{"id":439,"date":"2016-04-28T21:00:37","date_gmt":"2016-04-28T18:00:37","guid":{"rendered":"https:\/\/decrypthash.ru\/en\/?page_id=439"},"modified":"2016-12-21T15:16:09","modified_gmt":"2016-12-21T12:16:09","slug":"how-to-make-a-wifi-network-packet-capture","status":"publish","type":"page","link":"https:\/\/decrypthash.ru\/en\/articles-and-help\/how-to-make-a-wifi-network-packet-capture\/","title":{"rendered":"How to make a wifi network packet capture"},"content":{"rendered":"<h1><span id=\"result_box\" class=\"\" lang=\"en\" tabindex=\"-1\">Interception of data network wifi or seizure HANDSHAKE (handshake)<\/span><\/h1>\n<p><span id=\"result_box\" class=\"\" lang=\"en\" tabindex=\"-1\"><span title=\"\u0414\u0430\u043d\u043d\u0430\u044f \u0441\u0442\u0430\u0442\u044c\u044f \u0431\u0443\u0434\u0435\u0442 \u043f\u043e\u0441\u0432\u044f\u0449\u0435\u043d\u0430 \u0441\u043f\u043e\u0441\u043e\u0431\u0443 \u043f\u0435\u0440\u0435\u0445\u0432\u0430\u0442\u0430 \u043f\u0430\u043a\u0435\u0442\u043e\u0432 \u0434\u0430\u043d\u043d\u044b\u0445 \u0441\u0435\u0442\u0438 wifi, \u0442\u0430\u043a\u0436\u0435 \u043f\u043e \u0434\u0440\u0443\u0433\u043e\u043c\u0443 \u043d\u0430\u0437\u044b\u0432\u0430\u044e\u0442 \u044d\u0442\u043e \u043f\u0435\u0440\u0435\u0445\u0432\u0430\u0442\u043e\u043c(\u0437\u0430\u0445\u0432\u0430\u0442\u043e\u043c) \u043f\u0430\u043a\u0435\u0442\u043e\u0432 \u0445\u0435\u043d\u0434\u0448\u0435\u0439\u043a\u043e\u0432 \u0441\u0435\u0442\u0438 \u0432\u0438\u0444\u0438. \">This article will focus on the method of intercepting data packets wifi network, and on the other is called the intercept (the seizure) handshake packets WiFi network.<\/span><\/span><\/p>\n<p><span title=\"\u0411\u044b\u0432\u0430\u0435\u0442 \u043c\u043d\u043e\u0433\u043e \u0441\u043f\u043e\u0441\u043e\u0431\u043e \u0437\u0430\u0445\u0432\u0430\u0442\u0430 \u044d\u0442\u0438\u0445 &quot;\u043b\u0430\u043a\u043e\u043c\u044b\u0445&quot; \u043f\u0430\u043a\u0435\u0442\u043e\u0432 \u0434\u0430\u043d\u043d\u044b\u0445.\">Sometimes a lot of ways to capture these &#8220;delicious&#8221; data packets. <\/span><span title=\"\u0412 \u0442\u0435\u043a\u0443\u0449\u0435\u0439 \u0441\u0442\u0430\u0442\u044c\u0435 \u0441\u0435\u0440\u0432\u0438\u0441 \u043f\u043e \u0432\u043e\u0441\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044e \u043f\u0430\u0440\u043e\u043b\u0435\u0439 wifi \u043f\u0440\u0435\u0434\u043b\u043e\u0436\u0438\u0442 \u0432\u0430\u043c \u0432\u0430\u0440\u0438\u0430\u043d\u0442 \u043e\u0431\u043e\u043b\u043e\u0447\u043a\u0438 AirSlax.\">In the current paper recovery service wifi passwords will offer you the option AirSlax shell. <\/span><span title=\"\u0414\u0430\u043d\u043d\u043e\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0435 \u043e\u0447\u0435\u043d\u044c \u0443\u0434\u043e\u0431\u043d\u043e\u0435 \u0434\u043b\u044f \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u0432\u043e\u0441\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u043f\u0430\u0440\u043e\u043b\u044f \u043e\u0442 \u0441\u0435\u0442\u0438 \u0432\u0438\u0444\u0438, \u043f\u0435\u0440\u0435\u0445\u0432\u0430\u0442\u0430 \u0445\u0435\u043d\u0434\u0448\u0435\u0439\u043a\u0430, \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0435 \u043d\u0430\u0445\u043e\u0436\u0434\u0435\u043d\u0438\u0435 \u043f\u0430\u0440\u043e\u043b\u044f WPS \u0438 \u043c\u043d\u043e\u0433\u043e\u0435 \u0434\u0440\u0443\u0433\u043e\u0435. \">This software is very easy to use password recovery from the WiFi network, intercept handshake, automatically finding the WPS password and more.