{"id":17154,"date":"2025-08-22T12:00:00","date_gmt":"2025-08-22T12:00:00","guid":{"rendered":"https:\/\/unichrone.com\/blog\/?p=17154"},"modified":"2026-02-10T15:07:08","modified_gmt":"2026-02-10T15:07:08","slug":"top-tactics-for-ethical-hacking-and-penetration-testing","status":"publish","type":"post","link":"https:\/\/unichrone.com\/blog\/cybersecurity\/top-tactics-for-ethical-hacking-and-penetration-testing\/","title":{"rendered":"Top Tactics for Ethical Hacking and Penetration Testing"},"content":{"rendered":"\n<p>If you\u2019ve ever been curious about how to become an ethical hacker, you are at the right place. You have probably wondered where to start and what skills actually matter. However, the truth is that ethical hacking is more than just a tool. It\u2019s a mindset, a process, and more than that, it\u2018s a craft. Moreover, penetration testing is like your playground to think like an attacker but act like a protector. That means, in the present scenario, staying ahead of threats means sharpening your skills, mastering proven tactics, and knowing when to get creative.<\/p>\n\n\n\n<p>In this blog, we will explore the most effective and real-world strategies of ethical hacking. Definitely, it aids you to confidently step into the role of an ethical hacker who plays by the rules but thinks outside the box.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/res.cloudinary.com\/dtkh0ta1d\/image\/upload\/v1770699701\/Top-Tactics-for-Ethical-Hacking-and-Penetration-Testing_pxs7pk.webp\" alt=\"Top Tactics for Ethical Hacking and Penetration Testing\" style=\"width:516px;height:auto\"\/><figcaption class=\"wp-element-caption\">Top Tactics for Ethical Hacking and Penetration Testing<\/figcaption><\/figure>\n<\/div>\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-light-blue ez-toc-container-direction\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Jump ahead to<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-69e0775af3525\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #495393;color:#495393\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #495393;color:#495393\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-69e0775af3525\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/unichrone.com\/blog\/cybersecurity\/top-tactics-for-ethical-hacking-and-penetration-testing\/#Core_Pillars_of_Ethical_Hacking_Mastery\" >Core Pillars of Ethical Hacking Mastery<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/unichrone.com\/blog\/cybersecurity\/top-tactics-for-ethical-hacking-and-penetration-testing\/#Understand_the_Foundations_of_Ethical_Hacking_and_Penetration_Testing\" >Understand the Foundations of Ethical Hacking and Penetration Testing<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/unichrone.com\/blog\/cybersecurity\/top-tactics-for-ethical-hacking-and-penetration-testing\/#Beef_Up_Your_Reconnaissance_Game\" >Beef Up Your Reconnaissance Game<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/unichrone.com\/blog\/cybersecurity\/top-tactics-for-ethical-hacking-and-penetration-testing\/#Scan_with_Surgical_Precision\" >Scan with Surgical Precision<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/unichrone.com\/blog\/cybersecurity\/top-tactics-for-ethical-hacking-and-penetration-testing\/#Hone_Your_Exploitation_Techniques\" >Hone Your Exploitation Techniques<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/unichrone.com\/blog\/cybersecurity\/top-tactics-for-ethical-hacking-and-penetration-testing\/#Blend_in_AI_and_Keep_Your_Brain_in_the_Game\" >Blend in AI and Keep Your Brain in the Game<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/unichrone.com\/blog\/cybersecurity\/top-tactics-for-ethical-hacking-and-penetration-testing\/#Simulate_the_Real_World_Threats_with_the_Red_Teaming\" >Simulate the Real World Threats with the Red Teaming<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/unichrone.com\/blog\/cybersecurity\/top-tactics-for-ethical-hacking-and-penetration-testing\/#Embrace_Advanced_Social_Engineering_Tactics\" >Embrace Advanced Social Engineering Tactics<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/unichrone.com\/blog\/cybersecurity\/top-tactics-for-ethical-hacking-and-penetration-testing\/#Choose_the_Right_Frameworks_and_Certifications\" >Choose the Right Frameworks and Certifications<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/unichrone.com\/blog\/cybersecurity\/top-tactics-for-ethical-hacking-and-penetration-testing\/#Stay_Agile_Proactive_and_One_Step_Ahead\" >Stay Agile, Proactive, and One Step