end, which is termed URL manipulation.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>SQL Injection: <\/b><span style=\"font-weight: 400;\">The<\/span> <span style=\"font-weight: 400;\">process of inserting SQL statements through the web app\u2019s UI into some query, which is then executed by the server is called SQL injection.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Spoofing: <\/b><span style=\"font-weight: 400;\">This<\/span> <span style=\"font-weight: 400;\">means the formation of hoax look-alike emails as well as websites.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>XSS (i.e. Cross-Site Scripting)<\/b><span style=\"font-weight: 400;\">: When any user inserts an HTML\/client-side script into a web app&#8217;s UI, the insertion is visible to other users, which is known as XSS.<\/span><\/li>\n<\/ul>\n<h3><b>Website Security Testing Steps<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">A framework guides testers through a series of tasks to find vulnerabilities.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">A common framework includes initial reconnaissance, finding vulnerabilities in the target <a href=\"https:\/\/en.wikipedia.org\/wiki\/Website\">website<\/a>, exploitation, report writing, and cleanup.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">A test plan should include how the tester will access a website; typically by using their computer or a remote terminal via an application. Next, they will choose an appropriate tool for the task at hand.\u00a0\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">After that, steps should be taken to verify the vulnerability; generally by creating a test case with realistic settings for an attacker to utilize, and finally documenting findings for future reference.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The best practices dictate that organizations perform regular vulnerability scans with their chosen tool to keep components secure against zero-day vulnerabilities and advanced persistent threats (APTs).<\/span><\/li>\n<\/ul>\n<h3><b>Website Security Testing Approach<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">A tool makes life easier for testers by automatizing common tasks like generating reports or generating test cases based on inputs from testers. Pen tests are also useful when performing risk management since they can look for signs of malware in non-web systems such as mobile devices before these devices are connected to the internet via Wi-Fi at a coffee shop or airport terminal where end users expect to find internet connectivity but may instead find an insecure internal network hosting their personal business transactions via that same internal network\u2019s untrusted Wi-Fi access points. For performing result-oriented website security testing, a security tester must have sound knowledge of the HTTP protocol. It\u2019s also crucial to understand how the client (browser) and server communicate over HTTP. Also, testers should know at least the basics of SQL injection as well as XSS.<\/span><\/p>\n<h3><b>Methods for Website Security Testing<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Password cracking<\/b><span style=\"font-weight: 400;\">: Simple passwords are easy to crack. So, if some web app does not have a complex password, it is prone to quick password cracking.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>URL manipulation via HTTP GET method(s)<\/b><span style=\"font-weight: 400;\">: Testers much check is the app is passing significant info in the query string or not.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>SQL injection<\/b><span style=\"font-weight: 400;\">: Upon inserting a single quote (\u2018) in a textbox must be rejected by the app. If not, and if a database error is encountered, then the app can be prone to SQL injection.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>XSS<\/b><span style=\"font-weight: 400;\">: Testers must also check the web apps for XSS i.e. cross-site scripting.\u00a0<\/span><\/li>\n<\/ul>\n<h3><b>Legacit Website Security Testing <\/b><b>Services<\/b><\/h3>\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/legacit.com\/qa-and-testing-services.html\">Website security testing<\/a> is essential when developing secure websites since it allows developers and IT administrators to discover vulnerabilities before attackers do. It is essential to develop secure websites since they can discover weaknesses before these weaknesses compromise company data or allow attackers to have full control over company resources without detection until it\u2019s too late! You must avail of <a href=\"https:\/\/legacit.com\/contact-us.html\">Legacit<\/a> website security testing services today until it becomes too late for your organization!