{"id":2307,"date":"2020-12-17T15:15:43","date_gmt":"2020-12-17T14:15:43","guid":{"rendered":"https:\/\/www.ablogix.fr\/?p=2307"},"modified":"2022-03-29T15:27:55","modified_gmt":"2022-03-29T13:27:55","slug":"ssi_tr1-securite-des-applications-web","status":"publish","type":"post","link":"https:\/\/www.ablogix.fr\/en\/2020\/12\/17\/ssi_tr1-securite-des-applications-web\/","title":{"rendered":"SSi_Tr1 &#8211; Web Application Security"},"content":{"rendered":"\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<pre class=\"wp-block-preformatted\"><em><span class=\"has-inline-color has-very-dark-gray-color\">R\u00e9f : SSI_Tr1<\/span><\/em><\/pre>\n\n\n\n<h2>Summary<\/h2>\n\n\n\n<p>This course will allow you to identify, understand and solve the security problems commonly found in <a href=\"https:\/\/en.wikipedia.org\/wiki\/Web_application_security\">web applications<\/a>. Thus, the practical work will allow you to put yourself in the place of the attacker and the attacked in order to better understand the attack vectors and how to protect your applications.<\/p>\n\n\n\n<h2>Concerned public<\/h2>\n\n\n\n<ul><li>Developers<\/li><li>Webmasters<\/li><li>Web project managers<\/li><li>Architects<\/li><li>Consultants<\/li><\/ul>\n\n\n\n<h2>Pre-requisites<\/h2>\n\n\n\n<ul><li>Master the basics of web development<\/li><li>Basic knowledge of TCP\/IP networks and the Internet.<\/li><\/ul>\n\n\n\n<h2>Aims<\/h2>\n\n\n\n<ul><li>Understand the threats that target a web application<\/li><li>Understand and apply the strategies used to compromise a web application<\/li><li>Ensure the security of web applications<\/li><li>Understand and address design issues<\/li><li>Understand and address implementation issues<\/li><li>Injection flaws: SQLi\/XSS\u2026<\/li><li>Design flaws, CSRF, Auth\u2026<\/li><li>Cryptography, storage, sessions\u2026<\/li><\/ul>\n\n\n\n<h2>Content<\/h2>\n\n\n\n<h3><strong>Introduction<\/strong><\/h3>\n\n\n\n<ul><li>Background and figures<\/li><li>Security concepts<\/li><li>Terminology<\/li><\/ul>\n\n\n\n<h3><strong>Injection<\/strong><\/h3>\n\n\n\n<ul><li>Definition<\/li><li>Examples of attack scenarios<\/li><li>Prevention<\/li><li>Practical work<\/li><\/ul>\n\n\n\n<h3><strong>Violation of authentication and session management<\/strong><\/h3>\n\n\n\n<ul><li>Definition<\/li><li>Advice and good practice<\/li><\/ul>\n\n\n\n<h3><strong>Cross-Site Scripting (XSS)<\/strong><\/h3>\n\n\n\n<ul><li>Definition and types of XSS<\/li><li>Examples of attack scenarios<\/li><li>Prevention<\/li><li>Practical exercises<\/li><\/ul>\n\n\n\n<h3><strong>Unsafe direct references to an object<\/strong><\/h3>\n\n\n\n<ul><li>Definition<\/li><li>Tips and good practice<\/li><li>Practical work<\/li><\/ul>\n\n\n\n<h3><strong>Incorrect security configuration<\/strong><\/h3>\n\n\n\n<ul><li>Examples of attacks<\/li><li>Prevention<\/li><\/ul>\n\n\n\n<h3><strong>Exposure of sensitive data<\/strong><\/h3>\n\n\n\n<ul><li>Risks<\/li><li>Cryptography<\/li><li>Storage of passwords and other data<\/li><li>Practical work<\/li><\/ul>\n\n\n\n<h3><strong>Lack of access control at functional level<\/strong><\/h3>\n\n\n\n<ul><li>Risks<\/li><li>Prevention<\/li><\/ul>\n\n\n\n<h3><strong>Cross-site request forgery (CSRF)<\/strong><\/h3>\n\n\n\n<ul><li>Definition<\/li><li>Risks<\/li><li>Prevention<\/li><li>Practical work<\/li><\/ul>\n\n\n\n<h3><strong>Use of components with known vulnerabilities<\/strong><\/h3>\n\n\n\n<ul><li>Risks<\/li><li>Prevention<\/li><\/ul>\n\n\n\n<h3><strong>Unvalidated redirects and referrals<\/strong><\/h3>\n\n\n\n<ul><li>Risks<\/li><li>Prevention<\/li><li>Practical work<\/li><\/ul>\n\n\n\n<h2>Training environment<\/h2>\n\n\n\n<ul><li>A training aid will be provided in paper format to each trainee.<\/li><li>A training room with a video projector, a whiteboard and 1 PC per trainee.<\/li><li>A virtual machine under Virtual Box will also be installed on the training machines in order to carry out the practical exercises.<\/li><\/ul>\n\n\n\n<h2>Duration<\/h2>\n\n\n\n<p><strong>2 days <\/strong>(the content can be adapted according to the technological context but also to the level of knowledge of the trainees).