{"id":1838,"date":"2018-01-05T22:51:25","date_gmt":"2018-01-05T21:51:25","guid":{"rendered":"http:\/\/jakisproblem.pl\/?p=1838"},"modified":"2018-01-05T22:51:25","modified_gmt":"2018-01-05T21:51:25","slug":"disk-drive-terms-and-concepts","status":"publish","type":"post","link":"http:\/\/u239160.webh.me\/jakisproblem.pl\/index.php\/2018\/01\/05\/disk-drive-terms-and-concepts\/","title":{"rendered":"Disk Drive Terms and Concepts"},"content":{"rendered":"<p>Source:\u00a0<a href=\"http:\/\/www.c-jump.com\/\">http:\/\/www.c-jump.com\/<\/a><\/p>\n<hr \/>\n<h3>1. Disk and Memory Working Together<\/h3>\n<hr \/>\n<ul>\n<li>\u00a0\u00a0<img decoding=\"async\" src=\"http:\/\/www.c-jump.com\/CIS24\/Slides\/DiskDrives\/images\/MEMDISK.gif\" alt=\"Disk and Memory Working Together\" \/><\/li>\n<\/ul>\n<ul>\n<li>On disk, data stored in\u00a0<em>sectors<\/em><\/li>\n<li>Sector typically holds 512 bytes of data<\/li>\n<li>Sector is the smallest unit that can be read or written<\/li>\n<li>Memory is holding\u00a0<em>bytes<\/em>\u00a0of data<\/li>\n<li>Each byte in memory can be accessed independently<\/li>\n<\/ul>\n<h3>2. Disk Drive Basics<\/h3>\n<hr \/>\n<ul>\n<li>\u00a0\u00a0<img decoding=\"async\" src=\"http:\/\/www.c-jump.com\/CIS24\/Slides\/DiskDrives\/images\/disk_drive.png\" alt=\"Disk Drive\" \/><\/li>\n<\/ul>\n<hr \/>\n<h3>3. Disk Drive Tracks<\/h3>\n<hr \/>\n<ul>\n<li>\u00a0\u00a0<img decoding=\"async\" src=\"http:\/\/www.c-jump.com\/CIS24\/Slides\/DiskDrives\/images\/disk_drive_tracks.png\" alt=\"Disk drive tracks\" \/><\/li>\n<\/ul>\n<hr \/>\n<h3>4. Disk Drive Cylinders<\/h3>\n<hr \/>\n<ul>\n<li>\u00a0\u00a0<img decoding=\"async\" src=\"http:\/\/www.c-jump.com\/CIS24\/Slides\/DiskDrives\/images\/disk_drive_cylinders.png\" alt=\"Disk drive cylinders\" \/><\/li>\n<\/ul>\n<hr \/>\n<h3>5. Disk Drive Sectors<\/h3>\n<hr \/>\n<ul>\n<li>Note: Sector ize is usually 512 bytes long:<img decoding=\"async\" src=\"http:\/\/www.c-jump.com\/CIS24\/Slides\/DiskDrives\/images\/disk_drive_sectors.png\" alt=\"Disk drive sectors\" \/><\/li>\n<\/ul>\n<hr \/>\n<h3>6. Disk Drive Terminology<\/h3>\n<hr \/>\n<ul>\n<li>Putting it all together:\n<ul>\n<li>Number of cylinders (tracks), heads (sides), and sectors (aka CHS) uniquely identify the\u00a0<em>physical geometry<\/em>\u00a0of the storage units on a disk<\/li>\n<li>CHS also yields disk capacity:\n<ul>\n<li><strong>Capacity = Cylinders \u00d7 Heads \u00d7 Sectors \u00d7 sector_size<\/strong><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/li>\n<\/ul>\n<hr \/>\n<h3>7. Calculating Disk Capacity<\/h3>\n<hr \/>\n<ul>\n<li>\u00a0<img decoding=\"async\" src=\"http:\/\/www.c-jump.com\/CIS24\/Slides\/DiskDrives\/images\/calculating_disk_capacity.png\" alt=\"Calculating Disk Capacity\" \/><\/li>\n<\/ul>\n<hr \/>\n<h3>8. How sectors are really numbered on a drive?<\/h3>\n<hr \/>\n<ul>\n<li>Did that drive really have 15 heads?<\/li>\n<li>Could 8 platters really fit in that less than 1 inch space?<\/li>\n<li>CHS = 13,328\/15\/63 is the\u00a0<em>reported geometry<\/em>.<\/li>\n<li>That is, this is what it says on the drive!<\/li>\n<li>Let&#8217;s see what the real geometry is&#8230;<\/li>\n<\/ul>\n<hr \/>\n<h3>9. Regular CHS Mode<\/h3>\n<hr \/>\n<ul>\n<li>Designed for early IDE\/ATA HDDs\n<ul>\n<li>C &lt;= 1,024<\/li>\n<li>H &lt;= 16<\/li>\n<li>S &lt;= 63<\/li>\n<\/ul>\n<\/li>\n<li>This mode works for drives up to 504 MB in capacity<\/li>\n<\/ul>\n<hr \/>\n<h3>10. Extended CHS, ECHS Mode<\/h3>\n<hr \/>\n<ul>\n<li>ECHS is used for drives between 504 MB and 8 GB\n<ul>\n<li>CHS addressing is limited to\n<ul>\n<li>10 bits for cylinder (&lt;=1024)<\/li>\n<li>8 bits for head (&lt;=256), and<\/li>\n<li>6 bits for sector (&lt;=63 since first sector is 1.)