{"id":25474,"date":"2020-10-09T14:02:51","date_gmt":"2020-10-09T14:02:51","guid":{"rendered":"https:\/\/udsenterprise.com\/kali-linux-how-install-use-distro-ethical-hacking\/"},"modified":"2023-09-21T12:19:42","modified_gmt":"2023-09-21T12:19:42","slug":"kali-linux-how-install-use-distro-ethical-hacking","status":"publish","type":"post","link":"https:\/\/udsenterprise.com\/en\/kali-linux-how-install-use-distro-ethical-hacking\/","title":{"rendered":"Kali Linux: how to install and use the distro for ethical hacking"},"content":{"rendered":"<p><strong>There are different ways to install this distro<\/strong>: directly on a computer, either desktop or laptop, on a virtualization platform, in AWS or Azure cloud, or on a USB boot disk. It can also be installed on Windows 10 natively using the command line, and on Mac, either as a primary or secondary system.<\/p>\n<p>One of the easiest ways to install Kali Linux is to do the process from <strong>VirtualBox<\/strong>. <strong> At <a href=\"https:\/\/www.guru99.com\/kali-linux-tutorial.html\" target=\"_blank\" rel=\"nofollow noopener\">this link<\/a><\/strong> there is a complete <strong>tutorial<\/strong> that describes all the steps to follow to launch this distribution successfully in this way. If you are not familiar with its <strong>graphical user interface (GUI)<\/strong>, you will find a description of its main sections in the same article.<\/p>\n<p>An ideal supplement to use together with Kali Linux is <strong>Network Mapper<\/strong>. Better known as <strong>Nmap<\/strong>, it is an <strong>Open Source and free<\/strong> software used to analyze computer networks, detect connected devices, services and operating systems. Its functions can be customized through scripts to <strong>discover vulnerabilities and provide advanced threat detection services<\/strong>.<\/p>\n<p>Another interesting tool is <strong>Metasploit Framework<\/strong>. Also Open Source, it is of great help when collecting information about security vulnerabilities and performing &#8220;<strong>Pentesting<\/strong>&#8221; (penetration tests). It can also be used to develop <strong>signatures for intrusion detection systems<\/strong>.<\/p>\n<p>To learn more about Kali Linux, the two tools mentioned in this post and the possibilities offered by their joint use, see the <strong>original article published at <a href=\"https:\/\/www.guru99.com\/kali-linux-tutorial.html\" target=\"_blank\" rel=\"nofollow noopener\">Guru99<\/a><\/strong>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Kali Linux<\/strong> is a distribution based on <strong>Debian<\/strong> and specially designed for <strong>computer security<\/strong> audits. Developed by Offensive Security, it incorporates a wide catalog of tools to carry out <strong>computer forensics, penetration and reverse engineering testing<\/strong>&#8230; It can be truly useful for professionals in charge of IT security in an organization, administrators and network architects, security auditors, or anyone interested in learning about <strong>how to discover and even exploit vulnerabilities<\/strong>.<\/p>\n","protected":false},"author":2,"featured_media":10725,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1023,931,926],"tags":[1024,934,928],"class_list":["post-25474","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-linux-en","category-open-source","category-security","tag-linux-en","tag-open-source","tag-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Kali Linux: how to install and use the distro for ethical hacking<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/udsenterprise.com\/en\/kali-linux-how-install-use-distro-ethical-hacking\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Kali Linux: how to install and use the distro for ethical hacking\" \/>\n<meta property=\"og:description\" content=\"Kali Linux is a distribution based on Debian and specially designed for computer security audits. Developed by Offensive Security, it incorporates a wide catalog of tools to carry out computer forensics, penetration and reverse engineering testing... It can be truly useful for professionals in charge of IT security in an organization, administrators and network architects, security auditors, or anyone interested in learning about how to discover and even exploit vulnerabilities.