<\/p>\n\n\n\n<ul><li>The training can be provided both face-to-face and remotely<\/li><li>The training can take place on an inter-company or intra-company basis<\/li><\/ul>\n\n\n\n<h2>More information ?<\/h2>\n\n\n\n<p>Please contact us on +33 6 70 16 46 35 or by email : <a href=\"mailto:formation@ablogix.fr\">formation@ablogix.fr<\/a> for a quote.<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<pre class=\"wp-block-preformatted\"><strong>The training activity of ABlogiX is \"registered under number 52 72 01527 72. \nThis registration is not equivalent to State approval\",in accordance with Article L6322-48.<\/strong><\/pre>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" src=\"https:\/\/www.ablogix.fr\/wp-content\/uploads\/2022\/07\/QRcode-ABourlier-info.png\" alt=\"\" class=\"wp-image-11786\" width=\"123\" height=\"121\"\/><\/figure><\/div>\n\n\n\n<p><strong><a href=\"https:\/\/www.ablogix.fr\/en\/formations\/\">Find all our training courses here.<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This course will allow you to identify, understand and solve the security problems commonly found in web applications.<\/p>\n","protected":false},"author":4,"featured_media":3411,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[6],"tags":[],"translation":{"provider":"WPGlobus","version":"2.10.0","language":"en","enabled_languages":["fr","en"],"languages":{"fr":{"title":true,"content":true,"excerpt":true},"en":{"title":true,"content":true,"excerpt":true}}},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Formation SSi_Tr1 - La s\u00e9curit\u00e9 des applications web<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ablogix.fr\/2020\/12\/17\/ssi_tr1-securite-des-applications-web\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Formation SSi_Tr1 - La s\u00e9curit\u00e9 des applications web\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ablogix.fr\/2020\/12\/17\/ssi_tr1-securite-des-applications-web\/\" \/>\n<meta property=\"og:site_name\" content=\"ABlogiX\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ABlogiX\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-17T14:15:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-29T13:27:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ablogix.fr\/wp-content\/uploads\/2020\/12\/visuel-formation-se\u0301curite\u0301-des-apps-webs.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ABlogiX\" \/>\n<meta name=\"twitter:site\" content=\"@ABlogiX\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Arthur Daunay\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.ablogix.fr\/#organization\",\"name\":\"AblogiX\",\"url\":\"https:\/\/www.ablogix.fr\/\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/sarl-ablogix\",\"https:\/\/www.youtube.com\/channel\/UC7LR5o5aeXzd2epr7eNma3g\/featured\",\"https:\/\/www.facebook.com\/ABlogiX\",\"https:\/\/twitter.com\/ABlogiX\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ablogix.fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.ablogix.fr\/wp-content\/uploads\/2020\/11\/Logo-ABlogiX.png\",\"contentUrl\":\"https:\/\/www.ablogix.fr\/wp-content\/uploads\/2020\/11\/Logo-ABlogiX.png\",\"width\":534,\"height\":368,\"caption\":\"AblogiX\"},\"image\":{\"@id\":\"https:\/\/www.ablogix.fr\/#\/schema\/logo\/image\/\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ablogix.fr\/#website\",\"url\":\"https:\/\/www.ablogix.fr\/\",\"name\":\"ABlogiX\",\"description\":\"Ing\u00e9nierie de d\u00e9veloppement syst\u00e8me et logiciel, et s\u00e9curit\u00e9 du syst\u00e8me d&#039;information\",\"publisher\":{\"@id\":\"https:\/\/www.ablogix.fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ablogix.fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ablogix.fr\/2020\/12\/17\/ssi_tr1-securite-des-applications-web\/#primaryimage\",\"url\":\"https:\/\/www.ablogix.fr\/wp-content\/uploads\/2020\/12\/visuel-formation-se\u0301curite\u0301-des-apps-webs.png\",\"contentUrl\":\"https:\/\/www.ablogix.fr\/wp-content\/uploads\/2020\/12\/visuel-formation-se\u0301curite\u0301-des-apps-webs.png\",\"width\":800,\"height\":800},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ablogix.fr\/2020\/12\/17\/ssi_tr1-securite-des-applications-web\/#webpage\",\"url\":\"https:\/\/www.ablogix.fr\/2020\/12\/17\/ssi_tr1-securite-des-applications-web\/\",\"name\":\"SSi_Tr1 - Web Application Security - ABlogiX\",\"isPartOf\":{\"@id\":\"https:\/\/www.ablogix.fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.ablogix.fr\/2020\/12\/17\/ssi_tr1-securite-des-applications-web\/#primaryimage\"},\"datePublished\":\"2020-12-17T14:15:43+00:00\",\"dateModified\":\"2022-03-29T13:27:55+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ablogix.fr\/2020\/12\/17\/ssi_tr1-securite-des-applications-web\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ablogix.fr\/2020\/12\/17\/ssi_tr1-securite-des-applications-web\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ablogix.fr\/2020\/12\/17\/ssi_tr1-securite-des-applications-web\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.ablogix.fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SSi_Tr1 &#8211; S\u00e9curit\u00e9 des applications web\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.ablogix.fr\/2020\/12\/17\/ssi_tr1-securite-des-applications-web\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.ablogix.fr\/2020\/12\/17\/ssi_tr1-securite-des-applications-web\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.ablogix.fr\/#\/schema\/person\/ff6e7c4e8f042c7b26a8048c9a5f618c\"},\"headline\":\"SSi_Tr1 &#8211; Web Application Security\",\"datePublished\":\"2020-12-17T14:15:43+00:00\",\"dateModified\":\"2022-03-29T13:27:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.ablogix.fr\/2020\/12\/17\/ssi_tr1-securite-des-applications-web\/#webpage\"},\"wordCount\":721,\"publisher\":{\"@id\":\"https:\/\/www.ablogix.fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.ablogix.fr\/2020\/12\/17\/ssi_tr1-securite-des-applications-web\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.ablogix.fr\/wp-content\/uploads\/2020\/12\/visuel-formation-se\u0301curite\u0301-des-apps-webs.png\",\"articleSection\":[\"Tr_SSI: S\u00e9curit\u00e9 du SI\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.ablogix.fr\/#\/schema\/person\/ff6e7c4e8f042c7b26a8048c9a5f618c\",\"name\":\"Arthur Daunay\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ablogix.fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5b1a54b261ab94cf3676bb2b46b8a0e7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5b1a54b261ab94cf3676bb2b46b8a0e7?s=96&d=mm&r=g\",\"caption\":\"Arthur Daunay\"},\"url\":\"https:\/\/www.ablogix.fr\/en\/author\/a-daunay\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Formation SSi_Tr1 - La s\u00e9curit\u00e9 des applications web","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ablogix.fr\/2020\/12\/17\/ssi_tr1-securite-des-applications-web\/","og_locale":"en_US","og_type":"article","og_title":"Formation SSi_Tr1 - La s\u00e9curit\u00e9 des applications web","og_url":"https:\/\/www.ablogix.fr\/2020\/12\/17\/ssi_tr1-securite-des-applications-web\/","og_site_name":"ABlogiX","article_publisher":"https:\/\/www.facebook.com\/ABlogiX","article_published_time":"2020-12-17T14:15:43+00:00","article_modified_time":"2022-03-29T13:27:55+00:00","og_image":[{"width":800,"height":800,"url":"https:\/\/www.ablogix.fr\/wp-content\/uploads\/2020\/12\/visuel-formation-se\u0301curite\u0301-des-apps-webs.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_creator":"@ABlogiX","twitter_site":"@ABlogiX","twitter_misc":{"Written by":"Arthur Daunay","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.ablogix.fr\/#organization","name":"AblogiX","url":"https:\/\/www.ablogix.fr\/","sameAs":["https:\/\/www.linkedin.com\/company\/sarl-ablogix","https:\/\/www.youtube.com\/channel\/UC7LR5o5aeXzd2epr7eNma3g\/featured","https:\/\/www.facebook.com\/ABlogiX","https:\/\/twitter.com\/ABlogiX"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ablogix.fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.ablogix.fr\/wp-content\/uploads\/2020\/11\/Logo-ABlogiX.png","contentUrl":"https:\/\/www.ablogix.fr\/wp-content\/uploads\/2020\/11\/Logo-ABlogiX.png","width":534,"height":368,"caption":"AblogiX"},"image":{"@id":"https:\/\/www.ablogix.fr\/#\/schema\/logo\/image\/"}},{"@type":"WebSite","@id":"https:\/\/www.ablogix.fr\/#website","url":"https:\/\/www.ablogix.fr\/","name":"ABlogiX","description":"Ing\u00e9nierie de d\u00e9veloppement syst\u00e8me et logiciel, et s\u00e9curit\u00e9 du syst\u00e8me d&#039;information","publisher":{"@id":"https:\/\/www.ablogix.