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>In ECHS, the actual C value is divided by 2 and the H value multiplied by 2 until:\n<ul>\n<li>C &lt; 1024 or H &gt;= 255<\/li>\n<\/ul>\n<p>&nbsp;<\/li>\n<\/ul>\n<hr \/>\n<h3>11. ECHS Example<\/h3>\n<hr \/>\n<ul>\n<li>Reported CHS geometry = 18,383\/16\/63\n<ul>\n<li>Capacity = 9,487,392,768 B (9 GB)<\/li>\n<\/ul>\n<\/li>\n<li>In fact, this drive might very well have two platters (i.e., 4 heads)\n<ul>\n<li>True geometry is CHS = 73,532\/4\/63<\/li>\n<\/ul>\n<\/li>\n<li>The\u00a0<strong>translation<\/strong>\u00a0is handled by the disk drive controller<\/li>\n<\/ul>\n<hr \/>\n<h3>12. Zone Bit Recording<\/h3>\n<hr \/>\n<ul>\n<li>On\u00a0<em>small<\/em>\u00a0(&lt;=8GB) drives, every track has the same number of sectors\n<ul>\n<li>The outside tracks are less densely packed with bits than inside tracks<\/li>\n<\/ul>\n<\/li>\n<li>ZBR allows a variable number of sectors\/track\n<ul>\n<li>Enabled due to sophisticated electronics built into HDD controller<\/li>\n<li>Allowed manufacturers to optimize the disk surface and build higher-capacity drives<\/li>\n<\/ul>\n<\/li>\n<li>CHS values no longer represent actual geometry<\/li>\n<\/ul>\n<hr \/>\n<h3>13. Variable Sectors per Track<\/h3>\n<hr \/>\n<ul>\n<li>\u00a0<img decoding=\"async\" src=\"http:\/\/www.c-jump.com\/CIS24\/Slides\/DiskDrives\/images\/variable_sectors_per_track.png\" alt=\"Variable Sectors per Track\" \/><\/li>\n<\/ul>\n<hr \/>\n<h3>14. Logical Block Addressing<\/h3>\n<hr \/>\n<ul>\n<li>LBA is an absolute sector addressing scheme used by ZBR\n<ul>\n<li>First sector is 0<\/li>\n<\/ul>\n<\/li>\n<li>The hard drive controller translates LBA (physical geometry) into CHS addressing (logical geometry) used by the operating system and BIOS<\/li>\n<\/ul>\n<hr \/>\n<h3>15. CHS vs. LBA<\/h3>\n<hr \/>\n<ul>\n<li>\u00a0<img decoding=\"async\" src=\"http:\/\/www.c-jump.com\/CIS24\/Slides\/DiskDrives\/images\/chs_vs_lba.png\" alt=\"CHS vs. LBA\" \/><\/li>\n<\/ul>\n<hr \/>\n<h3>16. Sectors and Clusters<\/h3>\n<hr \/>\n<ul>\n<li>A sector is the most basic physical I\/O unit on a disk<\/li>\n<li>Files are linked lists on the disk; reading\/writing one sector at a time would be very slow<\/li>\n<li>Clusters are logical groupings of sectors by an operating system to optimize I\/O\n<ul>\n<li>Typical hard drive cluster sizes range from 4 to 64 sectors (2-32 KB)<\/li>\n<li>But they result in empty space\u00a0<em>slack<\/em>\u00a0at the end of a file&#8230;\n<ul>\n<li>&#8230;and a data hiding opportunity.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/li>\n<\/ul>\n<hr \/>\n<h3>17. Logical vs. Physical File Size<\/h3>\n<hr \/>\n<table border=\"0\" cellspacing=\"0\" cellpadding=\"2\">\n<tbody>\n<tr>\n<td valign=\"top\">\n<ul>\n<li>\u00a0\u00a0<img decoding=\"async\" src=\"http:\/\/www.c-jump.com\/CIS24\/Slides\/DiskDrives\/images\/file_size_01.png\" alt=\"Logical vs. Physical File Size\" \/><\/li>\n<\/ul>\n<\/td>\n<td valign=\"top\">\n<ul>\n<li>\u00a0\u00a0<img decoding=\"async\" src=\"http:\/\/www.c-jump.com\/CIS24\/Slides\/DiskDrives\/images\/file_size_02.png\" alt=\"Logical vs. Physical File Size\" \/><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr \/>\n<h3>18. Hard