<\/span><\/p>\n<p><span title=\"\u0414\u043b\u044f \u043d\u0430\u0447\u0430\u043b\u0430 \u043f\u043e\u0434\u0433\u043e\u0442\u043e\u0432\u0438\u043c \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u044b. \">To begin prepare tools.<\/span><\/p>\n<p><span title=\"\u041d\u0430\u043c \u043f\u043e\u0442\u0440\u0435\u0431\u0443\u0435\u0442\u0441\u044f \u043b\u044e\u0431\u043e\u0439 \u0444\u043b\u0435\u0448 \u043d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c, \u0432 \u043d\u0430\u0440\u043e\u0434\u0435 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u0439 \u043a\u0430\u043a &quot;\u0444\u043b\u0435\u0448\u043a\u0430&quot; \u043e\u0431\u044a\u0435\u043c\u043e\u043c \u0431\u043e\u043b\u0435\u0435 2\u0413\u0431.\">We need any flash drive, popularly known as &#8220;flash drive&#8221; larger than 2GB. <\/span><span title=\"\u0417\u0430\u0442\u0435\u043c \u043c\u044b \u0441\u043a\u0430\u0447\u0438\u0432\u0430\u0435\u043c \u0430\u0440\u0445\u0438\u0432 \u0441 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043e\u0439 AirSlax \u043f\u043e \u044d\u0442\u043e\u0439 \u0441\u0441\u044b\u043b\u043a\u0435 \">Then we download the file with AirSlax program at this link<\/span><\/p>\n<p><span title=\"\u041f\u043e\u0441\u043b\u0435 \u044d\u0442\u043e\u0433\u043e \u0432\u044b \u0437\u0430\u0433\u0440\u0443\u0436\u0430\u0435\u043c \u0441\u043e\u0434\u0435\u0440\u0436\u0438\u043c\u043e\u0435 \u0430\u0440\u0445\u0438\u0432\u0430 \u0432 \u043a\u043e\u0440\u0435\u043d\u044c \u0444\u043b\u0435\u0448\u043a\u0438(USB Flash) \">Then you load the contents of the archive to the root of flash drives (USB Flash)<\/span><\/p>\n<p><span title=\"\u0417\u0430\u0445\u043e\u0434\u0438\u043c \u0432 \u043f\u0430\u043f\u043a\u0443 boot \u0438 \u0437\u0430\u043f\u0443\u0441\u043a\u0430\u0435\u043c \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0443 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0443.\">Go to the folder boot and run the program installation. <\/span><span title=\"\u0412 \u043d\u0430\u0448\u0435\u043c \u0432\u0430\u0440\u0438\u0430\u043d\u0442\u0435 \u044d\u0442\u043e \u0431\u0443\u0434\u0435\u0442 Porteus-installer-for-Windows.exe \u0417\u0430\u0442\u0435\u043c \u043f\u043e\u044f\u0432\u0438\u0442\u044c\u0441\u044f &quot;\u0447\u0435\u0440\u043d\u043e\u0435&quot; \u043e\u043a\u043d\u043e \u0438 \u0432 \u043d\u0435\u043c \u043c\u044b \u0434\u043b\u044f \u0440\u0430\u0437\u0440\u0435\u0448\u0435\u043d\u0438\u044f \u0434\u0430\u043b\u044c\u043d\u0435\u0439\u0448\u0438\u0445 \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0439 \u043d\u0430\u0436\u0438\u043c\u0430\u0435\u043c \u043f\u0440\u043e\u0431\u0435\u043b \u0438\u043b\u0438 \u043b\u044e\u0431\u0443\u044e \u043a\u043b\u0430\u0432\u0438\u0448\u0443*.\">In this embodiment, it will Porteus-installer-for-Windows.exe Then came the &#8220;black&#8221; box, and in it we have to resolve to proceed press the space bar or any key *.<\/span><\/p>\n<p><a href=\"https:\/\/decrypthash.ru\/wp-content\/uploads\/2015\/12\/airslax-install-to-usb-1.png\"  rel=\"lightbox[439] attachment wp-att-247\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-247\" src=\"https:\/\/decrypthash.ru\/wp-content\/uploads\/2015\/12\/airslax-install-to-usb-1.png\" alt=\"\u0423\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 Airslax \u043d\u0430 \u0444\u043b\u0435\u0448\u043a\u0443\" width=\"500\" height=\"248\" srcset=\"https:\/\/decrypthash.ru\/wp-content\/uploads\/2015\/12\/airslax-install-to-usb-1.png 669w, https:\/\/decrypthash.ru\/wp-content\/uploads\/2015\/12\/airslax-install-to-usb-1-300x149.png 300w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<p><span id=\"result_box\" class=\"short_text\" lang=\"en\" tabindex=\"-1\"><span class=\"\">We are waiting for<\/span><\/span><span id=\"result_box\" class=\"short_text\" lang=\"en\" tabindex=\"-1\"> the inscription<\/span><span style=\"text-decoration: underline;\"><span id=\"result_box\" class=\"short_text\" lang=\"en\" tabindex=\"-1\">\u00a0<\/span>Installation finished successfully<\/span>.