<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Website Security Testing Website security testing is a key part of developing secure web applications. This is performed by people or automated tools to discover vulnerabilities in websites and web apps. To reduce risk, developers and testers should follow best practices to develop and perform website security testing. Best practices include choosing a security testing framework, selecting the right tools, and following a structured approach to identify vulnerabilities. The approach and results of testing should be documented so that organizations can assess the adequacy of their current security status and make improvements as needed. Terms Associated with Website Security Testing Vulnerability: Vulnerability refers to the weakness in the web app that is caused by bugs etc.\u00a0\u00a0 URL Manipulation: Different web apps communicate added info between clients (browsers) and servers in the URL. Changing some info in URL(s) can at times [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":620,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-617","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v18.7 (Yoast SEO v24.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Don\u2019t Delay, Do Website Security Testing Today! - Legacit Infotech Pvt Ltd<\/title>\n<meta name=\"description\" content=\"Website security testing is essential when developing secure websites since it allows developers and IT administrators to discover vulnerabilities before attackers do.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/legacit.com\/blog\/dont-delay-do-website-security-testing-today\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Don\u2019t Delay, Do Website Security Testing Today!\" \/>\n<meta property=\"og:description\" content=\"Website security testing is essential when developing secure websites since it allows developers and IT administrators to discover vulnerabilities before attackers do.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/legacit.com\/blog\/dont-delay-do-website-security-testing-today\/\" \/>\n<meta property=\"og:site_name\" content=\"Legacit Infotech Pvt Ltd\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/legacit\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-06T10:18:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-06T10:24:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/legacit.com\/blog\/wp-content\/uploads\/2022\/09\/Legacit-Website-Security-Testing-Today-Blog-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1610\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"legacit\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"legacit\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/legacit.com\/blog\/dont-delay-do-website-security-testing-today\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/legacit.com\/blog\/dont-delay-do-website-security-testing-today\/\"},\"author\":{\"name\":\"legacit\",\"@id\":\"https:\/\/legacit.com\/blog\/#\/schema\/person\/02819527e1d7c6582caa7261d9c88428\"},\"headline\":\"Don\u2019t Delay, Do Website Security Testing Today!\",\"datePublished\":\"2022-09-06T10:18:51+00:00\",\"dateModified\":\"2022-09-06T10:24:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/legacit.com\/blog\/dont-delay-do-website-security-testing-today\/\"},\"wordCount\":687,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/legacit.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/legacit.com\/blog\/dont-delay-do-website-security-testing-today\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/legacit.com\/blog\/wp-content\/uploads\/2022\/09\/Legacit-Website-Security-Testing-Today-Blog-scaled.jpg\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/legacit.com\/blog\/dont-delay-do-website-security-testing-today\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/legacit.com\/blog\/dont-delay-do-website-security-testing-today\/\",\"url\":\"https:\/\/legacit.com\/blog\/dont-delay-do-website-security-testing-today\/\",\"name\":\"Don\u2019t Delay, Do Website Security Testing Today! - Legacit Infotech Pvt Ltd\",\"isPartOf\":{\"@id\":\"https:\/\/legacit.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/legacit.com\/blog\/dont-delay-do-website-security-testing-today\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/legacit.com\/blog\/dont-delay-do-website-security-testing-today\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/legacit.com\/blog\/wp-content\/uploads\/2022\/09\/Legacit-Website-Security-Testing-Today-Blog-scaled.jpg\",\"datePublished\":\"2022-09-06T10:18:51+00:00\",\"dateModified\":\"2022-09-06T10:24:05+00:00\",\"description\":\"Website security testing is essential when developing secure websites since it allows developers and IT administrators to discover vulnerabilities before attackers do.