{"id":637,"date":"2012-02-01T18:02:30","date_gmt":"2012-02-01T18:02:30","guid":{"rendered":"https:\/\/fir3netwp.gmsrrpobkbd.com\/2012\/02\/01\/tool-sslreport\/"},"modified":"2021-07-31T18:13:56","modified_gmt":"2021-07-31T18:13:56","slug":"tool-sslreport","status":"publish","type":"post","link":"https:\/\/www.fir3net.com\/Programming\/Shell-Scripting\/tool-sslreport.html","title":{"rendered":"Tool – SSLReport"},"content":{"rendered":"

SSLReport provides the ability to scan a network and determine which hosts are running SSL\/TLS based services and then query each of these servers\/ports to determine which ciphers are supported. The output of this is then outputted within a CSV based format.<\/p>\n

Usage<\/strong><\/h3>\n
[root@william images]# bash sslreport.txt 10.1.1.0\/23 home\r\nChecking for Binaries .....\r\n\u00a0*Successful execution of \/usr\/bin\/nmap\r\n\u00a0*Unsuccessful execution of \/usr\/bin\/sslscan<\/pre>\n

Script<\/strong><\/h3>\n
#!\/bin\/bash\r\n\r\n### ENV VAR ###\r\n\r\nexport PATH=\/usr\/kerberos\/sbin:\/usr\/kerberos\/bin:\/usr\/local\/sbin:\/usr\/local\/bin:\/sbin:\/bin:\/usr\/sbin:\/usr\/bin:\/root\/bin\r\n\r\n### VAR ###\r\n\r\nNMAP=\/usr\/bin\/nmap\r\nSSLSCAN=\/usr\/bin\/sslscan\r\nDIR=\/var\/tmp\r\nNETWORK=$1\r\nNETNAME=$2\r\n\r\n\r\n### FUNCTIONS ###\r\n\r\nhelp()\r\n{\r\ncat << EOF Usage: sslreport.sh [ NETWORK \/ MASK ] [ NETWORK NAME ] EOF } ### ERROR CHECKING ### if [ -z \"${NETWORK}\" ] ; then help exit 1 elif [ \"${NETWORK}\" = \"--help\" ] ; then help exit 0 fi if [ -z \"${NETNAME}\" ] ; then echo Error : no network name defined exit 1 fi ### MAIN ### #################### ### BINARY CHECK ### #################### echo \"Checking for Binaries .....\" if ! [ -x \"${NMAP}\" ] ; then echo \\ \\*Unsuccessful execution of \"${NMAP}\" exit 1 else echo \\ \\*Successful execution of \"${NMAP}\" fi if ! [ -x ${SSLSCAN} ] ; then echo \\ \\*Unsuccessful execution of \"${SSLSCAN}\" exit 1 else echo \\ \\*Successful execution of \"${SSLSCAN}\" fi #################### ### RUN NMAP ### #################### echo \"Running NMAP scan ......\" echo \\ \\*\"${NMAP}\" \"${NETWORK}\" -oN \/var\/tmp\/\"${NETNAME}\"-nmap.txt \"${NMAP}\" \"${NETWORK}\" -oN \/var\/tmp\/\"${NETNAME}\"-nmap.txt > \/dev\/null 2>&1\r\n\r\nif ! [ $? = 0 ] ; then\r\necho \" *Nmap failed\"\r\nexit 1\r\nfi\r\n\r\necho \" *Completed\"\r\n\r\n#######################################\r\n### CONVERT NAMP OUT TO TARGET FILE ###\r\n#######################################\r\n\r\n### GREP FOR HTTP ###\r\n\r\necho \"Converting NMAP output to target files ......\"\r\ncat \/var\/tmp\/\"${NETNAME}\"-nmap.txt | grep -Ei \"http|scan report for \" | grep -viE \"https|ssl\" | sed  '\/Nmap scan report for \/ s\/$\/z\/;\/Nmap scan report for \/ s\/^\/Z\/' | \\\r\nsed 's\/Nmap scan report for \/\/g;s\/\\\/tcp.*$\/\/g' | \\\r\n\r\n### PRINT ALL OUTPUT TO SINGLE LINE ###\r\n\r\nwhile read LINE\r\ndo\r\necho -ne $LINE\" \"\r\n\r\ndone | \\\r\n\r\n### CUT LINE INTO MULTIPLE LINES PER IP ###\r\n\r\nsed 's\/Z\/\\n\/g' | \\\r\nsed 's\/\\,$\/\/g' | sed 's\/^.