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ablogix.fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ablogix.fr\/2020\/12\/17\/ssi_tr1-securite-des-applications-web\/#primaryimage","url":"https:\/\/www.ablogix.fr\/wp-content\/uploads\/2020\/12\/visuel-formation-se\u0301curite\u0301-des-apps-webs.png","contentUrl":"https:\/\/www.ablogix.fr\/wp-content\/uploads\/2020\/12\/visuel-formation-se\u0301curite\u0301-des-apps-webs.png","width":800,"height":800},{"@type":"WebPage","@id":"https:\/\/www.ablogix.fr\/2020\/12\/17\/ssi_tr1-securite-des-applications-web\/#webpage","url":"https:\/\/www.ablogix.fr\/2020\/12\/17\/ssi_tr1-securite-des-applications-web\/","name":"SSi_Tr1 - Web Application Security - ABlogiX","isPartOf":{"@id":"https:\/\/www.ablogix.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ablogix.fr\/2020\/12\/17\/ssi_tr1-securite-des-applications-web\/#primaryimage"},"datePublished":"2020-12-17T14:15:43+00:00","dateModified":"2022-03-29T13:27:55+00:00","breadcrumb":{"@id":"https:\/\/www.ablogix.fr\/2020\/12\/17\/ssi_tr1-securite-des-applications-web\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ablogix.fr\/2020\/12\/17\/ssi_tr1-securite-des-applications-web\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.ablogix.fr\/2020\/12\/17\/ssi_tr1-securite-des-applications-web\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.ablogix.fr\/"},{"@type":"ListItem","position":2,"name":"SSi_Tr1 &#8211; S\u00e9curit\u00e9 des applications web"}]},{"@type":"Article","@id":"https:\/\/www.ablogix.fr\/2020\/12\/17\/ssi_tr1-securite-des-applications-web\/#article","isPartOf":{"@id":"https:\/\/www.ablogix.fr\/2020\/12\/17\/ssi_tr1-securite-des-applications-web\/#webpage"},"author":{"@id":"https:\/\/www.ablogix.fr\/#\/schema\/person\/ff6e7c4e8f042c7b26a8048c9a5f618c"},"headline":"SSi_Tr1 &#8211; Web Application Security","datePublished":"2020-12-17T14:15:43+00:00","dateModified":"2022-03-29T13:27:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ablogix.fr\/2020\/12\/17\/ssi_tr1-securite-des-applications-web\/#webpage"},"wordCount":721,"publisher":{"@id":"https:\/\/www.ablogix.fr\/#organization"},"image":{"@id":"https:\/\/www.ablogix.fr\/2020\/12\/17\/ssi_tr1-securite-des-applications-web\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ablogix.fr\/wp-content\/uploads\/2020\/12\/visuel-formation-se\u0301curite\u0301-des-apps-webs.png","articleSection":["Tr_SSI: S\u00e9curit\u00e9 du SI"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.ablogix.fr\/#\/schema\/person\/ff6e7c4e8f042c7b26a8048c9a5f618c","name":"Arthur Daunay","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ablogix.fr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5b1a54b261ab94cf3676bb2b46b8a0e7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5b1a54b261ab94cf3676bb2b46b8a0e7?s=96&d=mm&r=g","caption":"Arthur Daunay"},"url":"https:\/\/www.ablogix.fr\/en\/author\/a-daunay\/"}]}},"_links":{"self":[{"href":"https:\/\/www.ablogix.fr\/en\/wp-json\/wp\/v2\/posts\/2307"}],"collection":[{"href":"https:\/\/www.ablogix.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ablogix.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ablogix.fr\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ablogix.fr\/en\/wp-json\/wp\/v2\/comments?post=2307"}],"version-history":[{"count":24,"href":"https:\/\/www.ablogix.fr\/en\/wp-json\/wp\/v2\/posts\/2307\/revisions"}],"predecessor-version":[{"id":10230,"href":"https:\/\/www.ablogix.fr\/en\/wp-json\/wp\/v2\/posts\/2307\/revisions\/10230"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ablogix.fr\/en\/wp-json\/wp\/v2\/media\/3411"}],"wp:attachment":[{"href":"https:\/\/www.ablogix.fr\/en\/wp-json\/wp\/v2\/media?parent=2307"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ablogix.fr\/en\/wp-json\/wp\/v2\/categories?post=2307"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ablogix.fr\/en\/wp-json\/wp\/v2\/tags?post=2307"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}