Drive Interfaces<\/h3>\n<hr \/>\n<ul>\n<li><strong>Parallel ATA<\/strong>\u00a0(PATA) is an interface standard for the connection of storage devices such as hard disks, floppy drives, and optical disc drives in today&#8217;s computers<\/li>\n<li><strong>ATA<\/strong>\u00a0is\u00a0<em>AT Attachment<\/em><\/li>\n<li>ATA interface itself evolved from Western Digital&#8217;s original\u00a0<em>Integrated Drive Electronics<\/em>(IDE) interface<\/li>\n<li>ATA-3 Introduced optional security features, passwords on BIOS, see<a href=\"http:\/\/en.wikipedia.org\/wiki\/ATA-3\" target=\"_blank\" rel=\"noopener\"><tt>http:\/\/en.wikipedia.org\/wiki\/ATA-3<\/tt><\/a><\/li>\n<li>ATA-4 Added the\u00a0<em>Host Protected Area<\/em>\u00a0(HPA)<\/li>\n<\/ul>\n<hr \/>\n<h3>19. HPA, Host Protected Area<\/h3>\n<hr \/>\n<ul>\n<li>HPA=A special area of the disk that can be used to save data and a casual observer might not see it.<\/li>\n<li>HPA is at the end of the disk<img decoding=\"async\" src=\"http:\/\/www.c-jump.com\/CIS24\/Slides\/DiskDrives\/images\/HPA.png\" alt=\"HPA\" \/><\/li>\n<li>Tools to check for the presence of HPA:<\/li>\n<li>BXDR<\/li>\n<li><tt>sandersonforensics.co.uk\/BXDR.htm<\/tt><\/li>\n<li>DRIVEID\u00a0<a href=\"http:\/\/www.mykeytech.com\/\" target=\"_blank\" rel=\"noopener\"><tt>mykeytech.com<\/tt><\/a><\/li>\n<li>HPA\u00a0<a href=\"http:\/\/www.dmares.com\/maresware\/gk.htm#hpa\" target=\"_blank\" rel=\"noopener\"><tt>dmares.com<\/tt><\/a><\/li>\n<\/ul>\n<hr \/>\n<h3>20. DCO, Device Configuration Overlay<\/h3>\n<hr \/>\n<ul>\n<li>ATA-6 Added the\u00a0<em>Device Configuration Overlay<\/em>\u00a0(DCO)<\/li>\n<li>A DCO can hide sectors at the end of the disk, in addition to sectors hidden by an HPA<img decoding=\"async\" src=\"http:\/\/www.c-jump.com\/CIS24\/Slides\/DiskDrives\/images\/DCO.png\" alt=\"Device Configuration Overlay\" \/><\/li>\n<li>ATA-7 Introduced the\u00a0<strong>Serial ATA<\/strong>\u00a0(SATA)<\/li>\n<\/ul>\n<hr \/>\n<h3>21. Hard Disk Data Acquisition<\/h3>\n<hr \/>\n<ul>\n<li>Two methods that software can use to access the disk:\n<ul>\n<li>Directly through the hard disk controller<\/li>\n<li>Through the BIOS<\/li>\n<\/ul>\n<p>&nbsp;<\/li>\n<\/ul>\n<hr \/>\n<h3>22. Hard Disk Data Acquisition, cont<\/h3>\n<hr \/>\n<ul>\n<li><strong>Direct Access<\/strong>: Software communicates directly with the hard disk controller and then communicates with the hard disk.\n<ul>\n<li>Accessing the hard disk directly is the fastest way to get data to and from the disk, but it requires the software to know quite a bit about the hardware.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Software Access<\/strong>\u00a0needs to know how to address the controller and how to issue commands to it.\n<ul>\n<li>The BIOS works as a middleman between the software and the hard disk<\/li>\n<li>When the BIOS is used, there is a risk that it may return incorrect information about the disk.<\/li>\n<li>If BIOS thinks it is an 8 GB, but the disk is really 12 GB, the\u00a0<tt>INT 13h<\/tt>\u00a0function provides access to only the first 8 GB.<\/li>\n<\/ul>\n<p>&nbsp;<\/li>\n<\/ul>\n<hr \/>\n<h3>23. Hard Disk Data Acquisition and BIOS<\/h3>\n<hr \/>\n<ul>\n<li>Occasionally you hear of someone imaging a hard rive using two different tools and got different sized images.<\/li>\n<li>The reason is usually because one of the tools used the BIOS and the other did not.