{"id":452,"date":"2016-04-28T21:12:58","date_gmt":"2016-04-28T18:12:58","guid":{"rendered":"https:\/\/decrypthash.ru\/en\/?page_id=452"},"modified":"2016-12-21T15:08:31","modified_gmt":"2016-12-21T12:08:31","slug":"password-from-excel-or-word-office-documents-lost-you-need-a-password-from-the-library","status":"publish","type":"page","link":"https:\/\/decrypthash.ru\/en\/articles-and-help\/password-from-excel-or-word-office-documents-lost-you-need-a-password-from-the-library\/","title":{"rendered":"Password from Excel or Word office documents lost? You need a password from the library?"},"content":{"rendered":"<h1><span id=\"result_box\" class=\"\" lang=\"en\" tabindex=\"-1\"><span title=\"\u0418\u043d\u0441\u0442\u0440\u0443\u043a\u0446\u0438\u044f \u043f\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044e John the Ripper \u0432 \u0438\u0437\u0432\u043b\u0435\u0447\u0435\u043d\u0438\u0438 \u0445\u0435\u0448\u0430 \u0438\u0437 \u0444\u0430\u0439\u043b\u043e\u0432 excel, word, zip, rar \u0438 \u0434\u0440. \u0444\u0430\u0439\u043b\u043e\u0432 \">Instructions for using John the Ripper to extract hashes from excel files, word, zip, rar, etc. Files<\/span><\/span><\/h1>\n<p><span id=\"result_box\" class=\"\" lang=\"en\" tabindex=\"-1\"><span title=\"\u0418\u043d\u0441\u0442\u0440\u0443\u043a\u0446\u0438\u044f \u043f\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044e John the Ripper \u0432 \u0438\u0437\u0432\u043b\u0435\u0447\u0435\u043d\u0438\u0438 \u0445\u0435\u0448\u0430 \u0438\u0437 \u0444\u0430\u0439\u043b\u043e\u0432 excel, word, zip, rar \u0438 \u0434\u0440. \u0444\u0430\u0439\u043b\u043e\u0432 \"><br \/>\n<\/span><span title=\"\u0414\u043b\u044f \u043c\u043d\u043e\u0433\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u043f\u043e \u0432\u043e\u0441\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044e (\u0432\u0437\u043b\u043e\u043c\u0443) \u043f\u0430\u0440\u043e\u043b\u0435\u0439 \u043a \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0430\u043c Microsoft Office Excel , Microsoft Word \u0438\u043b\u0438 \u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440 \u043a \u0430\u0440\u0445\u0438\u0432\u0430\u043c zip \u0438 rar \u0442\u0440\u0435\u0431\u0443\u0435\u0442\u0441\u044f \u0445\u0435\u0448 \u043f\u0430\u0440\u043e\u043b\u044f \u0434\u043b\u044f \u0440\u0430\u0441\u0448\u0438\u0444\u0440\u043e\u0432\u043a\u0438 \u0438 \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u044f \u043f\u0430\u0440\u043e\u043b\u044f \u043a \u0434\u0430\u043d\u043d\u044b\u043c \u0444\u0430\u0439\u043b\u0430\u043c.\">For many programs to restore (hacking) <strong>passwords<\/strong> to Microsoft Office <strong>Excel<\/strong> <strong>documents<\/strong>, Microsoft <strong>Word<\/strong>, or for example to archives zip and <strong>rar password<\/strong> hash is required to decrypt and receive a password to the data files. <\/span><span title=\"\u041c\u043d\u043e\u0433\u0438\u0435 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u044b \u043f\u043e \u043a\u043e\u043c\u043f\u044c\u044e\u0442\u0435\u0440\u043d\u043e\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 \u0434\u0430\u043d\u043d\u043d\u044b\u0435 \u0445\u0435\u0448\u0438 \u0434\u043b\u044f \u0432\u0437\u043b\u043e\u043c\u0430 \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u043e\u0432 Microsoft Office Excel, \u0432\u0437\u043b\u043e\u043c\u0443 \u0430\u0440\u0445\u0438\u0432\u043e\u0432 rar \u0438 zip, \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u0435 \u043f\u0430\u0440\u043e\u043b\u044f \u043e\u0442 \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0430 word. \">Many computer security experts use Dunn hashes to <span style=\"text-decoration: underline;\">crack Microsoft Office Excel documents<\/span>, hacking rar and zip archives, retrieving the password from a document word.