{"id":4802,"date":"2021-08-11T04:44:15","date_gmt":"2021-08-11T04:44:15","guid":{"rendered":"https:\/\/studysection.com\/blog\/?p=4802"},"modified":"2021-08-11T05:06:21","modified_gmt":"2021-08-11T05:06:21","slug":"common-website-attacks-and-prevention","status":"publish","type":"post","link":"https:\/\/studysection.com\/blog\/common-website-attacks-and-prevention\/","title":{"rendered":"Common Website Attacks and Prevention"},"content":{"rendered":"<p>In this post, you will learn which techniques are used by the hacker to hack the Websites and you can stop your website from getting hacked.<\/p>\n<p>Below are the common ways by which hackers can attack your website. The examples are valid in the PHP language.<\/p>\n<p><strong>1. Error Reporting:<\/strong> When a user tries to submit the manipulated data to the server, then the server sometimes triggers the error message when the server is unable to handle the manipulated data. This error message can generate information like OS name, directory names, software version and a lot of other things.<\/p>\n<p>Example:<br \/>\n<code>&lt;?php<br \/>\n  echo $_GET[\"number\"];\/\/Hacker can request this url without passing a query string.<br \/>\n?><\/code><br \/>\nNow, on running this script it will generate an error<\/p>\n<p><strong>Notice: Undefined index: number in C: \/wamp\/www\/index. Php on line 3<\/strong><\/p>\n<p>This error leaks a lot of information. Some of them are:<\/p>\n<ol>\n<li>Website runs on <a href=\"https:\/\/studysection.com\/blog\/benefits-of-microsoft-windows-and-its-certification-for-non-it-professionals\/\">Windows OS<\/a><\/li>\n<li>Wamp Web server<\/li>\n<li>Target file is index.php<\/li>\n<\/ol>\n<p>Solution : Disable Error Reporting\/Displaying and enable error logging.<\/p>\n<p>To prevent these kinds of errors we can do simple validation as shown below.<br \/>\n<code>&lt;?php<br \/>\n  if(isset($_GET[\"number\"]){<br \/>\n    echo $_GET[\"number\"];<br \/>\n  }<br \/>\n  else{<br \/>\n    echo \"Variable not set\";<br \/>\n  }<br \/>\n?><\/code><\/p>\n<p><strong>2. HTTP Response Information Leakage Attack<\/strong><br \/>\nWe can stop web servers from leaking this information by changing some variable values in httpd.conf and php.ini files.<\/p>\n<p><em>In httpd.conf file:<br \/>\nServerTokens Prod<br \/>\nServerSignature Off<br \/>\nIn php.ini<br \/>\nExpose_php = off<\/em><\/p>\n<p><strong>3. Client-Side Validation Attacks<\/strong><br \/>\nNever Depend on only client-side validations. A Hacker can easily bypass the client-side validations and hack the website.<\/p>\n<p><strong>Example:<\/strong><br \/>\n<code>&lt;form action=\"\/\" method=\"POST\"><br \/>\n        Subscription Form<br \/>\n        E-Mail: &lt;input name=\"email\" type=\"email\" required><br \/>\n        &lt;input type=\"submit\"><br \/>\n &lt;\/form><br \/>\n&lt;?php<br \/>\n    if(isset($_POST[\"email\"]))<br \/>\n    {<br \/>\n        if(file_exists(\"emails.txt\"))<br \/>\n        {<br \/>\n            $emails = file_get_contents(\"emails.txt\");<br \/>\n        }<br \/>\n        else<br \/>\n        {<br \/>\n            $emails = \"\";<br \/>\n        }<br \/>\n        $emails = $emails . \"\\n\" . $_POST[\"email\"];<br \/>\n        file_put_contents(\"emails.txt\", $emails);<br \/>\n        echo $emails;<br \/>\n    }<br \/>\n?><\/code><br \/>\nThe above code looks great, but hackers can easily break the client-side validation by changing the input type email to text and put the manipulated data in it for further analysis. Now, hackers can put anything random in the text field and now your website is vulnerable to spam.<\/p>\n<p>To prevent this, we can validate the form data on the server-side.<br \/>\n<code>&lt;?php<br \/>\n    if(isset($_POST[\"email\"]))<br \/>\n    {<br \/>\n        if(!filter_var($_POST[\"email\"], FILTER_VALIDATE_EMAIL))<br \/>\n        {<br \/>\n            echo \"E-mail is not valid\";<br \/>\n        }<br \/>\n        else<br \/>\n        {<br \/>\n            if(file_exists(\"emails.txt\"))<br \/>\n            {<br \/>\n                $emails = file_get_contents(\"emails.txt\");<br \/>\n            }<br \/>\n            else<br \/>\n            {<br \/>\n                $emails = \"\";<br \/>\n            }<br \/>\n            $emails = $emails . \"\\n\" . $_POST[\"email\"];<br \/>\n            file_put_contents(\"emails.txt\", $emails);<br \/>\n            echo $emails;<br \/>\n        }<br \/>\n    }<br \/>\n    else<br \/>\n    {<br \/>\n        if(file_exists(\"emails.txt\"))<br \/>\n        {<br \/>\n            echo file_get_contents(\"emails.txt\");<br \/>\n        }<br \/>\n    }<br \/>\n?