<\/p>\n<p><a href=\"https:\/\/decrypthash.ru\/wp-content\/uploads\/2015\/12\/airslax-install-to-usb-2.png\"  rel=\"lightbox[439] attachment wp-att-248\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-248\" src=\"https:\/\/decrypthash.ru\/wp-content\/uploads\/2015\/12\/airslax-install-to-usb-2.png\" alt=\"\u0423\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 Airslax \u043d\u0430 usb\" width=\"500\" height=\"253\" srcset=\"https:\/\/decrypthash.ru\/wp-content\/uploads\/2015\/12\/airslax-install-to-usb-2.png 666w, https:\/\/decrypthash.ru\/wp-content\/uploads\/2015\/12\/airslax-install-to-usb-2-300x152.png 300w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<p><span id=\"result_box\" class=\"\" lang=\"en\" tabindex=\"-1\">And press any key to close the window.<\/span><\/p>\n<p>All the image of a shell is already loaded on the flash drive. You&#8217;re just reboot your computer and select the download mode with flash.<\/p>\n<p><span id=\"result_box\" class=\"\" lang=\"en\" tabindex=\"-1\">Download selection can be made typically by pressing F12 on a stationary PC or the Fn + F12 on laptops, and selection can be done through the Bios.<\/span><\/p>\n<h3><span id=\"result_box\" class=\"short_text\" lang=\"en\" tabindex=\"-1\">Loading AirSlax with stick<\/span><\/h3>\n<p><span id=\"result_box\" class=\"\" lang=\"en\" tabindex=\"-1\">After successfully selecting the mode you download appear in the startup menu screen, if you do not choose the items **, the launch will be made automatically.<\/span><\/p>\n<p>We wait until the operating system to load.<\/p>\n<p><span id=\"result_box\" class=\"\" lang=\"en\" tabindex=\"-1\">At the end of the download we appear on the desktop screen and run a shortcut by double-clicking AirSlax Base. Before us appear the wireless adapter selection window:<\/span><\/p>\n<p><a href=\"https:\/\/decrypthash.ru\/wp-content\/uploads\/2015\/12\/airslax-8-1.png\"  rel=\"lightbox[439] attachment wp-att-250\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-256 size-medium\" src=\"https:\/\/decrypthash.ru\/wp-content\/uploads\/2015\/12\/airslax-8-1-300x169.png\" alt=\"\u0432\u044b\u0431\u043e\u0440 \u0430\u0434\u0430\u043f\u0442\u0435\u0440\u0430 \u0432 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0435 airslax\" width=\"300\" height=\"169\" srcset=\"https:\/\/decrypthash.ru\/wp-content\/uploads\/2015\/12\/airslax-8-1-300x169.png 300w, https:\/\/decrypthash.ru\/wp-content\/uploads\/2015\/12\/airslax-8-1-768x432.png 768w, https:\/\/decrypthash.ru\/wp-content\/uploads\/2015\/12\/airslax-8-1-1024x576.png 1024w, https:\/\/decrypthash.ru\/wp-content\/uploads\/2015\/12\/airslax-8-1.png 1366w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p><span id=\"result_box\" class=\"\" lang=\"en\" tabindex=\"-1\">Select and press OK, we have on the screen to the main menu:<\/span><\/p>\n<p><a href=\"https:\/\/decrypthash.ru\/wp-content\/uploads\/2015\/12\/airslax-7-1.png\"  rel=\"lightbox[439] attachment wp-att-251\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-257 size-medium\" src=\"https:\/\/decrypthash.ru\/wp-content\/uploads\/2015\/12\/airslax-7-1-300x169.png\" alt=\"\u0433\u043b\u0430\u0432\u043d\u043e\u0435 \u043c\u0435\u043d\u044e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b