*z$\/\/g;\/^$\/d' | sed 's\/z\/\/g' | \\\r\nsed 's\/$\/\\n\/g' | sed '\/^$\/d' | \\\r\n\r\n### MANIPULATE LINES INTO MULTIPLE LINES PER IP ###\r\n\r\nwhile read IP PORT1 PORT2 PORT3 PORT4 PORT5 PORT6\r\ndo\r\nif ! [ -z \"${PORT1}\" ] ; then\r\necho $IP\\:\"${PORT1}\"\r\nfi\r\nif ! [ -z \"${PORT2}\" ] ; then\r\necho $IP\\:\"${PORT2}\"\r\nfi\r\nif ! [ -z \"${PORT3}\" ] ; then\r\necho $IP\\:\"${PORT3}\"\r\nfi\r\nif ! [ -z \"${PORT4}\" ] ; then\r\necho $IP\\:\"${PORT4}\"\r\nfi\r\nif ! [ -z \"${PORT5}\" ] ; then\r\necho $IP\\:\"${PORT5}\"\r\nfi\r\nif ! [ -z \"${PORT6}\" ] ; then\r\necho $IP\\:\"${PORT6}\"\r\nfi\r\ndone > \"${DIR}\"\/\"${NETNAME}\"\\-http.txt\r\n\r\nif [ $? = 0 ] ; then\r\necho \\ \\*File created : \"${DIR}\"\/\"${NETNAME}\"\\-http.txt\r\nfi\r\n\r\n### GREP FOR HTTPS \/ SSL ###\r\n\r\ncat \/var\/tmp\/\"${NETNAME}\"-nmap.txt | grep -Ei \"https|ssl|scan report for \" | sed  '\/Nmap scan report for \/ s\/$\/z\/;\/Nmap scan report for \/ s\/^\/Z\/' | \\\r\nsed 's\/Nmap scan report for \/\/g;s\/\\\/tcp.*$\/\/g' | \\\r\n\r\n### PRINT ALL OUTPUT TO SINGLE LINE ###\r\n\r\nwhile read LINE\r\ndo\r\necho -ne $LINE\" \"\r\n\r\ndone | \\\r\n\r\n### CUT LINE INTO MULTIPLE LINES PER IP ###\r\n\r\nsed 's\/Z\/\\n\/g' | \\\r\nsed 's\/\\,$\/\/g' | sed 's\/^.*z$\/\/g;\/^$\/d' | sed 's\/z\/\/g' | \\\r\nsed 's\/$\/\\n\/g' | sed '\/^$\/d' | \\\r\n\r\n### MANIPULATE LINES INTO MULTIPLE LINES PER IP ###\r\n\r\nwhile read IP PORT1 PORT2 PORT3 PORT4 PORT5 PORT6\r\ndo\r\nif ! [ -z $PORT1 ] ; then\r\necho $IP\\:$PORT1\r\nfi\r\nif ! [ -z $PORT2 ] ; then\r\necho $IP\\:$PORT2\r\nfi\r\nif ! [ -z $PORT3 ] ; then\r\necho $IP\\:$PORT3\r\nfi\r\nif ! [ -z $PORT4 ] ; then\r\necho $IP\\:$PORT4\r\nfi\r\nif ! [ -z $PORT5 ] ; then\r\necho $IP\\:$PORT5\r\nfi\r\nif ! [ -z $PORT6 ] ; then\r\necho $IP\\:$PORT6\r\nfi\r\ndone > \"${DIR}\"\/\"${NETNAME}\"\\-https.txt\r\n\r\nif [ $? = 0 ] ; then\r\necho \\ \\*File created : \"${DIR}\"\/\"${NETNAME}\"\\-https.txt\r\nfi\r\n\r\necho \" *NMAP to SSLScan target files completed\"\r\n\r\n####################\r\n### RUN SSLSCAN  ###\r\n####################\r\n\r\necho \"Running SSLScan against target file ....... \"\r\necho \\ \\*\"${SSLSCAN}\" --targets=\"${DIR}\"\/\"${NETNAME}\"\\-https.txt > \"${DIR}\"\/\"${NETNAME}\"\\-sslscan.txt\r\n\"${SSLSCAN}\" --targets=\"${DIR}\"\/\"${NETNAME}\"\\-https.txt > \"${DIR}\"\/\"${NETNAME}\"\\-sslscan.txt\r\n\r\necho \" *Completed\"\r\n\r\n###############################\r\n### CONVERT SSLSCAN TO CSV  ###\r\n###############################\r\n\r\necho \"Converting SSLScan ouput to csv ......\"\r\necho\r\n\r\ncat  \"${DIR}\"\/\"${NETNAME}\"\\-sslscan.txt | grep -Ei \"Accepted|on port\" | sed '\/Testing SSL server \/ s\/^\/Z\/' | sed 's\/Testing SSL server \/\/g' | sed 's\/.*Accepted  \/ \/g;s\/ on port\/,\/g;s\/  \/\\|\/g' | \\\r\n\r\n### PRINT ALL OUTPUT TO SINGLE LINE ###\r\n\r\nwhile read LINE\r\ndo\r\necho -ne $LINE,\r\n\r\ndone | \\\r\n\r\n### CUT LINE INTO MULTIPLE LINES PER IP ###\r\n\r\nsed 's\/Z\/\\n\/g' | \\\r\nsed 's\/\\,$\/\/g' | sed 's\/^.*z$\/\/g;\/^$\/d' | sed 's\/z\/\/g' | \\\r\nsed 's\/$\/\\n\/g' | sed '\/^$\/d' | \\\r\n\r\ntee \"${DIR}\"\/\"${NETNAME}\"\\-sslreport.csv\r\n\r\nif [ $? = 0 ] ; then\r\n        echo \" *File created : \"${DIR}\"\/\"${NETNAME}\"\\-sslreport.csv\"\r\n        echo\r\nfi\r\n\r\necho \"SSL Report complete\"\r\necho\r\n\r\nexit 0\r\n<\/pre>\n

 <\/p>\n

 <\/p>\n","protected":false},"excerpt":{"rendered":"

