{"id":9078,"date":"2020-05-18T07:39:09","date_gmt":"2020-05-18T14:39:09","guid":{"rendered":"https:\/\/origin-www.parsons.com\/?p=9078"},"modified":"2023-07-25T16:59:02","modified_gmt":"2023-07-25T20:59:02","slug":"leveling-up-your-cyber-skills-a-guide-to-capture-the-flag-part-5","status":"publish","type":"post","link":"https:\/\/www.parsons.com\/2020\/05\/leveling-up-your-cyber-skills-a-guide-to-capture-the-flag-part-5\/","title":{"rendered":"Leveling Up Your Cyber Skills \u2013 A Guide To Capture The Flag (Part 5)"},"content":{"rendered":"\n
\"Cyber<\/figure>\n\n\n\n

Hosting a CTF: Part 5 \u2013 How To Create Detailed Content For Jeopardy-Style CTF Event<\/strong><\/h3>\n\n\n\n

Let\u2019s work through an example of creating a challenge other\nthan \u201cfind the flag in this file.\u201d<\/p>\n\n\n\n

I want to create a topic on beginner-level network analysis\nfor a variety of protocols. Off the top of my head, I want to include questions\non DNS, NNTP (Network News Transport Protocol) Telnet, FTP, and IRC, since I\nthink all of those are unencrypted protocols (and are more fun than HTTP, which\nis what many challenges use because it\u2019s so common).<\/p>\n\n\n\n

We\u2019re going to want to create our own .pcap file. And we\u2019ll\nwant the traffic to be clean (since our normal computer probably has all sorts\nof things talking to the internet on a regular basis, like our email and chat\nclients). An easy way to get a clean VM would be to download a Kali VM (You can\nfind one at https:\/\/www.offensive-security.com\/kali-linux-vm-vmware-virtualbox-image-download\/<\/a>.).\nIf you\u2019re brave, you can employ a VM you use more often\u2014I have a Windows VM I use that\nI decided to use for this example. Once you have the VM you want, you can plan\nwhat you want the traffic to do. To generate a cleaner pcap, I highly recommend\nplanning ahead of time, rather than starting tcpdump or Wireshark and then\ntrying to figure it out. So install Wireshark if it\u2019s not already installed\n(with libpcap, so it can collect).<\/p>\n\n\n\n

For DNS<\/strong>, I don\u2019t think we need to do anything special, as everything we do will create DNS entries, and we can just create a question off the traffic without having to choose it ahead of time.<\/p>\n\n\n\n

For NNTP<\/strong>, I listen to the Security Now! podcast, so I know we can connect to the GRC newsgroups. I recommend Gravity, which you should download, install, and prep to connect to news.grc.com.<\/p>\n\n\n\n

For Telnet<\/strong>, we should find a telnet sever we can connect to that will be interesting. MUDs use telnet servers, and I Googled around and found Toril Mud, which can be connected to on torilmud.org:9999. Make sure telnet is installed in your VM. (If you\u2019re using Windows, download, Putty. While it\u2019s normally used as a SSH client, it can connect over Telnet, too.) Prep telnet in the command line (or Putty) to connect to torilmud.org:9999. Once we\u2019re ready, we\u2019ll create an account and character there and say, \u201cThe flag is tortoise,\u201d when we log in (and then we\u2019ll log out).<\/p>\n\n\n\n

Now for FTP<\/strong>. We need an FTP site to connect to. Googling for Debian mirrors, let\u2019s pick a random FTPp site, mirrors.bloomu.edu. We should log in there (as anonymous, with the password sankins@sankil.com<\/a>), browse to a directory, and download a .deb file (without switching to data mode from ASCII mode).<\/p>\n\n\n\n

For IRC<\/strong>, we will need a client. I recommend downloading HexChat. Configure it to have a fun username (and backup usernames) and set it to connect to chat.freenode.net (on port 6697), but don\u2019t click connect yet.<\/p>\n\n\n\n

Now, to ensure the .pcap isn\u2019t too clean, go to some random\nwebsites in your browser in between doing the above tasks. Open Firefox (or\nyour favorite browser) and have it prepped to go to a few random sites (like\ntorilmud.com) to ensure there\u2019s also some HTTP traffic in the .pcap.<\/p>\n\n\n\n