><\/code><br \/>\n<strong>4. SQL Injection<\/strong><\/p>\n<p>In this Technique, a hacker can inject the SQL command into the SQL statements.<br \/>\nExample:<br \/>\n<code>&lt;form action=\"\/\" method=\"POST\"><br \/>\n        Contact Details&lt;br><br \/>\n        E-Mail: &lt;br>&lt;input name=\"email\" type=\"email\" required>&lt;br><br \/>\n        Message: &lt;br>&lt;textarea name=\"message\">&lt;\/textarea>&lt;br><br \/>\n        &lt;input type=\"submit\"><br \/>\n&lt;\/form><br \/>\n&lt;?php<br \/>\n    if(isset($_POST[\"email\"]) && isset($_POST[\"message\"])){<br \/>\n        \/\/we will construct the SQL statement and print it.<br \/>\n        $sql = \"INSERT INTO contacts ('email', 'message') VALUES('\" . $_POST[\"email\"] . \"', '\" . $_POST[\"message\"] . \"');\";<br \/>\n        echo $sql; \/\/assume this code is executed.<br \/>\n    }<br \/>\n?><\/code><br \/>\nThe above code is vulnerable to SQL Injection. A user can append the SQL Injection into the text area and hack your website.<\/p>\n<p>Example code the hacker can inject into the Text area<br \/>\n<strong>Hii \u2019); drop table contacts; &#8212;<\/strong><\/p>\n<p>When the form is submitted the server execute this command<br \/>\n<strong>INSERT INTO contacts (&#8217;email&#8217;, &#8216;message&#8217;) VALUES(&#8216;abc@gmail.com&#8217;, &#8216;Hii&#8217;); drop table contacts; &#8212; &#8216;)<\/strong><br \/>\nThis will result in deleting your whole table contacts, so your website is hacked.<br \/>\nThis can be prevented by validating, escaping, and running SQL commands at low privilege.<br \/>\nSo change your script like below.<br \/>\n<code>&lt;?php<br \/>\n    if(isset($_POST[\"email\"]) && isset($_POST[\"message\"])){<br \/>\n        if(is_string($_POST[\"email\"]) and is_string($_POST[\"email\"]) and filter_var($_POST[\"email\"], FILTER_VALIDATE_EMAIL))\/\/check data type and format<br \/>\n        {<br \/>\n            $mysqli = new mySqli('hostname', 'db_username', 'db_password', 'db_name');<br \/>\n            $sql = \"INSERT INTO contacts ('email', 'message') VALUES('\" .               $mysqli->real_escape_string($_POST[\"email\"]) . \"', '\" . $mysqli->real_escape_string($_POST[\"message\"]) . \"');\";<br \/>\n            echo $sql;\/\/execute code at low privilege<br \/>\n        }<br \/>\n    }<br \/>\n?><\/code><br \/>\n<strong>5. Code Injection:<\/strong> <\/p>\n<p>In this technique, a hacker can inject code into the web server for execution.<br \/>\n<strong>Example:<\/strong><br \/>\n<code>&lt;form action=\"\/\" method=\"POST\"><br \/>\n        Domain Name<br \/>\n        &lt;input type=\"text\" name=\"number1\"><br \/>\n        &lt;input type=\"text\" name=\"number2\"><br \/>\n        &lt;input type=\"submit\"><br \/>\n&lt;\/form><br \/>\n&lt;?php<br \/>\nif(isset($_POST[\"number1\"]) && isset($_POST[\"number2\"]))<br \/>\n{<br \/>\n  eval(\"echo \". $_POST[\"number1\"] . \"+\" . $_POST[\"number2\"] .\";\");<br \/>\n}<br \/>\n?><\/code><br \/>\nThis code Takes two number inputs and passes them to the eval function for the evaluation.<br \/>\nNow, this code is vulnerable to code injection. A hacker can put any PHP code script to execute on the webserver.<br \/>\nExample: He can put the following code:<br \/>\n<code>&lt;?php echo phpinfo ?><\/code><\/p>\n<p>When this form is submitted the PHP information is leaked.<br \/>\nThis can be prevented by avoiding the eval function and validating the data.<br \/>\nFollowing is the enhanced code.<br \/>\n<code>&lt;?php<br \/>\n    if(isset($_POST[\"number1\"]) && isset($_POST[\"number2\"]))<br \/>\n    {<br \/>\n        if(is_numeric($_POST[\"number1\"]) && is_numeric($_POST[\"number2\"]))<br \/>\n        {<br \/>\n            eval(\"echo \". $_POST[\"number1\"] . \"+\" . $_POST[\"number2\"] .\";\");<br \/>\n        }<br \/>\n    }<br \/>\n?><\/code><br \/>\n<strong>6. File Inclusion<\/strong><br \/>\nIn this technique, a hacker can run the remote or local script to the webserver.