<\/li>\n<li>Make sure you know how your acquisition tool acquires the disk:\n<ul>\n<li>If the tool uses the BIOS make sure it reports the full disk before you acquire the disk.<\/li>\n<li>The BIOS adds one more location where an error can be introduced into the final image, and it should be avoided if better alternatives exist.<\/li>\n<\/ul>\n<p>&nbsp;<\/li>\n<\/ul>\n<hr \/>\n<h3>24. Hard Disk Data Acquisition<\/h3>\n<hr \/>\n<ul>\n<li>The first phase of a digital investigation is the preservation of the digital crime scene.<\/li>\n<li>The general procedure for acquiring a storage device is to copy one byte from the original storage device to a destination storage device and repeat the process.<\/li>\n<li>The chunks of data that are transferred each time are typically a multiple of 512 bytes.<\/li>\n<li>If an error is encountered while reading from the suspect drive most programs will write a zero to the destination drive.<\/li>\n<li>The National Institute of Standards and Technology (NIST) has conducted tests on common acquisition tools:<a href=\"http:\/\/www.cftt.nist.gov\/disk_imaging.htm\" target=\"_blank\" rel=\"noopener\"><tt>cftt.nist.gov\/disk_imaging.htm<\/tt><\/a><\/li>\n<li>The acquisition process is a two step process:\n<ul>\n<li>First, you need to read data from a source, and<\/li>\n<li>Second the data is written to the destination source.<\/li>\n<\/ul>\n<p>&nbsp;<\/li>\n<\/ul>\n<hr \/>\n<h3>25. Live Acquisition<\/h3>\n<hr \/>\n<ul>\n<li>Live acquisition is one where the suspect operating system is still running, and\n<ul>\n<li>The suspect&#8217;s OS will copy the data from the encrypted drives or attached flash drives<\/li>\n<\/ul>\n<\/li>\n<li>Often used in Missing person investigations<\/li>\n<li>Increasingly more standard approach compared to &#8222;pull the plug&#8221; in many cases<\/li>\n<li>When the computer is up and running and either unlocked or the user consents the password<\/li>\n<\/ul>\n<hr \/>\n<h3>26. Write Blockers<\/h3>\n<hr \/>\n<ul>\n<li>Two types of the write blockers exist:\n<ul>\n<li>Hardware<\/li>\n<li>Software<\/li>\n<\/ul>\n<\/li>\n<li>A hardware write protector is a device that sits in the connection between a computer and a storage device.<\/li>\n<li>A software write blocker modifies the interrupt table so that the table entry for\u00a0<a href=\"http:\/\/www.google.com\/?q=INT%2013h\" target=\"_blank\" rel=\"noopener\">BIOS interrupt 13h<\/a>\u00a0re-points the OS address to the write blocker in memory.<\/li>\n<li>When any software requests to\u00a0<em>Write Sectors To Drive<\/em>, the write blocker prevents that from happening.<\/li>\n<li>See also\u00a0<a href=\"http:\/\/www.cftt.nist.gov\/software_write_block.htm\" target=\"_blank\" rel=\"noopener\"><tt>cftt.nist.gov\/software_write_block.htm<\/tt><\/a><\/li>\n<\/ul>\n<hr \/>\n<h3>27. Removable Media<\/h3>\n<hr \/>\n<ul>\n<li>Most removable media also have partitions, but they use the same structures that hard disk use.<\/li>\n<li>The exception to this rule are floppy disks that are formatted for FAT12 in a Windows or Unix System.<\/li>\n<li>Some thumb drives do not have partitions and contain one file system, and some of them do have partitions.<\/li>\n<li>Flash cards commonly used in digital cameras, also typically have a partition table.<\/li>\n<li>Many flash cards have a FAT file system and can be analyzed using normal investigation tools.<\/li>\n<\/ul>\n<hr \/>\n<h3>28. CD-ROMs<\/h3>\n<hr \/>\n<ul>\n<li>CD-ROMs are more complex because many possible variations exist.