<\/span><\/span><\/p>\n<p><span title=\"\u041f\u043e \u044d\u0442\u043e\u043c\u0443 \u0447\u0442\u043e\u0431\u044b \u043d\u0435 \u043f\u0435\u0440\u0435\u0434\u0430\u0432\u0430\u0442\u044c \u0444\u0430\u0439\u043b \u0441 \u0441\u0435\u043a\u0440\u0435\u0442\u043d\u044b\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u043c\u0438 \u0432 \u0447\u0443\u0436\u0438\u0435 \u0440\u0443\u043a\u0438, \u0430 \u043f\u0430\u0440\u043e\u043b\u044c \u043e\u0442 \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0430 \u043e\u0447\u0435\u043d\u044c \u043d\u0443\u0436\u0435\u043d \u0432 \u0434\u0435\u043b\u043e \u0432\u0441\u0442\u0443\u043f\u0430\u0435\u0442 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0430 \u0434\u043b\u044f \u0438\u0437\u0432\u043b\u0435\u0447\u0435\u043d\u0438\u044f \u0437\u0430\u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0433\u043e \u043f\u0430\u0440\u043e\u043b\u044f.\">For this not to send a file with secret data into the wrong hands, and the password of the document is very necessary in the case enters the program to extract the encrypted password. <\/span><span title=\"\u041f\u043e\u0441\u043b\u0435 \u0438\u0437\u0432\u043b\u0435\u0447\u0435\u043d\u0438\u0435 \u043e\u0441\u0442\u0430\u0435\u0442\u0441\u044f \u0442\u043e\u043b\u044c\u043a\u043e \u043f\u0435\u0440\u0435\u0434\u0430\u0442\u044c \u0445\u0435\u0448 \u043f\u0430\u0440\u043e\u043b\u044f \u0432 \u043d\u0443\u0436\u043d\u044b\u0435 \u0440\u0443\u043a\u0438 \u0438 \u0432\u044b \u043d\u0435 \u0442\u0435\u0440\u044f\u044f \u0441\u0435\u043a\u0440\u0435\u0442\u043d\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435, \u043f\u043e\u043b\u0443\u0447\u0430\u0435\u0442\u0435 \u043f\u0430\u0440\u043e\u043b\u044c \u043e\u0442 \u0432\u0430\u0448\u0435\u0433\u043e \u043a \u043f\u0440\u0438\u043c\u0435\u0440\u0443 \u043b\u044e\u0431\u0438\u043c\u043e\u0433\u043e \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0430. \">After the extraction is only to convey the hash password in the right hands, and you&#8217;re not losing sensitive data, you get the password from your favorite paper for example.<\/span><\/p>\n<p><span title=\"\u041d\u0435 \u0437\u0430\u0431\u044b\u0432\u0430\u0435\u043c \u043d\u0430 \u0434\u0430\u043d\u043d\u043e\u043c \u0441\u0430\u0439\u0442\u0435 \u0442\u0430\u043a\u0436\u0435 \u0437\u0430\u043d\u0438\u043c\u0430\u044e\u0442\u0441\u044f \u0432\u043e\u0441\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435\u043c \u043f\u0430\u0440\u043e\u043b\u044f \u043a \u0432\u0430\u0448\u0438\u043c \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0430\u043c, \u0430\u0440\u0445\u0438\u0432\u0430\u043c \u0438 \u0434\u0440\u0443\u0433\u0438\u043c \u0440\u0430\u0437\u043d\u044b\u043c \u0444\u0430\u0439\u043b\u0430\u043c, \u0432\u0441\u0435 \u044d\u0442\u043e \u043c\u043e\u0436\u043d\u043e \u0441\u0434\u0435\u043b\u0430\u0442\u044c \u0447\u0435\u0440\u0435\u0437 \u0444\u043e\u0440\u043c\u0443 \u0440\u0430\u0441\u0448\u0438\u0444\u0440\u043e\u0432\u043a\u0438 \u0445\u0435\u0448\u0430 \"><span style=\"color: #ff0000;\">Do not forget this site are also involved in the restoration of the password to your documents, files and other different files, all this can be done through the form of <a style=\"color: #ff0000;\" href=\"\/?page_id=437\">hash decryption<\/a><\/span><\/span><\/p>\n<p><span title=\"\u041a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u044b \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b John the Ripper \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0442\u0441\u044f \u0438\u0437\u0432\u043b\u0435\u043a\u0430\u0442\u044c \u0437\u0430\u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u043f\u0430\u0440\u043e\u043b\u0438 \u0438\u0437 \u0444\u0430\u0439\u043b\u043e\u0432, \u0434\u043b\u044f \u0438\u0445 \u0434\u0430\u043b\u044c\u043d\u0435\u0439\u0448\u0435\u0439 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0438. \">Components of the program <strong>John the Ripper<\/strong> allows you to retrieve encrypted passwords from files for further processing.<\/span><\/p>\n<p><span title=\"\u0414\u043b\u044f \u043d\u0430\u0447\u0430\u043b\u0430 \u043d\u0430\u043c \u043f\u043e\u0442\u0440\u0435\u0431\u0443\u0435\u0442\u0441\u044f \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0443 Python (\u041f\u0438\u0442\u043e\u043d).\">First, we need to establish a platform Python (Python). <\/span><span title=\"\u0417\u0430\u0433\u0440\u0443\u0437\u0438\u0442\u044c \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043e\u0447\u043d\u044b\u0439 \u0444\u0430\u0439\u043b \u043c\u043e\u0436\u043d\u043e \u0441 \u043e\u0444\u0438\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0440\u0435\u0441\u0443\u0440\u0441\u0430 \u044f\u0437\u044b\u043a\u0430 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f Python.org \">Download the installation file from the official language of the resource Python.org<br \/>\n<\/span><span title=\"\u041d\u043e \u0441\u043d\u0430\u0447\u0430\u043b\u0430 \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u0438\u043c\u0441\u044f \u043a\u0430\u043a\u0430\u044f \u0443 \u043d\u0430\u0441 \u0441\u0442\u043e\u0438\u0442 \u0432\u0435\u0440\u0441\u0438\u044f windows, 32 \u0438\u043b\u0438 64 \u0431\u0438\u0442\u043d\u0430\u044f. \">But first we have to determine which version is windows, 32 or 64 bit.<br \/>\n<\/span><span title=\"\u041f\u043e\u0441\u043b\u0435 \u044d\u0442\u043e\u0433\u043e \u0441\u043a\u0430\u0447\u0438\u0432\u0430\u0435\u043c \u0434\u043b\u044f 32-\u0445 \u0431\u0438\u0442\u043d\u043e\u0439 \u0434\u0430\u043d\u043d\u044b\u0439 \u0444\u0430\u0439\u043b ,\u0434\u043b\u044f 64-\u0445 \u0431\u0438\u0442\u043d\u043e\u0439 \u0434\u0440\u0443\u0433\u043e\u0439 \u0444\u0430\u0439\u043b \">After that, download the <a href=\"http:\/\/www.python.org\/ftp\/python\/3.4.4\/python-3.4.4rc1.msi\" target=\"_blank\">32-bit<\/a> active file for <a href=\"http:\/\/www.python.org\/ftp\/python\/3.4.4\/python-3.4.4rc1.amd64.msi\" target=\"_blank\">64-bit<\/a> another file<br \/>\n<\/span><span title=\"\u0423\u0441\u0442\u0430\u043d\u0430\u0432\u043b\u0438\u0432\u0430\u0435\u043c Python \u0438 \u0441\u043a\u0430\u0447\u0438\u0432\u0430\u0435\u043c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u044b John the Ripper \u043e\u0442\u0441\u044e\u0434\u0430. \">Install Python and download the components of John the Ripper <a href=\"https:\/\/decrypthash.ru\/soft\/run.zip\" target=\"_blank\"><span style=\"color: #ff0000;\"><strong>here<\/strong><\/span><\/a>.