airslax\" width=\"300\" height=\"169\" srcset=\"https:\/\/decrypthash.ru\/wp-content\/uploads\/2015\/12\/airslax-7-1-300x169.png 300w, https:\/\/decrypthash.ru\/wp-content\/uploads\/2015\/12\/airslax-7-1-768x432.png 768w, https:\/\/decrypthash.ru\/wp-content\/uploads\/2015\/12\/airslax-7-1-1024x576.png 1024w, https:\/\/decrypthash.ru\/wp-content\/uploads\/2015\/12\/airslax-7-1.png 1366w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p><span id=\"result_box\" class=\"\" lang=\"en\" tabindex=\"-1\">The action plan is now as follows, first click on the item &#8220;Scan the air&#8221;, we have a new dialog box:<\/span><\/p>\n<p><a href=\"https:\/\/decrypthash.ru\/wp-content\/uploads\/2015\/12\/airslax-6.png\"  rel=\"lightbox[439] attachment wp-att-252\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-252\" src=\"https:\/\/decrypthash.ru\/wp-content\/uploads\/2015\/12\/airslax-6-300x169.png\" alt=\"\u043e\u043a\u043d\u043e \u044d\u0444\u0438\u0440\u0430 AirSlax\" width=\"300\" height=\"169\" srcset=\"https:\/\/decrypthash.ru\/wp-content\/uploads\/2015\/12\/airslax-6-300x169.png 300w, https:\/\/decrypthash.ru\/wp-content\/uploads\/2015\/12\/airslax-6-768x432.png 768w, https:\/\/decrypthash.ru\/wp-content\/uploads\/2015\/12\/airslax-6-1024x576.png 1024w, https:\/\/decrypthash.ru\/wp-content\/uploads\/2015\/12\/airslax-6.png 1366w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p><span id=\"result_box\" class=\"\" lang=\"en\" tabindex=\"-1\">It shows the current status of active networks. We are waiting for the emergence of active users at the bottom of the table we desired WiFi network. There will klyuchvoy item &#8220;STATION&#8221;. We see that to the desired network with MAC address have active connections. Close the window. Click on the 2 items &#8220;Select Network&#8221;, specify the desired MAC address:<\/span><\/p>\n<p><a href=\"https:\/\/decrypthash.ru\/wp-content\/uploads\/2015\/12\/airslax-5.png\"  rel=\"lightbox[439] attachment wp-att-253\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-253\" src=\"https:\/\/decrypthash.ru\/wp-content\/uploads\/2015\/12\/airslax-5-300x169.png\" alt=\"airslax-5\" width=\"300\" height=\"169\" srcset=\"https:\/\/decrypthash.ru\/wp-content\/uploads\/2015\/12\/airslax-5-300x169.png 300w, https:\/\/decrypthash.ru\/wp-content\/uploads\/2015\/12\/airslax-5-768x432.png 768w, https:\/\/decrypthash.ru\/wp-content\/uploads\/2015\/12\/airslax-5-1024x576.png 1024w, https:\/\/decrypthash.ru\/wp-content\/uploads\/2015\/12\/airslax-5.png 1366w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p><span id=\"result_box\" class=\"short_text\" lang=\"en\" tabindex=\"-1\">click OK<\/span><\/p>\n<p><span id=\"result_box\" class=\"\" lang=\"en\" tabindex=\"-1\">A new window opens with the pre-selected by us in order to:<\/span><\/p>\n<p><a href=\"https:\/\/decrypthash.ru\/wp-content\/uploads\/2015\/12\/airslax-2.png\"  rel=\"lightbox[439] attachment wp-att-254\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-254\" src=\"https:\/\/decrypthash.ru\/wp-content\/uploads\/2015\/12\/airslax-2-300x169.png\" alt=\"\u0446\u0435\u043b\u044c AirSlax\" width=\"300\" height=\"169\" srcset=\"https:\/\/decrypthash.ru\/wp-content\/uploads\/2015\/12\/airslax-2-300x169.png 300w, https:\/\/decrypthash.ru\/wp-content\/uploads\/2015\/12\/airslax-2-768x432.png 768w, https:\/\/decrypthash.ru\/wp-content\/uploads\/2015\/12\/airslax-2-1024x576.png 1024w, https:\/\/decrypthash.ru\/wp-content\/uploads\/2015\/12\/airslax-2.png 1366w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p><span id=\"result_box\" class=\"\" lang=\"en\" tabindex=\"-1\">Now