Now that you have your script ready to go, confirm all the\nprograms we want to use are open and ready to connect. Then open up Wireshark and\nstart to collect all traffic on that main interface. <\/p>\n\n\n\n

I then followed the script at a reasonable pace. <\/p>\n\n\n\n

I connected to news.grc.com in Gravity, joined the\ngrc.cookies group, and read a couple of messages. I then went to torilmud.com\nin Firefox to generate some web traffic. I ran \u201ctelnet torilmud.org 9999\u201d to\nconnect to Toril Mud and created an account and a character, then made my\ncharacter say, \u201cThe flag is tortal\u201d and quit. <\/p>\n\n\n\n

I then hit enter on my Putty session that had \u201cftp\nmirrors.bloomu.edu\u201d so it would connect and logged in as anonymous with the\npredetermined email address. I went into the mirrors folder for Debian and\ndownloaded a random .deb file (and specifically did not put it into data mode).\n<\/p>\n\n\n\n

Then I stopped Wireshark and saved the .pcap.<\/p>\n\n\n\n

Next, I went back in the .pcap to analyze the traffic and\ncome up with the questions based on what I did.<\/p>\n\n\n\n

First, I sorted by DNS traffic to find a good question. The first\nDNS entry was to \u201cchat.freenode.net,\u201d so I created the first question.<\/p>\n\n\n\n

1. What is the first domain name that is looked up in this .pcap (Example of a domain name: <\/strong><\/em>www.google.com<\/strong><\/em><\/a>)?<\/strong><\/em><\/p>\n\n\n\n

Then I looked at the NNTP traffic. I found the first group I\njoined (grc.cookies) and created the second question.<\/p>\n\n\n\n

2. What is the first news group that was subscribed to\/accessed by the user in this .pcap?<\/strong><\/em><\/p>\n\n\n\n

In the newsgroup traffic, I saw a message  about a potential virus:\n\u201cAdware:Win32\/RelatedLinks.\u201d So I created the third question.<\/p>\n\n\n\n

3. One of the messages in the newsgroup talks about a popup alerting the user to a potential virus. What was the full name of that potential virus?<\/strong><\/em><\/p>\n\n\n\n

Next, I wanted a question about the Telnet\/MUD traffic. I\nstarted with a simple one about connecting to the MUD (torilmud.org on port\n9999).<\/p>\n\n\n\n

4. The user accessed a MUD in this .pcap. What was the domain name and post of the MUD accessed (in the format \u201cDOMAIN:PORT,\u201d like <\/strong><\/em>www.google.com:443<\/strong><\/em>)?<\/strong><\/em><\/p>\n\n\n\n

I looked more at the Telnet\/MUD traffic and came up with the\nfifth question.<\/p>\n\n\n\n

5. In this session, the user created a new user when they connected to the MUD. What is the username and password combination that they successfully created, in the format \u201cusername:password\u201d?<\/strong><\/em><\/p>\n\n\n\n

I continued looking at the Telnet\/MUD traffic and came up\nwith the sixth question\u2014one about the flag I spoke, \u201ctortal.\u201d <\/p>\n\n\n\n

6. In the provided .pcap, the user-created a character in the MUD, who promptly logged in and spoke about a flag. What is the flag the character spoke?<\/strong><\/em><\/p>\n\n\n\n

Next, I switched to the FTP traffic and came up with the\nseventh question based on the login information (anonymous: sankins@sankil.com<\/a>).<\/p>\n\n\n\n

7. In the provided .pcap, the user logged into an FTP site. What password did they use to login to the FTP site?<\/strong><\/em><\/p>\n\n\n\n

Continuing with the FTP traffic, I wanted to ask a question about\nthe file I downloaded to ensure the participants could find it, so I created\nthe eighth question. <\/p>\n\n\n\n

8. In the provided .pcap, the user logged into an FTP site. What is the name of the file they downloaded from it?<\/strong><\/em><\/p>\n\n\n\n

To force the participants to extract the downloaded file\nfrom the .pcap, I wanted to ask a question about the hash of the downloaded\nfile (as they\u2019d have to extract it from the .pcap to get the hash), so I\ncreated the ninth question, which required me to extract the file from the\n.pcap myself and run sha256sum on it to get the hash.<\/p>\n\n\n\n