SSLReport provides the ability to scan a network and determine which hosts are running SSL\/TLS based services and then query each of these servers\/ports to determine which ciphers are supported. The output of this is then outputted within a CSV based format. Usage [root@william images]# bash sslreport.txt 10.1.1.0\/23 home Checking for Binaries ….. \u00a0*Successful execution … Read more<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[40],"tags":[],"yoast_head":"\nTool - SSLReport - Fir3net<\/title>\n<meta name=\"description\" content=\"SSLReport provides the ability to scan a network and determine which hosts are running SSL\/TLS based services and then query each of these servers\/ports\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.fir3net.com\/Programming\/Shell-Scripting\/tool-sslreport.html\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tool - SSLReport - Fir3net\" \/>\n<meta property=\"og:description\" content=\"SSLReport provides the ability to scan a network and determine which hosts are running SSL\/TLS based services and then query each of these servers\/ports\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.fir3net.com\/Programming\/Shell-Scripting\/tool-sslreport.html\" \/>\n<meta property=\"og:site_name\" content=\"Fir3net\" \/>\n<meta property=\"article:published_time\" content=\"2012-02-01T18:02:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-31T18:13:56+00:00\" \/>\n<meta name=\"author\" content=\"Rick Donato\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rick Donato\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.fir3net.com\/Programming\/Shell-Scripting\/tool-sslreport.html#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.fir3net.com\/Programming\/Shell-Scripting\/tool-sslreport.html\"},\"author\":{\"name\":\"Rick Donato\",\"@id\":\"https:\/\/www.fir3net.com\/#\/schema\/person\/ab35009601b7687ee1c5310be6038037\"},\"headline\":\"Tool – SSLReport\",\"datePublished\":\"2012-02-01T18:02:30+00:00\",\"dateModified\":\"2021-07-31T18:13:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.fir3net.com\/Programming\/Shell-Scripting\/tool-sslreport.html\"},\"wordCount\":51,\"publisher\":{\"@id\":\"https:\/\/www.fir3net.com\/#organization\"},\"articleSection\":[\"Shell Scripting\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.fir3net.com\/Programming\/Shell-Scripting\/tool-sslreport.html\",\"url\":\"https:\/\/www.fir3net.com\/Programming\/Shell-Scripting\/tool-sslreport.html\",\"name\":\"Tool - SSLReport - Fir3net\",\"isPartOf\":{\"@id\":\"https:\/\/www.fir3net.com\/#website\"},\"datePublished\":\"2012-02-01T18:02:30+00:00\",\"dateModified\":\"2021-07-31T18:13:56+00:00\",\"description\":\"SSLReport provides the ability to scan a network and determine which hosts are running SSL\/TLS based services and then query each of these servers\/ports\",\"breadcrumb\":{\"@id\":\"https:\/\/www.fir3net.com\/Programming\/Shell-Scripting\/tool-sslreport.html#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.fir3net.com\/Programming\/Shell-Scripting\/tool-sslreport.html\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.fir3net.com\/Programming\/Shell-Scripting\/tool-sslreport.html#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.fir3net.