<br \/>\n<code>&lt;form action=\"\/\" method=\"POST\"><br \/>\n        Enter a theme color:<br \/>\n        &lt;select name=\"color\"><br \/>\n          &lt;option value=\"green\">green&lt;\/option><br \/>\n          &lt;option value=\"blue\">blue&lt;\/option><br \/>\n          &lt;option value=\"red\">red&lt;\/option><br \/>\n          &lt;option value=\"yellow\">yellow&lt;\/option><br \/>\n       &lt;\/select><br \/>\n        &lt;input type=\"submit\"><br \/>\n&lt;\/form><br \/>\n&lt;?php<br \/>\n    if(isset($_POST[\"color\"]))<br \/>\n    {<br \/>\n        include($_POST[\"color\"] . \".php\");<br \/>\n    }<br \/>\n?><\/code><br \/>\nIn this code, we are including the file and in this code, a hacker can run any piece of code for the execution.<\/p>\n<p><strong>Example:<\/strong> He can inspect the source code and change any option and put values like .htaccess.<br \/>\nNow, on submitting the code it will display all information related to the .htaccess configuration file.<br \/>\nThis can be prevented by data validation. Below is the changed Script.<br \/>\n<code>&lt;?php<br \/>\n    if(isset($_POST[\"color\"]) && ($_POST[\"color\"] == \"green\" || $_POST[\"color\"] == \"blue\" || $_POST[\"color\"] == \"red\" || $_POST[\"color\"] == \"yellow\"))<br \/>\n    {<br \/>\n        include($_POST[\"color\"] . \".php\");<br \/>\n    }<br \/>\n?><\/code><\/p>\n<p><small><em>People having good knowledge of Financial accounting can get an <a href=\"https:\/\/www.studysection.com\/financial-accountant-advanced-diploma\">Accounting Certification Exams<\/a> from StudySection to increase their chances of getting a job in this field. You can get a foundation level certification if you are new to Financial accounting or you can go for advanced level certification if you have expert level skills in Financial accounting.<\/em><\/small><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this post, you will learn which techniques are used by the hacker to hack the Websites and you can<\/p>\n","protected":false},"author":1,"featured_media":4803,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[690,179],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Common Website Attacks and Prevention - StudySection Blog<\/title>\n<meta name=\"description\" content=\"In this post you will learn which techniques are used by the hacker to hack the Websites and you can stop your website from getting hacked.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/studysection.com\/blog\/common-website-attacks-and-prevention\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Common Website Attacks and Prevention - StudySection Blog\" \/>\n<meta property=\"og:description\" content=\"In this post you will learn which techniques are used by the hacker to hack the Websites and you can stop your website from getting hacked.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/studysection.com\/blog\/common-website-attacks-and-prevention\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog Posts on famous people, innovations and educational topics\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/studysection\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-11T04:44:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-11T05:06:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/studysection.com\/blog\/wp-content\/uploads\/2021\/08\/Prevention.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin-studysection-blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@studysection\" \/>\n<meta name=\"twitter:site\" content=\"@studysection\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin-studysection-blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/studysection.com\/blog\/common-website-attacks-and-prevention\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/studysection.com\/blog\/common-website-attacks-and-prevention\/\"},\"author\":{\"name\":\"admin-studysection-blog\",\"@id\":\"https:\/\/studysection.com\/blog\/#\/schema\/person\/db367e2c29a12d1808fb1979edb3d402\"},\"headline\":\"Common Website Attacks and Prevention\",\"datePublished\":\"2021-08-11T04:44:15+00:00\",\"dateModified\":\"2021-08-11T05:06:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/studysection.com\/blog\/common-website-attacks-and-prevention\/\"},\"wordCount\":639,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/studysection.com\/blog\/#organization\"},\"keywords\":[\"Prevention\",\"Website\"],\"articleSection\":[\"Learn and