\" \/>\n<meta property=\"og:site_name\" content=\"UDS Enterprise\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-09T14:02:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-21T12:19:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/udsenterprise.com\/wp-content\/uploads\/2022\/11\/img-linea-blanca.gif\" \/>\n\t<meta property=\"og:image:width\" content=\"67\" \/>\n\t<meta property=\"og:image:height\" content=\"4\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/gif\" \/>\n<meta name=\"author\" content=\"UDS Enterprise Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/udsenterprise.com\/wp-content\/uploads\/2022\/11\/img-linea-blanca.gif\" \/>\n<meta name=\"twitter:creator\" content=\"@VirtualCable_\" \/>\n<meta name=\"twitter:site\" content=\"@VirtualCable_\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"UDS Enterprise Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/kali-linux-how-install-use-distro-ethical-hacking\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/kali-linux-how-install-use-distro-ethical-hacking\\\/\"},\"author\":{\"name\":\"UDS Enterprise Team\",\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/#\\\/schema\\\/person\\\/83f63ed09241332cf10f8f6e7bbdd920\"},\"headline\":\"Kali Linux: how to install and use the distro for ethical hacking\",\"datePublished\":\"2020-10-09T14:02:51+00:00\",\"dateModified\":\"2023-09-21T12:19:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/kali-linux-how-install-use-distro-ethical-hacking\\\/\"},\"wordCount\":245,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/kali-linux-how-install-use-distro-ethical-hacking\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/udsenterprise.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/kali-linux-tutorial.jpg\",\"keywords\":[\"Linux-en\",\"Open source\",\"Security\"],\"articleSection\":[\"Linux-en\",\"Open source\",\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/udsenterprise.com\\\/en\\\/kali-linux-how-install-use-distro-ethical-hacking\\\/#respond\"]}]},{\"@type\":[\"WebPage\",\"ItemPage\"],\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/kali-linux-how-install-use-distro-ethical-hacking\\\/\",\"url\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/kali-linux-how-install-use-distro-ethical-hacking\\\/\",\"name\":\"Kali Linux: how to install and use the distro for ethical hacking\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/kali-linux-how-install-use-distro-ethical-hacking\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/kali-linux-how-install-use-distro-ethical-hacking\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/udsenterprise.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/kali-linux-tutorial.jpg\",\"datePublished\":\"2020-10-09T14:02:51+00:00\",\"dateModified\":\"2023-09-21T12:19:42+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/kali-linux-how-install-use-distro-ethical-hacking\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/udsenterprise.com\\\/en\\\/kali-linux-how-install-use-distro-ethical-hacking\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/kali-linux-how-install-use-distro-ethical-hacking\\\/#primaryimage\",\"url\":\"https:\\\/\\\/udsenterprise.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/kali-linux-tutorial.jpg\",\"contentUrl\":\"https:\\\/\\\/udsenterprise.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/kali-linux-tutorial.jpg\",\"width\":800,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/kali-linux-how-install-use-distro-ethical-hacking\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Linux-en\",\"item\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/category\\\/linux-en\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Kali Linux: how to install and use the distro for ethical hacking\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/\",\"name\":\"UDS Enterprise\",\"description\":\"UDS Enterprise es una soluci\u00f3n segura y flexible para virtualizaci\u00f3n de escritorios y acceso remoto, compatible con Windows, Linux y macOS.\",\"publisher\":{\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/#organization\"},\"alternateName\":\"UDS Enterprise\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/#organization\",\"name\":\"UDS Enterprise\",\"alternateName\":\"UDS Enterprise\",\"url\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/udsenterprise.