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Programming\",\"item\":\"https:\/\/www.fir3net.com\/programming\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Shell Scripting\",\"item\":\"https:\/\/www.fir3net.com\/programming\/shell-scripting\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Tool – SSLReport\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.fir3net.com\/#website\",\"url\":\"https:\/\/www.fir3net.com\/\",\"name\":\"Fir3net\",\"description\":\"Keeping you in the know\",\"publisher\":{\"@id\":\"https:\/\/www.fir3net.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.fir3net.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.fir3net.com\/#organization\",\"name\":\"Fir3net\",\"url\":\"https:\/\/www.fir3net.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.fir3net.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.fir3net.com\/wp-content\/uploads\/Fir3net-Background-Logo-compressed.png\",\"contentUrl\":\"https:\/\/www.fir3net.com\/wp-content\/uploads\/Fir3net-Background-Logo-compressed.png\",\"width\":390,\"height\":88,\"caption\":\"Fir3net\"},\"image\":{\"@id\":\"https:\/\/www.fir3net.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.fir3net.com\/#\/schema\/person\/ab35009601b7687ee1c5310be6038037\",\"name\":\"Rick Donato\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.fir3net.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d75d69a54c0ca3b32c24c3a9703b623c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d75d69a54c0ca3b32c24c3a9703b623c?s=96&d=mm&r=g\",\"caption\":\"Rick Donato\"},\"description\":\"Rick Donato is a Network Automation Architect\/Evangelist and the founder of Packet Coders.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tool - SSLReport - Fir3net","description":"SSLReport provides the ability to scan a network and determine which hosts are running SSL\/TLS based services and then query each of these servers\/ports","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.fir3net.com\/Programming\/Shell-Scripting\/tool-sslreport.html","og_locale":"en_US","og_type":"article","og_title":"Tool - SSLReport - Fir3net","og_description":"SSLReport provides the ability to scan a network and determine which hosts are running SSL\/TLS based services and then query each of these servers\/ports","og_url":"https:\/\/www.fir3net.com\/Programming\/Shell-Scripting\/tool-sslreport.html","og_site_name":"Fir3net","article_published_time":"2012-02-01T18:02:30+00:00","article_modified_time":"2021-07-31T18:13:56+00:00","author":"Rick Donato","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Rick Donato","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.fir3net.com\/Programming\/Shell-Scripting\/tool-sslreport.html#article","isPartOf":{"@id":"https:\/\/www.fir3net.com\/Programming\/Shell-Scripting\/tool-sslreport.html"},"author":{"name":"Rick Donato","@id":"https:\/\/www.fir3net.com\/#\/schema\/person\/ab35009601b7687ee1c5310be6038037"},"headline":"Tool – SSLReport","datePublished":"2012-02-01T18:02:30+00:00","dateModified":"2021-07-31T18:13:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.fir3net.com\/Programming\/Shell-Scripting\/tool-sslreport.html"},"wordCount":51,"publisher":{"@id":"https:\/\/www.fir3net.com\/#organization"},"articleSection":["Shell