Grow\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/studysection.com\/blog\/common-website-attacks-and-prevention\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/studysection.com\/blog\/common-website-attacks-and-prevention\/\",\"url\":\"https:\/\/studysection.com\/blog\/common-website-attacks-and-prevention\/\",\"name\":\"Common Website Attacks and Prevention - StudySection Blog\",\"isPartOf\":{\"@id\":\"https:\/\/studysection.com\/blog\/#website\"},\"datePublished\":\"2021-08-11T04:44:15+00:00\",\"dateModified\":\"2021-08-11T05:06:21+00:00\",\"description\":\"In this post you will learn which techniques are used by the hacker to hack the Websites and you can stop your website from getting hacked.\",\"breadcrumb\":{\"@id\":\"https:\/\/studysection.com\/blog\/common-website-attacks-and-prevention\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/studysection.com\/blog\/common-website-attacks-and-prevention\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/studysection.com\/blog\/common-website-attacks-and-prevention\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/studysection.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Common Website Attacks and Prevention\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/studysection.com\/blog\/#website\",\"url\":\"https:\/\/studysection.com\/blog\/\",\"name\":\"Blog Posts on famous people, innovations and educational topics\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/studysection.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/studysection.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/studysection.com\/blog\/#organization\",\"name\":\"StudySection\",\"url\":\"https:\/\/studysection.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/studysection.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/studysection.com\/blog\/wp-content\/uploads\/2021\/10\/studySection-logo.png\",\"contentUrl\":\"https:\/\/studysection.com\/blog\/wp-content\/uploads\/2021\/10\/studySection-logo.png\",\"width\":920,\"height\":440,\"caption\":\"StudySection\"},\"image\":{\"@id\":\"https:\/\/studysection.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/studysection\",\"https:\/\/twitter.com\/studysection\",\"https:\/\/www.instagram.com\/study.section\/\",\"https:\/\/www.linkedin.com\/company\/studysection\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/studysection.com\/blog\/#\/schema\/person\/db367e2c29a12d1808fb1979edb3d402\",\"name\":\"admin-studysection-blog\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/studysection.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/054ac87a6874df1932004239cd8eab36?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/054ac87a6874df1932004239cd8eab36?s=96&d=mm&r=g\",\"caption\":\"admin-studysection-blog\"},\"url\":\"https:\/\/studysection.com\/blog\/author\/admin-studysection-blog\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Common Website Attacks and Prevention - StudySection Blog","description":"In this post you will learn which techniques are used by the hacker to hack the Websites and you can stop your website from getting hacked.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/studysection.com\/blog\/common-website-attacks-and-prevention\/","og_locale":"en_US","og_type":"article","og_title":"Common Website Attacks and Prevention - StudySection Blog","og_description":"In this post you will learn which techniques are used by the hacker to hack the Websites and you can stop your website from getting hacked.","og_url":"https:\/\/studysection.com\/blog\/common-website-attacks-and-prevention\/","og_site_name":"Blog Posts on famous people, innovations and educational topics","article_publisher":"https:\/\/www.facebook.com\/studysection","article_published_time":"2021-08-11T04:44:15+00:00","article_modified_time":"2021-08-11T05:06:21+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/studysection.com\/blog\/wp-content\/uploads\/2021\/08\/Prevention.png","type":"image\/png"}],"author":"admin-studysection-blog","twitter_card":"summary_large_image","twitter_creator":"@studysection","twitter_site":"@studysection","twitter_misc":{"Written by":"admin-studysection-blog","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/studysection.com\/blog\/common-website-attacks-and-prevention\/#article","isPartOf":{"@id":"https:\/\/studysection.com\/blog\/common-website-attacks-and-prevention\/"},"author":{"name":"admin-studysection-blog","@id":"https:\/\/studysection.com\/blog\/#\/schema\/person\/db367e2c29a12d1808fb1979edb3d402"},"headline":"Common