9. In this session, the user logged into a FTP site. What is the sha256 hash of the file they downloaded?<\/strong><\/em> <\/strong><\/p>\n\n\n\n

IRC connections use encryption now, so when I looked at the\ntraffic, I couldn\u2019t see myself logging in and connecting to a channel like I\nexpected. Then I realized a question about what IRC domain name and port we\nconnected to would be a good question (it was chat.freenode.net:6697).<\/p>\n\n\n\n

10. In this session, the user connected to an IRC server. What is the domain name and port of the server they connected to? (in the format domainname:port, like www.google.com:443)<\/strong><\/em><\/p>\n\n\n\n

In the next post, we\u2019ll go over how to create solutions slides for your questions. <\/p>\n\n\n

<\/span>
About The Author<\/h5>

Nicholas J. has more than 15 years of experience supporting cybersecurity operations, engineering, development, and all sorts of crazy fun things for the U.S. Department of Defense \u2013 12 of those with Parsons!  Nicholas currently serves as Cyber Thaumaturgy Director of the Collection & Analytics Portfolio, working hard to bring more fun and technical awesomeness to both our amazing Parsons team and the community at large via tech talks, large-scale interactive training sessions, Capture the Flag events, and other mentorship opportunities.   <\/p><\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"

Hosting a CTF: Part 5 \u2013 How To Create Detailed Content For Jeopardy-Style CTF Event Let\u2019s work through an example of creating a challenge other than \u201cfind the flag in […]<\/p>\n","protected":false},"author":29,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"9336,9071,9029,9095,20435,8540","_relevanssi_noindex_reason":"","footnotes":""},"categories":[7663],"tags":[],"class_list":["post-9078","post","type-post","status-publish","format-standard","hentry","category-cyber"],"yoast_head":"\nLeveling Up Your Cyber Skills \u2013 A Guide To Capture The Flag (Part 5)<\/title>\n<meta name=\"description\" content=\"Hosting a CTF: Part 5 \u2013 How To Create Detailed Content For Jeopardy-Style CTF Event Let\u2019s work through an example of creating a challenge other than \u201cfind\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.parsons.com\/2020\/05\/leveling-up-your-cyber-skills-a-guide-to-capture-the-flag-part-5\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Leveling Up Your Cyber Skills \u2013 A Guide To Capture The Flag (Part 5)\" \/>\n<meta property=\"og:description\" content=\"Hosting a CTF: Part 5 \u2013 How To Create Detailed Content For Jeopardy-Style CTF Event Let\u2019s work through an example of creating a challenge other than \u201cfind\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.parsons.com\/2020\/05\/leveling-up-your-cyber-skills-a-guide-to-capture-the-flag-part-5\/\" \/>\n<meta property=\"og:site_name\" content=\"Parsons Corporation\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/parsonscorporation\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-18T14:39:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-25T20:59:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.parsons.com\/wp-content\/uploads\/2020\/02\/parsons-logo-for-social.png\" \/>\n\t<meta property=\"og:image:width\" content=\"684\" \/>\n\t<meta property=\"og:image:height\" content=\"353\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Theresa Wederman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@parsonscorp\" \/>\n<meta name=\"twitter:site\" content=\"@parsonscorp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Theresa Wederman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.parsons.com\/2020\/05\/leveling-up-your-cyber-skills-a-guide-to-capture-the-flag-part-5\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.parsons.com\/2020\/05\/leveling-up-your-cyber-skills-a-guide-to-capture-the-flag-part-5\/\"},\"author\":{\"name\":\"Theresa Wederman\",\"@id\":\"https:\/\/www.parsons.com\/#\/schema\/person\/ffd34de8b6b2440a671ee6cbf6676c5f\"},\"headline\":\"Leveling Up Your Cyber Skills \u2013 A Guide To Capture The Flag (Part 