<\/li>\n<li>Most CDs use the ISO 9660 format. Multiple operating systems can read the contents of the CD.<\/li>\n<li>Recordable CD\u2019s have a notion of a session. A CD-R can have one or more sessions on it.<\/li>\n<li>Depending on the operating system in which the CD is used, each session may show up as though it was a partition.<\/li>\n<\/ul>\n<hr \/>\n<h3>29. RAID, the Multi-Disk Volumes<\/h3>\n<hr \/>\n<ul>\n<li>Redundant Arrays of Inexpensive Disks<\/li>\n<li>Main theory behind RAID is to use multiple disks instead of one for redundancy and to improve disk performance<\/li>\n<li>Hardware controller or software driver is used to merge the disks together for the computer to see it as a large single volume<\/li>\n<\/ul>\n<hr \/>\n<h3>30. RAID Level 0, 1, 2<\/h3>\n<hr \/>\n<ul>\n<li>Raid Level 0 uses two or more disks, and the data is striped across the disk in block size chunks<\/li>\n<li>Raid Level 1 uses two or more disks and mirror the data. Both disks contain the same allocated data<\/li>\n<li>Raid Level 2 are rare and use error correcting codes to fix any incorrect data when it is read\n<ul>\n<li>In level 2 the data is\u00a0<em>striped across many disks<\/em>\u00a0and additional disks contain the error correcting code values<\/li>\n<\/ul>\n<p>&nbsp;<\/li>\n<\/ul>\n<hr \/>\n<h3>31. RAID Level 3<\/h3>\n<hr \/>\n<ul>\n<li>Raid Level 3 requires at least three disks and have a dedicated parity disk<\/li>\n<li>The parity disk\n<ul>\n<li>recognizes errors in the other two disks<\/li>\n<li>will be used to recreate the contents of a data disk in case if it fails<\/li>\n<\/ul>\n<\/li>\n<li>For example, if you have two values: 3 and 4, when they are added, the parity is 7.Since it is unlikely that both data disks will fail simultaneously, either value can be recovered using known paritty.<\/li>\n<\/ul>\n<hr \/>\n<h3>32. RAID Level 4<\/h3>\n<hr \/>\n<ul>\n<li>RAID Level 4 is similar to Level 3 except the data is striped in block size chunks instead of byte sized chunks<\/li>\n<li>Level 4 uses two or more disks and a dedicated parity disk<\/li>\n<\/ul>\n<hr \/>\n<h3>33. RAID Level 5<\/h3>\n<hr \/>\n<ul>\n<li>Raid Level 5 are similar to Level 4 but they remove the bottleneck associated with the parity disk<\/li>\n<li>In Level 5 there is no dedicated parity disk<\/li>\n<li>Level 5 is one of the more common forms of RAID and requires at least three disks<\/li>\n<li>To analyze the Raid volume, it is easiest to acquire the final raid Volume as though it were a normal single disk and use the typical file system and partition analysis tools<\/li>\n<\/ul>\n<hr \/>\n<h3>34. Software RAID<\/h3>\n<hr \/>\n<ul>\n<li>In a software RAID, the operating system has special drivers that merge the individual disks<\/li>\n<li>In windows 2000 and XP, the logical disk manager (LDM) controls the RAID volumes<\/li>\n<li>The LDM requires that disks be formatted as dynamic disks, which are different from the DOS based partitions<\/li>\n<li>Analysis and acquisition of software RAID is similar to a hardware RAID<\/li>\n<li>Based on current technology, the easiest scenario is to acquire the RAID volume so that the normal file system tools can be used<\/li>\n<\/ul>\n<hr \/>\n<h3>35. Disk Spanning<\/h3>\n<hr \/>\n<ul>\n<li>Disk Spanning technology:\n<ul>\n<li>creates large storage systems; some versions support adding new disks dynamically to increase the size of the file system without a downtime or reboot<\/li>\n<li>makes multiple disks appear