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/img-logotipo-top-00-udsenterprise.jpg\",\"contentUrl\":\"https:\\\/\\\/udsenterprise.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/img-logotipo-top-00-udsenterprise.jpg\",\"width\":300,\"height\":202,\"caption\":\"UDS Enterprise\"},\"image\":{\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/VirtualCable_\",\"https:\\\/\\\/es.linkedin.com\\\/company\\\/virtualcable\",\"https:\\\/\\\/www.youtube.com\\\/@UDSEnterprise\"],\"description\":\"Virtual Cable es una empresa espa\u00f1ola especializada en soluciones de virtualizaci\u00f3n del puesto de trabajo. Su producto estrella, UDS Enterprise, es un broker de conexiones multiplataforma que permite la administraci\u00f3n y despliegue de escritorios virtuales Windows y Linux, la virtualizaci\u00f3n de aplicaciones y el acceso remoto a equipos f\u00edsicos con sistemas operativos Windows, Linux y macOS\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/#\\\/schema\\\/person\\\/83f63ed09241332cf10f8f6e7bbdd920\",\"name\":\"UDS Enterprise Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b415c61bc26d023da7c12ea873f9088732accd901f13dd03e6db59c6232a06a9?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b415c61bc26d023da7c12ea873f9088732accd901f13dd03e6db59c6232a06a9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b415c61bc26d023da7c12ea873f9088732accd901f13dd03e6db59c6232a06a9?s=96&d=mm&r=g\",\"caption\":\"UDS Enterprise Team\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Kali Linux: how to install and use the distro for ethical hacking","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/udsenterprise.com\/en\/kali-linux-how-install-use-distro-ethical-hacking\/","og_locale":"en_US","og_type":"article","og_title":"Kali Linux: how to install and use the distro for ethical hacking","og_description":"Kali Linux is a distribution based on Debian and specially designed for computer security audits. Developed by Offensive Security, it incorporates a wide catalog of tools to carry out computer forensics, penetration and reverse engineering testing... It can be truly useful for professionals in charge of IT security in an organization, administrators and network architects, security auditors, or anyone interested in learning about how to discover and even exploit vulnerabilities.","og_site_name":"UDS Enterprise","article_published_time":"2020-10-09T14:02:51+00:00","article_modified_time":"2023-09-21T12:19:42+00:00","og_image":[{"width":67,"height":4,"url":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2022\/11\/img-linea-blanca.gif","type":"image\/gif"}],"author":"UDS Enterprise Team","twitter_card":"summary_large_image","twitter_image":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2022\/11\/img-linea-blanca.gif","twitter_creator":"@VirtualCable_","twitter_site":"@VirtualCable_","twitter_misc":{"Written by":"UDS Enterprise Team","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/udsenterprise.com\/en\/kali-linux-how-install-use-distro-ethical-hacking\/#article","isPartOf":{"@id":"https:\/\/udsenterprise.com\/en\/kali-linux-how-install-use-distro-ethical-hacking\/"},"author":{"name":"UDS Enterprise Team","@id":"https:\/\/udsenterprise.com\/en\/#\/schema\/person\/83f63ed09241332cf10f8f6e7bbdd920"},"headline":"Kali Linux: how to install and use the distro for ethical hacking","datePublished":"2020-10-09T14:02:51+00:00","dateModified":"2023-09-21T12:19:42+00:00","mainEntityOfPage":{"@id":"https:\/\/udsenterprise.com\/en\/kali-linux-how-install-use-distro-ethical-hacking\/"},"wordCount":245,"commentCount":0,"publisher":{"@id":"https:\/\/udsenterprise.com\/en\/#organization"},"image":{"@id":"https:\/\/udsenterprise.com\/en\/kali-linux-how-install-use-distro-ethical-hacking\/#primaryimage"},"thumbnailUrl":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/07\/kali-linux-tutorial.jpg","keywords":["Linux-en","Open source","Security"],"articleSection":["Linux-en","Open source","Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/udsenterprise.com\/en\/kali-linux-how-install-use-distro-ethical-hacking\/#respond"]}]},{"@type":["WebPage","ItemPage"],"@id":"https:\/\/udsenterprise.com\/en\/kali-linux-how-install-use-distro-ethical-hacking\/","url":"https:\/\/udsenterprise.com\/en\/kali-linux-how-install-use-distro-ethical-hacking\/","name":"Kali Linux: how to install and use the distro for ethical hacking","isPartOf":{"@id":"https:\/\/udsenterprise.