<\/span><\/p>\n<p><span title=\"\u0417\u0430\u043f\u0443\u0441\u043a\u0430\u0435\u043c 1.bat \u0438 \u043f\u0438\u0448\u0435\u043c \u043a\u043e\u043c\u0430\u043d\u0434\u0443 &quot;office2john.py test.xlsx&quot; \">Run 1.bat and write command &#8220;office2john.py test.xlsx&#8221;<br \/>\n<\/span><span title=\"\u0413\u0434\u0435 office2john.py \u044d\u0442\u043e \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442 \u0434\u043b\u044f \u0438\u0437\u0432\u043b\u0435\u0447\u0435\u043d\u0438\u044f \u0445\u0435\u0448\u0430 \u0438\u0437 \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0430 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b Excel, \u0430 \u0444\u0430\u0439\u043b test.xlsx \u0438\u0441\u043a\u043e\u043c\u044b\u0439 \u0437\u0430\u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442. \">Where office2john.py this component to extract the hash of the document in Excel, and test.xlsx desired encrypted document file.<\/span><\/p>\n<p><span title=\"\u0418 \u043f\u043e\u043b\u0443\u0447\u0430\u0435\u043c \u043d\u0430 \u0432\u044b\u0445\u043e\u0434\u0435 : \">And we get the output:<br \/>\n<\/span><span title=\"test.xlsx:$office$*2007*20*128*16*e1db738ba433eec54c9b7b3d0137ef42*73abbaf2ee1b9 \">test.xlsx: $ office $ * 2007 * 20 * 128 * 16 * e1db738ba433eec54c9b7b3d0137ef42 * 73abbaf2ee1b9<br \/>\n<\/span><span title=\"89cf615a478a92ebb44*ab6d08e7b07aae97c89ec5d71186de9fe6da934b \">89cf615a478a92ebb44 * ab6d08e7b07aae97c89ec5d71186de9fe6da934b<\/span><\/p>\n<p><span title=\"&quot;test.xlsx:&quot; \u043c\u043e\u0436\u043d\u043e \u0443\u0431\u0440\u0430\u0442\u044c,\u044d\u0442\u043e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e \u0444\u0430\u0439\u043b\u0435, \u0430 $office$*2007*20*128*16*e1db738ba433eec54c9b7b3d0137ef42*73abbaf2ee1b9 \">&#8220;Test.xlsx:&#8221; You can remove this information on file, and an office $ $ * 2007 * 20 * 128 * 16 * e1db738ba433eec54c9b7b3d0137ef42 * 73abbaf2ee1b9<br \/>\n<\/span><span title=\"89cf615a478a92ebb44*ab6d08e7b07aae97c89ec5d71186de9fe6da934b \u043d\u0443\u0436\u043d\u044b\u0439 \u043d\u0430\u043c \u0445\u0435\u0448 \u043f\u0430\u0440\u043e\u043b\u044f \u043e\u0442 \u0444\u0430\u0439\u043b\u0430. \">89cf615a478a92ebb44 * ab6d08e7b07aae97c89ec5d71186de9fe6da934b want us to hash the password from the file.<\/span><\/p>\n<p><span title=\"\u041f\u043e \u0442\u0430\u043a\u043e\u043c\u0443 \u0436\u0435 \u043f\u0440\u0438\u043d\u0446\u0438\u043f\u0443 \u043c\u043e\u0436\u043d\u043e \u0438 \u0434\u0435\u0439\u0441\u0442\u0432\u043e\u0432\u0430\u0442\u044c \u0432 \u043e\u0442\u043d\u043e\u0448\u0435\u043d\u0438\u0438 \u0434\u0440\u0443\u0433\u0438\u0445 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u043e\u0432 \u0432 \u043f\u0430\u043f\u043a\u0435 run \">The same principle can be and to act in relation to other components in the run folder<\/span><\/p>\n<p><span title=\"\u041a \u043f\u0440\u0438\u043c\u0435\u0440\u0443 : \">For example :<br \/>\n<\/span><span title=\"\u0444\u0430\u0439\u043b odf2john.py \u0418\u0437\u0432\u043b\u0435\u043a\u0430\u0435\u0442 \u0445\u0435\u0448 \u0438\u0437 \u0444\u0430\u0439\u043b\u043e\u0432 ODF.\">It retrieves the hash file <strong>odf2john.py<\/strong> of ODF files. <\/span><span title=\"\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435: .\/odf2john.py &lt;\u0444\u0430\u0439\u043b\u044b ODF&gt; \">Use: .