Website Attacks and Prevention","datePublished":"2021-08-11T04:44:15+00:00","dateModified":"2021-08-11T05:06:21+00:00","mainEntityOfPage":{"@id":"https:\/\/studysection.com\/blog\/common-website-attacks-and-prevention\/"},"wordCount":639,"commentCount":0,"publisher":{"@id":"https:\/\/studysection.com\/blog\/#organization"},"keywords":["Prevention","Website"],"articleSection":["Learn and Grow"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/studysection.com\/blog\/common-website-attacks-and-prevention\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/studysection.com\/blog\/common-website-attacks-and-prevention\/","url":"https:\/\/studysection.com\/blog\/common-website-attacks-and-prevention\/","name":"Common Website Attacks and Prevention - StudySection Blog","isPartOf":{"@id":"https:\/\/studysection.com\/blog\/#website"},"datePublished":"2021-08-11T04:44:15+00:00","dateModified":"2021-08-11T05:06:21+00:00","description":"In this post you will learn which techniques are used by the hacker to hack the Websites and you can stop your website from getting hacked.","breadcrumb":{"@id":"https:\/\/studysection.com\/blog\/common-website-attacks-and-prevention\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/studysection.com\/blog\/common-website-attacks-and-prevention\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/studysection.com\/blog\/common-website-attacks-and-prevention\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/studysection.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Common Website Attacks and Prevention"}]},{"@type":"WebSite","@id":"https:\/\/studysection.com\/blog\/#website","url":"https:\/\/studysection.com\/blog\/","name":"Blog Posts on famous people, innovations and educational topics","description":"","publisher":{"@id":"https:\/\/studysection.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/studysection.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/studysection.com\/blog\/#organization","name":"StudySection","url":"https:\/\/studysection.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/studysection.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/studysection.com\/blog\/wp-content\/uploads\/2021\/10\/studySection-logo.png","contentUrl":"https:\/\/studysection.com\/blog\/wp-content\/uploads\/2021\/10\/studySection-logo.png","width":920,"height":440,"caption":"StudySection"},"image":{"@id":"https:\/\/studysection.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/studysection","https:\/\/twitter.com\/studysection","https:\/\/www.instagram.com\/study.section\/","https:\/\/www.linkedin.com\/company\/studysection"]},{"@type":"Person","@id":"https:\/\/studysection.com\/blog\/#\/schema\/person\/db367e2c29a12d1808fb1979edb3d402","name":"admin-studysection-blog","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/studysection.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/054ac87a6874df1932004239cd8eab36?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/054ac87a6874df1932004239cd8eab36?s=96&d=mm&r=g","caption":"admin-studysection-blog"},"url":"https:\/\/studysection.com\/blog\/author\/admin-studysection-blog\/"}]}},"views":161,"_links":{"self":[{"href":"https:\/\/studysection.com\/blog\/wp-json\/wp\/v2\/posts\/4802"}],"collection":[{"href":"https:\/\/studysection.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/studysection.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/studysection.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/studysection.com\/blog\/wp-json\/wp\/v2\/comments?post=4802"}],"version-history":[{"count":3,"href":"https:\/\/studysection.com\/blog\/wp-json\/wp\/v2\/posts\/4802\/revisions"}],"predecessor-version":[{"id":4806,"href":"https:\/\/studysection.com\/blog\/wp-json\/wp\/v2\/posts\/4802\/revisions\/4806"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/studysection.com\/blog\/wp-json\/wp\/v2\/media\/4803"}],"wp:attachment":[{"href":"https:\/\/studysection.com\/blog\/wp-json\/wp\/v2\/media?parent=4802"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/studysection.com\/blog\/wp-json\/wp\/v2\/categories?post=4802"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/studysection.com\/blog\/wp-json\/wp\/v2\/tags?post=4802"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}