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/udsenterprise.com\/en\/kali-linux-how-install-use-distro-ethical-hacking\/#primaryimage"},"image":{"@id":"https:\/\/udsenterprise.com\/en\/kali-linux-how-install-use-distro-ethical-hacking\/#primaryimage"},"thumbnailUrl":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/07\/kali-linux-tutorial.jpg","datePublished":"2020-10-09T14:02:51+00:00","dateModified":"2023-09-21T12:19:42+00:00","breadcrumb":{"@id":"https:\/\/udsenterprise.com\/en\/kali-linux-how-install-use-distro-ethical-hacking\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/udsenterprise.com\/en\/kali-linux-how-install-use-distro-ethical-hacking\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/udsenterprise.com\/en\/kali-linux-how-install-use-distro-ethical-hacking\/#primaryimage","url":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/07\/kali-linux-tutorial.jpg","contentUrl":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/07\/kali-linux-tutorial.jpg","width":800,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/udsenterprise.com\/en\/kali-linux-how-install-use-distro-ethical-hacking\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/udsenterprise.com\/en\/"},{"@type":"ListItem","position":2,"name":"Linux-en","item":"https:\/\/udsenterprise.com\/en\/category\/linux-en\/"},{"@type":"ListItem","position":3,"name":"Kali Linux: how to install and use the distro for ethical hacking"}]},{"@type":"WebSite","@id":"https:\/\/udsenterprise.com\/en\/#website","url":"https:\/\/udsenterprise.com\/en\/","name":"UDS Enterprise","description":"UDS Enterprise es una soluci\u00f3n segura y flexible para virtualizaci\u00f3n de escritorios y acceso remoto, compatible con Windows, Linux y macOS.","publisher":{"@id":"https:\/\/udsenterprise.com\/en\/#organization"},"alternateName":"UDS Enterprise","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/udsenterprise.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/udsenterprise.com\/en\/#organization","name":"UDS Enterprise","alternateName":"UDS Enterprise","url":"https:\/\/udsenterprise.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/udsenterprise.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/05\/img-logotipo-top-00-udsenterprise.jpg","contentUrl":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/05\/img-logotipo-top-00-udsenterprise.jpg","width":300,"height":202,"caption":"UDS Enterprise"},"image":{"@id":"https:\/\/udsenterprise.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/VirtualCable_","https:\/\/es.linkedin.com\/company\/virtualcable","https:\/\/www.youtube.com\/@UDSEnterprise"],"description":"Virtual Cable es una empresa espa\u00f1ola especializada en soluciones de virtualizaci\u00f3n del puesto de trabajo. Su producto estrella, UDS Enterprise, es un broker de conexiones multiplataforma que permite la administraci\u00f3n y despliegue de escritorios virtuales Windows y Linux, la virtualizaci\u00f3n de aplicaciones y el acceso remoto a equipos f\u00edsicos con sistemas operativos Windows, Linux y macOS"},{"@type":"Person","@id":"https:\/\/udsenterprise.com\/en\/#\/schema\/person\/83f63ed09241332cf10f8f6e7bbdd920","name":"UDS Enterprise Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b415c61bc26d023da7c12ea873f9088732accd901f13dd03e6db59c6232a06a9?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b415c61bc26d023da7c12ea873f9088732accd901f13dd03e6db59c6232a06a9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b415c61bc26d023da7c12ea873f9088732accd901f13dd03e6db59c6232a06a9?s=96&d=mm&r=g","caption":"UDS Enterprise Team"}}]}},"_links":{"self":[{"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/posts\/25474","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/comments?post=25474"}],"version-history":[{"count":1,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/posts\/25474\/revisions"}],"predecessor-version":[{"id":27735,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/posts\/25474\/revisions\/27735"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/media\/10725"}],"wp:attachment":[{"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/media?parent=25474"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/categories?post=25474"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/tags?post=25474"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}