\/odf2john.py &lt;files ODF&gt;<\/span><\/p>\n<p><span title=\"\u0444\u0430\u0439\u043b pdf2john.py \u0418\u0437\u0432\u043b\u0435\u043a\u0430\u0435\u0442 \u0445\u0435\u0448 \u0438\u0437 \u0437\u0430\u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u0444\u0430\u0439\u043b\u043e\u0432 PDF.\">file <strong>pdf2john.py<\/strong> Retrieves a hash of the encrypted PDF file. <\/span><span title=\"\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435: pdf2john.py &lt;PDF \u0444\u0430\u0439\u043b(\u044b)&gt; \">Use: pdf2john.py &lt;PDF file (s)&gt;<\/span><\/p>\n<p><span title=\"\u0444\u0430\u0439\u043b rar2john \u0418\u0437\u0432\u043b\u0435\u043a\u0430\u0435\u0442 \u0445\u0435\u0448 \u0438\u0437 \u0437\u0430\u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u0430\u0440\u0445\u0438\u0432\u043e\u0432 RAR.\">file <strong>rar2john<\/strong> Retrieves a hash of the encrypted RAR archives. <\/span><span title=\"\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435: .\/rar2john [-i &lt;\u0440\u044f\u0434\u043d\u044b\u0439 \u043f\u043e\u0440\u043e\u0433&gt;] &lt;rar \u0444\u0430\u0439\u043b(\u044b)&gt; \">Use: .\/rar2john [-i &lt;inline threshold&gt;] &lt;rar file (s)&gt;<br \/>\n<\/span><span title=\"\u041f\u043e\u0440\u043e\u0433 \u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e - 1024 \u0431\u0430\u0439\u0442\u0430(\u0434\u0430\u043d\u043d\u044b\u0435 \u043c\u0435\u043d\u044c\u0448\u0435 \u0447\u0435\u043c \u044d\u0442\u0438 \u0431\u0443\u0434\u0443\u0442 \u043f\u043e\u043c\u0435\u0449\u0435\u043d\u044b \u0432 \u0440\u044f\u0434) \">The default threshold &#8211; 1024 bytes (less than these data will be placed in series)<\/span><\/p>\n<p><span title=\"\u0444\u0430\u0439\u043b truecrypt2john.py \u0423\u0442\u0438\u043b\u0438\u0442\u0430 \u0434\u043b\u044f \u0438\u043c\u043f\u043e\u0440\u0442\u0430 \u0442\u043e\u043c\u0430 TrueCrypt \u0432 \u0444\u043e\u0440\u043c\u0430\u0442 \u043f\u043e\u043d\u044f\u0442\u043d\u044b\u0439 \u0434\u043b\u044f John The Ripper\"><strong>truecrypt2john.py<\/strong> file import utility for the TrueCrypt volume to a format understandable to John The Ripper<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Instructions for using John the Ripper to extract hashes from excel files, word, zip, rar, etc. Files For many programs to restore (hacking) passwords to Microsoft Office Excel documents, Microsoft Word, or for example to archives zip and rar password hash is required to decrypt and receive a password to the data files. Many computer [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":446,"menu_order":5,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-452","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/decrypthash.ru\/en\/wp-json\/wp\/v2\/pages\/452","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/decrypthash.ru\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/decrypthash.ru\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/decrypthash.ru\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/decrypthash.ru\/en\/wp-json\/wp\/v2\/comments?post=452"}],"version-history":[{"count":2,"href":"https:\/\/decrypthash.ru\/en\/wp-json\/wp\/v2\/pages\/452\/revisions"}],"predecessor-version":[{"id":528,"href":"https:\/\/decrypthash.ru\/en\/wp-json\/wp\/v2\/pages\/452\/revisions\/528"}],"up":[{"embeddable":true,"href":"https:\/\/decrypthash.ru\/en\/wp-json\/wp\/v2\/pages\/446"}],"wp:attachment":[{"href":"https:\/\/decrypthash.ru\/en\/wp-json\/wp\/v2\/media?parent=452"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}