Ahead<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/unichrone.com\/blog\/cybersecurity\/top-tactics-for-ethical-hacking-and-penetration-testing\/#Ride_the_Wave_of_Opportunity_and_Demand\" >Ride the Wave of Opportunity and Demand<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/unichrone.com\/blog\/cybersecurity\/top-tactics-for-ethical-hacking-and-penetration-testing\/#Final_Thoughts\" >Final Thoughts<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/unichrone.com\/blog\/cybersecurity\/top-tactics-for-ethical-hacking-and-penetration-testing\/#FAQs\" >FAQs<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Core_Pillars_of_Ethical_Hacking_Mastery\"><\/span>Core Pillars of Ethical Hacking Mastery<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Understand_the_Foundations_of_Ethical_Hacking_and_Penetration_Testing\"><\/span>Understand the Foundations of Ethical Hacking and Penetration Testing<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Before you jump into the hacking simulations, you need a clear map of the journey. Think of ethical hacking as a big picture and penetration testing as a focused mission within it.&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Learn the five golden phases, which are reconnaissance, scanning, vulnerability assessment, exploitation, and reporting.<\/li>\n\n\n\n<li>It is pivotal to differentiate between black box, white box, and grey box testing. It\u2019s like choosing the right lens for the right picture.<\/li>\n\n\n\n<li>Always define your scope before you touch a single key.<\/li>\n\n\n\n<li>Always remember that the road to mastery is paved with lawful intent.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Beef_Up_Your_Reconnaissance_Game\"><\/span>Beef Up Your Reconnaissance Game<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>This is where you put on your detective hat. Furthermore, reconnaissance, also called footprinting, is the stage where how to become an ethical hacker begins to take shape.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Use passive reconnaissance to gather clues without leaving footprints.<\/li>\n\n\n\n<li>Switch to active recon when it\u2019s time to knock on doors and see who answers.<\/li>\n\n\n\n<li>Dig into the public records, network maps, and overlooked data trails.<\/li>\n\n\n\n<li>Knowledge is certainly your ace in the hole. This implies the fact that the more you know, the better you can strike.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Scan_with_Surgical_Precision\"><\/span>Scan with Surgical Precision<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>When it\u2019s time to zero in on weakness, precision is your best friend. Penetration testing demands accuracy over brute force.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Pinpoint open spots and services like hawk spotting prey.<\/li>\n\n\n\n<li>Use vulnerability scanners, but at the same time, don\u2019t rely on them blindly.<\/li>\n\n\n\n<li>Confirm your findings. It\u2019s better to be safe than sorry.<\/li>\n\n\n\n<li>Think of scanning as threading a needle, not swinging a sledgehammer.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Hone_Your_Exploitation_Techniques\"><\/span>Hone Your Exploitation Techniques<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Here\u2019s where the adrenaline kicks in. That means, you have found the crack in the wall, and now you see if you can slip through it.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Use frameworks to simulate realistic exploits without crossing the line.<\/li>\n\n\n\n<li>Combine automated tools with your creative flair. Definitely, machines follow the scripts you improvise.<\/li>\n\n\n\n<li>Keep meticulous notes; your future self will thank you.<\/li>\n\n\n\n<li>Always remember to play within the agreed-upon rules or risk burning bridges.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Blend_in_AI_and_Keep_Your_Brain_in_the_Game\"><\/span>Blend in AI and Keep Your Brain in the Game<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>AI can be your secret weapon, but don\u2019t hand it the steering wheel.&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Deploy AI to sort vulnerabilities and crunch reconnaissance data in record time.<\/li>\n\n\n\n<li>Always double-check your work. AI can sometimes paint outside the lines.<\/li>\n\n\n\n<li>Apply your human intuition to spot the wolves in the sheep&#8217;s clothing.<\/li>\n\n\n\n<li>It is apt to let <a href=\"https:\/\/unichrone.com\/au\/artificial-intelligence-foundation-training\">AI<\/a> handle the heavy lifting while you call the shots.