to be one large disk<\/li>\n<li>is frequently discussed with RAID because many software RAID solutions also provide disk spanning<\/li>\n<li>offers no redundancy or performance benefits<\/li>\n<\/ul>\n<p>&nbsp;<\/li>\n<\/ul>\n<hr \/>\n<h3>36. RAID Forensic Analysis<\/h3>\n<hr \/>\n<ul>\n<li>Encase and ProDiscover can import the individual images from a windows logical volume and merge them together<\/li>\n<li>Both cam also import the disks from a windows RAID volume and analyze them as a single volume<\/li>\n<\/ul>\n<hr \/>\n<h3>37. Damaged Data Units<\/h3>\n<hr \/>\n<ul>\n<li>Many file systems have the ability to mark a data unit as damaged<\/li>\n<li>This was needed with older hard disks that did not have the capability to handle errors<\/li>\n<li>The operating system would detect that a data unit was bad and mark it as such so that it would not be allocated to a file<\/li>\n<li>Today&#8217;s modern hard disks can detect a bad sector and replace it with a spare sector,\u00a0<em>almost<\/em>rendering the file system &#8222;bad sector&#8221; functionality obsolete.<\/li>\n<\/ul>\n<hr \/>\n<h3>38. Damaged Data Units, cont.<\/h3>\n<hr \/>\n<ul>\n<li>Many consistency checking tools will not verify a data unit that the file systems reports as being bad<\/li>\n<li>It is easy to hide data using a file system functionality, if it exists. Therefore, a user could manually add a data unit to the damaged list and add data to it<\/li>\n<li>Most acquisition tools report bad sectors, so you can compare them and look inside<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p class=\"excerpt\">Source:\u00a0http:\/\/www.c-jump.com\/ 1. Disk and Memory Working Together \u00a0\u00a0 On disk, data stored in\u00a0sectors Sector typically holds 512 bytes of data Sector is the smallest unit that can be read or written Memory is holding\u00a0bytes\u00a0of data Each byte in memory can be accessed independently 2. Disk Drive Basics \u00a0\u00a0 3. Disk Drive Tracks \u00a0\u00a0 4. Disk&hellip;<\/p>\n<p class=\"more-link-p\"><a class=\"more-link\" href=\"http:\/\/u239160.webh.me\/jakisproblem.pl\/index.php\/2018\/01\/05\/disk-drive-terms-and-concepts\/\">Read more &rarr;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[46,38],"class_list":["post-1838","post","type-post","status-publish","format-standard","hentry","category-bez-kategorii","tag-hardware","tag-hdd"],"_links":{"self":[{"href":"http:\/\/u239160.webh.me\/jakisproblem.pl\/index.php\/wp-json\/wp\/v2\/posts\/1838","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/u239160.webh.me\/jakisproblem.pl\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/u239160.webh.me\/jakisproblem.pl\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/u239160.webh.me\/jakisproblem.pl\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/u239160.webh.me\/jakisproblem.pl\/index.php\/wp-json\/wp\/v2\/comments?post=1838"}],"version-history":[{"count":0,"href":"http:\/\/u239160.webh.me\/jakisproblem.pl\/index.php\/wp-json\/wp\/v2\/posts\/1838\/revisions"}],"wp:attachment":[{"href":"http:\/\/u239160.webh.me\/jakisproblem.pl\/index.php\/wp-json\/wp\/v2\/media?parent=1838"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/u239160.webh.me\/jakisproblem.pl\/index.php\/wp-json\/wp\/v2\/categories?post=1838"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/u239160.webh.me\/jakisproblem.pl\/index.php\/wp-json\/wp\/v2\/tags?post=1838"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}