\",\"breadcrumb\":{\"@id\":\"https:\/\/legacit.com\/blog\/dont-delay-do-website-security-testing-today\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/legacit.com\/blog\/dont-delay-do-website-security-testing-today\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/legacit.com\/blog\/dont-delay-do-website-security-testing-today\/#primaryimage\",\"url\":\"https:\/\/legacit.com\/blog\/wp-content\/uploads\/2022\/09\/Legacit-Website-Security-Testing-Today-Blog-scaled.jpg\",\"contentUrl\":\"https:\/\/legacit.com\/blog\/wp-content\/uploads\/2022\/09\/Legacit-Website-Security-Testing-Today-Blog-scaled.jpg\",\"width\":2560,\"height\":1610},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/legacit.com\/blog\/dont-delay-do-website-security-testing-today\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/legacit.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Don\u2019t Delay, Do Website Security Testing Today!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/legacit.com\/blog\/#website\",\"url\":\"https:\/\/legacit.com\/blog\/\",\"name\":\"Legacit Infotech Pvt Ltd\",\"description\":\"Legacit Infotech Pvt Ltd\",\"publisher\":{\"@id\":\"https:\/\/legacit.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/legacit.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/legacit.com\/blog\/#organization\",\"name\":\"Legacit Infotech Pvt Ltd\",\"url\":\"https:\/\/legacit.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/legacit.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/legacit.com\/blog\/wp-content\/uploads\/2022\/06\/legacit-logo.png\",\"contentUrl\":\"https:\/\/legacit.com\/blog\/wp-content\/uploads\/2022\/06\/legacit-logo.png\",\"width\":248,\"height\":203,\"caption\":\"Legacit Infotech Pvt Ltd\"},\"image\":{\"@id\":\"https:\/\/legacit.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/legacit\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/legacit.com\/blog\/#\/schema\/person\/02819527e1d7c6582caa7261d9c88428\",\"name\":\"legacit\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/legacit.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/15a4987e03c7742e2a7376fc47bfa377b58a9614133d24305d1f58a325a4aead?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/15a4987e03c7742e2a7376fc47bfa377b58a9614133d24305d1f58a325a4aead?s=96&d=mm&r=g\",\"caption\":\"legacit\"},\"sameAs\":[\"https:\/\/legacit.com\/blog\/\"],\"url\":\"https:\/\/legacit.com\/blog\/author\/legacit\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Don\u2019t Delay, Do Website Security Testing Today! - Legacit Infotech Pvt Ltd","description":"Website security testing is essential when developing secure websites since it allows developers and IT administrators to discover vulnerabilities before attackers do.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/legacit.com\/blog\/dont-delay-do-website-security-testing-today\/","og_locale":"en_US","og_type":"article","og_title":"Don\u2019t Delay, Do Website Security Testing Today!","og_description":"Website security testing is essential when developing secure websites since it allows developers and IT administrators to discover vulnerabilities before attackers do.","og_url":"https:\/\/legacit.com\/blog\/dont-delay-do-website-security-testing-today\/","og_site_name":"Legacit Infotech Pvt Ltd","article_publisher":"https:\/\/www.facebook.com\/legacit","article_published_time":"2022-09-06T10:18:51+00:00","article_modified_time":"2022-09-06T10:24:05+00:00","og_image":[{"width":2560,"height":1610,"url":"https:\/\/legacit.com\/blog\/wp-content\/uploads\/2022\/09\/Legacit-Website-Security-Testing-Today-Blog-scaled.jpg","type":"image\/jpeg"}],"author":"legacit","twitter_card":"summary_large_image","twitter_misc":{"Written by":"legacit","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/legacit.com\/blog\/dont-delay-do-website-security-testing-today\/#article","isPartOf":{"@id":"https:\/\/legacit.com\/blog\/dont-delay-do-website-security-testing-today\/"},"author":{"name":"legacit","@id":"https:\/\/legacit.com\/blog\/#\/schema\/person\/02819527e1d7c6582caa7261d9c88428"},"headline":"Don\u2019t Delay, Do Website Security Testing Today!","datePublished":"2022-09-06T10:18:51+00:00","dateModified":"2022-09-06T10:24:05+00:00","mainEntityOfPage":{"@id":"https:\/\/legacit.com\/blog\/dont-delay-do-website-security-testing-today\/"},"wordCount":687,"commentCount":0,"publisher":{"@id":"https:\/\/legacit.com\/blog\/#organization"},"image":{"@id":"https:\/\/legacit.com\/blog\/dont-delay-do-website-security-testing-today\/#primaryimage"},"thumbnailUrl":"https:\/\/legacit.com\/blog\/wp-content\/uploads\/2022\/09\/Legacit-Website-Security-Testing-Today-Blog-scaled.jpg","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/legacit.com\/blog\/dont-delay-do-website-security-testing-today\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/legacit.com\/blog\/dont-delay-do-website-security-testing-today\/","url":"https:\/\/legacit.com\/blog\/dont-delay-do-website-security-testing-today\/","name":"Don\u2019t Delay, Do Website Security Testing Today! - Legacit Infotech Pvt Ltd","isPartOf":{"@id":"https:\/\/legacit.