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Simulate_the_Real_World_Threats_with_the_Red_Teaming\"><\/span>Simulate the Real World Threats with the Red Teaming<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Want to really test the defenses? Sometimes you need to step into the attacker&#8217;s shoes completely. Furthermore, real-teaming makes your ethical hacking realistic and challenging.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Include social engineering and phishing in your tests.<\/li>\n\n\n\n<li>You can attempt physical intrusion scenarios when appropriate.<\/li>\n\n\n\n<li>Try purple teaming. You can collaborate with defenders for mutual learning.<\/li>\n\n\n\n<li>Use what you find to build an iron-clad defense.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Embrace_Advanced_Social_Engineering_Tactics\"><\/span>Embrace Advanced Social Engineering Tactics<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Humans are often the soft underbelly of security. As you master how you become an ethical hacker, you will see that psychology is as predominant as technology.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Test employee awareness with simulated phishing emails.<\/li>\n\n\n\n<li>Explore voice-based attacks like vishing for training purposes.<\/li>\n\n\n\n<li>Use deepfake simulations under controlled conditions to measure readiness.<\/li>\n\n\n\n<li>Turn vulnerabilities into strengths through tailored training<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Choose_the_Right_Frameworks_and_Certifications\"><\/span>Choose the Right Frameworks and Certifications<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>A skilled artist needs a strong canvas. Therefore, robust frameworks and <a href=\"https:\/\/unichrone.com\/au\/cyber-security-awareness-training\">certifications<\/a> give structure to your penetration testing. Definitely, your ethical hacking journey should be more than a shot in the dark.&nbsp; For that, you need a road map that keeps you sharp and on target.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>It is optimal to follow trusted industry frameworks like <a href=\"https:\/\/owasp.org\/www-project-top-ten\/\">OWASP<\/a> and NIST to align with best practices.<\/li>\n\n\n\n<li>Earn your CEH( Certified Ethical Hacker) to gain a solid and structured approach to penetration testing.<\/li>\n\n\n\n<li>Keep your skills razor-sharp through consistent practice and continuous learning.<\/li>\n\n\n\n<li>Trust every project like a rehearsal for a real stage. Certainly, precision now means fewer surprises later.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Stay_Agile_Proactive_and_One_Step_Ahead\"><\/span>Stay Agile, Proactive, and One Step Ahead<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>In <a href=\"https:\/\/unichrone.com\/blog\/cybersecurity\/top-cyber-security-tools-in-2024\/\">cybersecurity<\/a>, standing still is moving backward. This means ethical hacking thrives on agility.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Test systems regularly, not just once a year.<\/li>\n\n\n\n<li>Keep a finger on the pulse of new vulnerabilities.<\/li>\n\n\n\n<li>Act on facts, not hunches. Let data drive your moves.<\/li>\n\n\n\n<li>Always be proactive; you can beat attackers to the punch.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Ride_the_Wave_of_Opportunity_and_Demand\"><\/span>Ride the Wave of Opportunity and Demand<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>There\u2019s never been a better time to enter ethical hacking. If you know how to become an ethical hacker, opportunities are waiting.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Cybersecurity jobs are booming in every sector.<\/li>\n\n\n\n<li>Your work protects the imperative assets that keep the world running.<\/li>\n\n\n\n<li>The field evolves very quickly. Boredom is never on the menu.<\/li>\n\n\n\n<li>Curiosity and persistence are your tickets to the top.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Final_Thoughts\"><\/span>Final Thoughts<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Mastering ethical hacking and penetration testing is like learning to play chess on a consistently changing board. Strategy, speed, and skills all rolled into one. Hence, with the right mindset and tactics under your belt, you won\u2019t just keep up with criminals but stay two steps ahead.<\/p>\n\n\n\n<p>If you are serious about the thought, \u2018How to become an ethical hacker?