5)\",\"datePublished\":\"2020-05-18T14:39:09+00:00\",\"dateModified\":\"2023-07-25T20:59:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.parsons.com\/2020\/05\/leveling-up-your-cyber-skills-a-guide-to-capture-the-flag-part-5\/\"},\"wordCount\":1464,\"publisher\":{\"@id\":\"https:\/\/www.parsons.com\/#organization\"},\"articleSection\":[\"Cyber\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.parsons.com\/2020\/05\/leveling-up-your-cyber-skills-a-guide-to-capture-the-flag-part-5\/\",\"url\":\"https:\/\/www.parsons.com\/2020\/05\/leveling-up-your-cyber-skills-a-guide-to-capture-the-flag-part-5\/\",\"name\":\"Leveling Up Your Cyber Skills \u2013 A Guide To Capture The Flag (Part 5)\",\"isPartOf\":{\"@id\":\"https:\/\/www.parsons.com\/#website\"},\"datePublished\":\"2020-05-18T14:39:09+00:00\",\"dateModified\":\"2023-07-25T20:59:02+00:00\",\"description\":\"Hosting a CTF: Part 5 \u2013 How To Create Detailed Content For Jeopardy-Style CTF Event Let\u2019s work through an example of creating a challenge other than \u201cfind\",\"breadcrumb\":{\"@id\":\"https:\/\/www.parsons.com\/2020\/05\/leveling-up-your-cyber-skills-a-guide-to-capture-the-flag-part-5\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.parsons.com\/2020\/05\/leveling-up-your-cyber-skills-a-guide-to-capture-the-flag-part-5\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.parsons.com\/2020\/05\/leveling-up-your-cyber-skills-a-guide-to-capture-the-flag-part-5\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.parsons.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Leveling Up Your Cyber Skills \u2013 A Guide To Capture The Flag (Part 5)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.parsons.com\/#website\",\"url\":\"https:\/\/www.parsons.com\/\",\"name\":\"Parsons Corporation\",\"description\":\"Infrastructure, Defense, Security, and Construction\",\"publisher\":{\"@id\":\"https:\/\/www.parsons.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.parsons.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.parsons.com\/#organization\",\"name\":\"Parsons Corporation\",\"url\":\"https:\/\/www.parsons.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.parsons.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.parsons.com\/wp-content\/uploads\/2020\/02\/parsons-logo-for-social.png\",\"contentUrl\":\"https:\/\/www.parsons.com\/wp-content\/uploads\/2020\/02\/parsons-logo-for-social.png\",\"width\":684,\"height\":353,\"caption\":\"Parsons Corporation\"},\"image\":{\"@id\":\"https:\/\/www.parsons.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/parsonscorporation\",\"https:\/\/x.com\/parsonscorp\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.parsons.com\/#\/schema\/person\/ffd34de8b6b2440a671ee6cbf6676c5f\",\"name\":\"Theresa Wederman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.parsons.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e75b9003608a0a78196a3423011a34c5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e75b9003608a0a78196a3423011a34c5?s=96&d=mm&r=g\",\"caption\":\"Theresa Wederman\"},\"url\":\"https:\/\/www.parsons.com\/author\/theresa-wederman\/\"}]}<\/script>\n","yoast_head_json":{"title":"Leveling Up Your Cyber Skills \u2013 A Guide To Capture The Flag (Part 5)","description":"Hosting a CTF: Part 5 \u2013 How To Create Detailed Content For Jeopardy-Style CTF Event Let\u2019s work through an example of creating a challenge other than \u201cfind","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.parsons.com\/2020\/05\/leveling-up-your-cyber-skills-a-guide-to-capture-the-flag-part-5\/","og_locale":"en_US","og_type":"article","og_title":"Leveling Up Your Cyber Skills \u2013 A Guide To Capture The Flag (Part 5)","og_description":"Hosting a CTF: Part 5 \u2013 How To Create Detailed Content For Jeopardy-Style CTF Event Let\u2019s work through an example of creating a challenge other than \u201cfind","og_url":"https:\/\/www.parsons.com\/2020\/05\/leveling-up-your-cyber-skills-a-guide-to-capture-the-flag-part-5\/","og_site_name":"Parsons Corporation","article_publisher":"https:\/\/www.facebook.com\/parsonscorporation","article_published_time":"2020-05-18T14:39:09+00:00","article_modified_time":"2023-07-25T20:59:02+00:00","og_image":[{"width":684,"height":353,"url":"https:\/\/www.parsons.com\/wp-content\/uploads\/2020\/02\/parsons-logo-for-social.png","type":"image\/png"}],"author":"Theresa Wederman","twitter_card":"summary_large_image","twitter_creator":"@parsonscorp","twitter_site":"@parsonscorp","twitter_misc":{"Written by":"Theresa