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/legacit.com\/blog\/dont-delay-do-website-security-testing-today\/#primaryimage"},"image":{"@id":"https:\/\/legacit.com\/blog\/dont-delay-do-website-security-testing-today\/#primaryimage"},"thumbnailUrl":"https:\/\/legacit.com\/blog\/wp-content\/uploads\/2022\/09\/Legacit-Website-Security-Testing-Today-Blog-scaled.jpg","datePublished":"2022-09-06T10:18:51+00:00","dateModified":"2022-09-06T10:24:05+00:00","description":"Website security testing is essential when developing secure websites since it allows developers and IT administrators to discover vulnerabilities before attackers do.","breadcrumb":{"@id":"https:\/\/legacit.com\/blog\/dont-delay-do-website-security-testing-today\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/legacit.com\/blog\/dont-delay-do-website-security-testing-today\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/legacit.com\/blog\/dont-delay-do-website-security-testing-today\/#primaryimage","url":"https:\/\/legacit.com\/blog\/wp-content\/uploads\/2022\/09\/Legacit-Website-Security-Testing-Today-Blog-scaled.jpg","contentUrl":"https:\/\/legacit.com\/blog\/wp-content\/uploads\/2022\/09\/Legacit-Website-Security-Testing-Today-Blog-scaled.jpg","width":2560,"height":1610},{"@type":"BreadcrumbList","@id":"https:\/\/legacit.com\/blog\/dont-delay-do-website-security-testing-today\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/legacit.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Don\u2019t Delay, Do Website Security Testing Today!"}]},{"@type":"WebSite","@id":"https:\/\/legacit.com\/blog\/#website","url":"https:\/\/legacit.com\/blog\/","name":"Legacit Infotech Pvt Ltd","description":"Legacit Infotech Pvt Ltd","publisher":{"@id":"https:\/\/legacit.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/legacit.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/legacit.com\/blog\/#organization","name":"Legacit Infotech Pvt Ltd","url":"https:\/\/legacit.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/legacit.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/legacit.com\/blog\/wp-content\/uploads\/2022\/06\/legacit-logo.png","contentUrl":"https:\/\/legacit.com\/blog\/wp-content\/uploads\/2022\/06\/legacit-logo.png","width":248,"height":203,"caption":"Legacit Infotech Pvt Ltd"},"image":{"@id":"https:\/\/legacit.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/legacit"]},{"@type":"Person","@id":"https:\/\/legacit.com\/blog\/#\/schema\/person\/02819527e1d7c6582caa7261d9c88428","name":"legacit","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/legacit.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/15a4987e03c7742e2a7376fc47bfa377b58a9614133d24305d1f58a325a4aead?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/15a4987e03c7742e2a7376fc47bfa377b58a9614133d24305d1f58a325a4aead?s=96&d=mm&r=g","caption":"legacit"},"sameAs":["https:\/\/legacit.com\/blog\/"],"url":"https:\/\/legacit.com\/blog\/author\/legacit\/"}]}},"_links":{"self":[{"href":"https:\/\/legacit.com\/blog\/wp-json\/wp\/v2\/posts\/617","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/legacit.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/legacit.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/legacit.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/legacit.com\/blog\/wp-json\/wp\/v2\/comments?post=617"}],"version-history":[{"count":1,"href":"https:\/\/legacit.com\/blog\/wp-json\/wp\/v2\/posts\/617\/revisions"}],"predecessor-version":[{"id":619,"href":"https:\/\/legacit.com\/blog\/wp-json\/wp\/v2\/posts\/617\/revisions\/619"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/legacit.com\/blog\/wp-json\/wp\/v2\/media\/620"}],"wp:attachment":[{"href":"https:\/\/legacit.com\/blog\/wp-json\/wp\/v2\/media?parent=617"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/legacit.com\/blog\/wp-json\/wp\/v2\/categories?post=617"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/legacit.com\/blog\/wp-json\/wp\/v2\/tags?post=617"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}