we need to catch a <strong>handshake to find passwords from wifi network<\/strong> 4 Select the item &#8220;Disable client&#8221; and indicate the selected customer. and can specify all rare cases. Now we wait until the device re-re connect to the WiFi network selected by us. If successful, we will see the top right of the text &#8220;<strong>WPA handshake<\/strong>&#8220;<\/span><\/p>\n<p><a href=\"https:\/\/decrypthash.ru\/wp-content\/uploads\/2015\/12\/airslax-1.png\"  rel=\"lightbox[439] attachment wp-att-255\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-255\" src=\"https:\/\/decrypthash.ru\/wp-content\/uploads\/2015\/12\/airslax-1-300x169.png\" alt=\"AirSlax handshake\" width=\"300\" height=\"169\" srcset=\"https:\/\/decrypthash.ru\/wp-content\/uploads\/2015\/12\/airslax-1-300x169.png 300w, https:\/\/decrypthash.ru\/wp-content\/uploads\/2015\/12\/airslax-1-768x432.png 768w, https:\/\/decrypthash.ru\/wp-content\/uploads\/2015\/12\/airslax-1-1024x576.png 1024w, https:\/\/decrypthash.ru\/wp-content\/uploads\/2015\/12\/airslax-1.png 1366w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p><span id=\"result_box\" class=\"\" lang=\"en\" tabindex=\"-1\">Black box capture and close the menu, select 6 &#8220;<strong>Save result<\/strong>&#8220;. Specify the file name and click OK. Now, on a flash drive will dump folder. With dump files folders take the &#8220;name of network-vifi<strong>.cap<\/strong>&#8221; or &#8220;name of network-vifi.hccap&#8221; and load them in the order page\u00a0<a href=\"https:\/\/decrypthash.ru\/en\/restore-passwords-for-wifi-networks\/\"><span style=\"color: blue;\">Restore passwords for WIFI networks<\/span><\/a><\/span><\/p>\n<p><span id=\"result_box\" class=\"\" lang=\"en\" tabindex=\"-1\">We expect the implementation of the order to the service. The end!<\/span><\/p>\n<p><span id=\"result_box\" class=\"short_text\" lang=\"en\" tabindex=\"-1\">Footnotes<\/span>:<\/p>\n<p>*<span id=\"result_box\" class=\"short_text\" lang=\"en\" tabindex=\"-1\">To exit, press <strong>X<\/strong><\/span><\/p>\n<p>**<span id=\"result_box\" class=\"short_text\" lang=\"en\" tabindex=\"-1\">Selecting the start point through<\/span> Graphics mode (MATE)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Interception of data network wifi or seizure HANDSHAKE (handshake) This article will focus on the method of intercepting data packets wifi network, and on the other is called the intercept (the seizure) handshake packets WiFi network. Sometimes a lot of ways to capture these &#8220;delicious&#8221; data packets. In the current paper recovery service wifi passwords [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":446,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-439","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/decrypthash.ru\/en\/wp-json\/wp\/v2\/pages\/439","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/decrypthash.ru\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/decrypthash.ru\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/decrypthash.ru\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/decrypthash.ru\/en\/wp-json\/wp\/v2\/comments?post=439"}],"version-history":[{"count":4,"href":"https:\/\/decrypthash.ru\/en\/wp-json\/wp\/v2\/pages\/439\/revisions"}],"predecessor-version":[{"id":784,"href":"https:\/\/decrypthash.ru\/en\/wp-json\/wp\/v2\/pages\/439\/revisions\/784"}],"up":[{"embeddable":true,"href":"https:\/\/decrypthash.ru\/en\/wp-json\/wp\/v2\/pages\/446"}],"wp:attachment":[{"href":"https:\/\/decrypthash.ru\/en\/wp-json\/wp\/v2\/media?parent=439"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}