Scripting"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.fir3net.com\/Programming\/Shell-Scripting\/tool-sslreport.html","url":"https:\/\/www.fir3net.com\/Programming\/Shell-Scripting\/tool-sslreport.html","name":"Tool - SSLReport - Fir3net","isPartOf":{"@id":"https:\/\/www.fir3net.com\/#website"},"datePublished":"2012-02-01T18:02:30+00:00","dateModified":"2021-07-31T18:13:56+00:00","description":"SSLReport provides the ability to scan a network and determine which hosts are running SSL\/TLS based services and then query each of these servers\/ports","breadcrumb":{"@id":"https:\/\/www.fir3net.com\/Programming\/Shell-Scripting\/tool-sslreport.html#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.fir3net.com\/Programming\/Shell-Scripting\/tool-sslreport.html"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.fir3net.com\/Programming\/Shell-Scripting\/tool-sslreport.html#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.fir3net.com\/"},{"@type":"ListItem","position":2,"name":"Programming","item":"https:\/\/www.fir3net.com\/programming"},{"@type":"ListItem","position":3,"name":"Shell Scripting","item":"https:\/\/www.fir3net.com\/programming\/shell-scripting"},{"@type":"ListItem","position":4,"name":"Tool – SSLReport"}]},{"@type":"WebSite","@id":"https:\/\/www.fir3net.com\/#website","url":"https:\/\/www.fir3net.com\/","name":"Fir3net","description":"Keeping you in the know","publisher":{"@id":"https:\/\/www.fir3net.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.fir3net.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.fir3net.com\/#organization","name":"Fir3net","url":"https:\/\/www.fir3net.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.fir3net.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.fir3net.com\/wp-content\/uploads\/Fir3net-Background-Logo-compressed.png","contentUrl":"https:\/\/www.fir3net.com\/wp-content\/uploads\/Fir3net-Background-Logo-compressed.png","width":390,"height":88,"caption":"Fir3net"},"image":{"@id":"https:\/\/www.fir3net.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.fir3net.com\/#\/schema\/person\/ab35009601b7687ee1c5310be6038037","name":"Rick Donato","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.fir3net.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d75d69a54c0ca3b32c24c3a9703b623c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d75d69a54c0ca3b32c24c3a9703b623c?s=96&d=mm&r=g","caption":"Rick Donato"},"description":"Rick Donato is a Network Automation Architect\/Evangelist and the founder of Packet Coders."}]}},"_links":{"self":[{"href":"https:\/\/www.fir3net.com\/wp-json\/wp\/v2\/posts\/637"}],"collection":[{"href":"https:\/\/www.fir3net.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fir3net.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fir3net.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fir3net.com\/wp-json\/wp\/v2\/comments?post=637"}],"version-history":[{"count":0,"href":"https:\/\/www.fir3net.com\/wp-json\/wp\/v2\/posts\/637\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.fir3net.com\/wp-json\/wp\/v2\/media?parent=637"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fir3net.com\/wp-json\/wp\/v2\/categories?post=637"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fir3net.com\/wp-json\/wp\/v2\/tags?post=637"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}