Wederman","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.parsons.com\/2020\/05\/leveling-up-your-cyber-skills-a-guide-to-capture-the-flag-part-5\/#article","isPartOf":{"@id":"https:\/\/www.parsons.com\/2020\/05\/leveling-up-your-cyber-skills-a-guide-to-capture-the-flag-part-5\/"},"author":{"name":"Theresa Wederman","@id":"https:\/\/www.parsons.com\/#\/schema\/person\/ffd34de8b6b2440a671ee6cbf6676c5f"},"headline":"Leveling Up Your Cyber Skills \u2013 A Guide To Capture The Flag (Part 5)","datePublished":"2020-05-18T14:39:09+00:00","dateModified":"2023-07-25T20:59:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.parsons.com\/2020\/05\/leveling-up-your-cyber-skills-a-guide-to-capture-the-flag-part-5\/"},"wordCount":1464,"publisher":{"@id":"https:\/\/www.parsons.com\/#organization"},"articleSection":["Cyber"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.parsons.com\/2020\/05\/leveling-up-your-cyber-skills-a-guide-to-capture-the-flag-part-5\/","url":"https:\/\/www.parsons.com\/2020\/05\/leveling-up-your-cyber-skills-a-guide-to-capture-the-flag-part-5\/","name":"Leveling Up Your Cyber Skills \u2013 A Guide To Capture The Flag (Part 5)","isPartOf":{"@id":"https:\/\/www.parsons.com\/#website"},"datePublished":"2020-05-18T14:39:09+00:00","dateModified":"2023-07-25T20:59:02+00:00","description":"Hosting a CTF: Part 5 \u2013 How To Create Detailed Content For Jeopardy-Style CTF Event Let\u2019s work through an example of creating a challenge other than \u201cfind","breadcrumb":{"@id":"https:\/\/www.parsons.com\/2020\/05\/leveling-up-your-cyber-skills-a-guide-to-capture-the-flag-part-5\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.parsons.com\/2020\/05\/leveling-up-your-cyber-skills-a-guide-to-capture-the-flag-part-5\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.parsons.com\/2020\/05\/leveling-up-your-cyber-skills-a-guide-to-capture-the-flag-part-5\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.parsons.com\/"},{"@type":"ListItem","position":2,"name":"Leveling Up Your Cyber Skills \u2013 A Guide To Capture The Flag (Part 5)"}]},{"@type":"WebSite","@id":"https:\/\/www.parsons.com\/#website","url":"https:\/\/www.parsons.com\/","name":"Parsons Corporation","description":"Infrastructure, Defense, Security, and Construction","publisher":{"@id":"https:\/\/www.parsons.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.parsons.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.parsons.com\/#organization","name":"Parsons Corporation","url":"https:\/\/www.parsons.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.parsons.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.parsons.com\/wp-content\/uploads\/2020\/02\/parsons-logo-for-social.png","contentUrl":"https:\/\/www.parsons.com\/wp-content\/uploads\/2020\/02\/parsons-logo-for-social.png","width":684,"height":353,"caption":"Parsons Corporation"},"image":{"@id":"https:\/\/www.parsons.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/parsonscorporation","https:\/\/x.com\/parsonscorp"]},{"@type":"Person","@id":"https:\/\/www.parsons.com\/#\/schema\/person\/ffd34de8b6b2440a671ee6cbf6676c5f","name":"Theresa Wederman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.parsons.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e75b9003608a0a78196a3423011a34c5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e75b9003608a0a78196a3423011a34c5?s=96&d=mm&r=g","caption":"Theresa Wederman"},"url":"https:\/\/www.parsons.com\/author\/theresa-wederman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.parsons.com\/wp-json\/wp\/v2\/posts\/9078"}],"collection":[{"href":"https:\/\/www.parsons.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.parsons.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.parsons.com\/wp-json\/wp\/v2\/users\/29"}],"replies":[{"embeddable":true,"href":"https:\/\/www.parsons.com\/wp-json\/wp\/v2\/comments?post=9078"}],"version-history":[{"count":0,"href":"https:\/\/www.parsons.com\/wp-json\/wp\/v2\/posts\/9078\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.parsons.com\/wp-json\/wp\/v2\/media?parent=9078"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.parsons.com\/wp-json\/wp\/v2\/categories?post=9078"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.parsons.com\/wp-json\/wp\/v2\/tags?post=9078"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}