\u2019, <a href=\"https:\/\/unichrone.com\/us\/ethical-hacking-professional-training\">Ethical Hacking Professional Training<\/a> can transform theory into practice. Like sharpening your sword before battle, training equips you to face the digital arena with precision and courage.&nbsp;<\/p>\n\n\n\n<p>As the saying goes, \u201cforewarned is forearmed,\u201d and in this field, knowledge is your armor.&nbsp;<\/p>\n\n\n\n<p>Step forward because the cyber frontier is waiting for pioneers like you!<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"FAQs\"><\/span>FAQs<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p><strong>&nbsp;What\u2019s the core difference between ethical hacking and penetration testing?<\/strong><strong><br><\/strong> Ethical hacking is the broad art of probing systems for vulnerabilities with permission, while penetration testing is a focused, time-bound exercise simulating a real-world cyberattack.&nbsp;<\/p>\n\n\n\n<p><strong>Do I need advanced coding skills to become an ethical hacker?<\/strong><strong><br><\/strong> Not necessarily, but having a strong grasp of programming languages like Python or JavaScript will give you an upper hand.&nbsp;<\/p>\n\n\n\n<p><strong>Is ethical hacking a legal profession?<\/strong><strong><br><\/strong> Yes, when done with proper authorization and within the law. Without permission, it\u2019s crossing the digital Rubicon into illegal territory.<\/p>\n\n\n\n<p><strong>What tools do professional ethical hackers use?<\/strong><strong><br><\/strong> Professional ethical hackers use a mix of industry staples like Metasploit, Burp Suite, and Wireshark, alongside custom scripts.<\/p>\n\n\n\n<p><strong>Can ethical hacking really help prevent cyberattacks?<\/strong><strong><br><\/strong>Yes. Ethical hackers find and fix vulnerabilities before malicious hackers can exploit them, which turns potential cyber-catastrophes into mere ripples in the pond.<\/p>\n\n\n\n<p><strong>&nbsp;Is certification important in this field?<\/strong><strong><br><\/strong> Yes. Certifications like CEH (Certified Ethical Hacker) act as golden tickets, opening doors to better job opportunities and trust from clients.<\/p>\n\n\n\n<p><strong>How do I stay updated with the latest hacking trends?<\/strong><strong><br><\/strong> It is pivotal to follow reputable cybersecurity blogs, attend conferences, participate in methodological courses, and engage in online communities. In this field, staying stagnant is like leaving your digital fortress\u2019s gates wide open.<\/p>\n\n\n\n<p><strong>Is penetration testing only for large companies?<\/strong><strong><br><\/strong> Not at all. Even small businesses benefit from penetration tests, as cybercriminals don\u2019t discriminate by company size.<\/p>\n\n\n\n<p><strong>What is the single best habit for an aspiring ethical hacker?<\/strong><strong><br><\/strong> Cultivate relentless curiosity. In the cybersecurity realm, curiosity isn\u2019t just a virtue; it\u2019s a professional\u2019s superpower.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you\u2019ve ever been curious about how to become an ethical hacker, you are at the right place. You have probably wondered where to start&hellip;<\/p>\n","protected":false},"author":10,"featured_media":17156,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1255],"tags":[1405,1406],"class_list":["post-17154","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-ethical-hacking-and-penetration-testing","tag-ethical-hacking-and-penetration-testing-training"],"_links":{"self":[{"href":"https:\/\/unichrone.com\/blog\/wp-json\/wp\/v2\/posts\/17154","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/unichrone.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/unichrone.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/unichrone.com\/blog\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/unichrone.com\/blog\/wp-json\/wp\/v2\/comments?post=17154"}],"version-history":[{"count":5,"href":"https:\/\/unichrone.com\/blog\/wp-json\/wp\/v2\/posts\/17154\/revisions"}],"predecessor-version":[{"id":18318,"href":"https:\/\/unichrone.com\/blog\/wp-json\/wp\/v2\/posts\/17154\/revisions\/18318"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/unichrone.com\/blog\/wp-json\/wp\/v2\/media\/17156"}],"wp:attachment":[{"href":"https:\/\/unichrone.com\/blog\/wp-json\/wp\/v2\/media?parent=17154"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/unichrone.com\/blog\/wp-json\/wp\/v2\/categories?post=17154"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/unichrone.com\/blog\/wp-json\/wp\/v2\/tags?post=17154"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}