{"id":2869,"date":"2014-12-09T11:54:46","date_gmt":"2014-12-09T11:54:46","guid":{"rendered":"https:\/\/dn-www.azurewebsites.net\/2014\/12\/09\/disabling-mcafee-on-access-scanning\/"},"modified":"2024-02-06T12:18:13","modified_gmt":"2024-02-06T12:18:13","slug":"disabling-mcafee-on-access-scanning","status":"publish","type":"post","link":"https:\/\/dionach.com\/nl\/disabling-mcafee-on-access-scanning\/","title":{"rendered":"Disabling McAfee On-Access Scanning"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2869\" class=\"elementor elementor-2869\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5aa27353 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5aa27353\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1deec6fe\" data-id=\"1deec6fe\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4cd5f5e9 elementor-widget elementor-widget-text-editor\" data-id=\"4cd5f5e9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In a recent internal penetration test I came across in a situation where although I was local administrator on a Windows server and I could not run Windows Credentials Editor (WCE) because it was detected as a malicious threat in the McAfee on-access scan, as you can see below:<br>\n<img decoding=\"async\" style=\"border: 1px solid; max-width: 100%;\" src=\"\/wp-content\/uploads\/files\/mcafee1.jpg\"><\/p>\n<p>The first thought was to disable it but for security reasons McAfee prevents Administrators from stopping the service:<\/p>\n<p style=\"margin: 0.5em 0px; font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: #ffffff;\"><img decoding=\"async\" style=\"border: 1px solid; max-width: 100%; width: 616px; height: 132px;\" src=\"\/wp-content\/uploads\/files\/mcafee2.jpg\"><\/p>\n<p style=\"margin: 0.5em 0px; font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: #ffffff;\">or killing the process:<\/p>\n<p style=\"margin: 0.5em 0px; font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: #ffffff;\"><img decoding=\"async\" style=\"border: 1px solid; max-width: 100%; width: 588px; height: 191px;\" src=\"\/wp-content\/uploads\/files\/mcafee3.jpg\"><\/p>\n<p style=\"margin: 0.5em 0px; font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: #ffffff;\">Then, I thought to stop McAfee directly but when I went to the McAfee console I noticed that it was password protected:<\/p>\n<p style=\"margin: 0.5em 0px; font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: #ffffff;\"><img decoding=\"async\" style=\"border: 1px solid; max-width: 100%;\" src=\"\/wp-content\/uploads\/files\/mcafee4.jpg\"><\/p>\n<p style=\"margin: 0.5em 0px; font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: #ffffff;\">After Googling a bit I&nbsp;<a style=\"text-decoration: none;\" href=\"https:\/\/techblog.mediaservice.net\/2014\/02\/mcafee-virus-scan-enterprise-password-hashing-demystified\/\">discovered<\/a>&nbsp;that McAfee stores the hash of that password in the registry key. If the version of McAfee is 5.x then the password hash is in the format md5(unicode(password)), option &#8220;&#8211;format=md5u&#8221; in JTR. If the version of McAfee is 8.x then it is base64(sha1(unicode(&#8220;\\x01\\x0f\\x0d\\x33\u201d+password)). Contrary to the first format, by default JTR doesn\u2019t come with a format option for cracking that hash (base64(sha1(unicode(&#8220;\\x01\\x0f\\x0d\\x33&#8243;+password))) so you would need to edit your local.john.conf by adding a dynamic format. I have written both a Metasploit post module that grabs the hash from the registry key and the dynamic format which is necessary for cracking the hash version 8.x of McAfee.<\/p>\n<p style=\"margin: 0.5em 0px; font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: #ffffff;\"><b>[22\/01\/2015] This module is now part of Metasploit master branch:&nbsp;<a style=\"text-decoration: none;\" href=\"https:\/\/github.com\/rapid7\/metasploit-framework\/blob\/master\/modules\/post\/windows\/gather\/credentials\/mcafee_vse_hashdump.rb\">mcafee_vse_hashdump.rb<\/a><\/b><\/p>\n<p>Installation<\/p>\n<pre style=\"margin-top: 0.5em; margin-bottom: 0.5em; font-family: 'Courier New', 'DejaVu Sans Mono', monospace, sans-serif; font-size: 14px; line-height: 1.5em; white-space: pre-wrap; word-wrap: break-word; background-color: #ffffff;\">mkdir -p ~\/.msf4\/modules\/post\/windows\/gather\/credentials\ncurl -O https:\/\/raw.githubusercontent.com\/m7x\/Metasploit-Modules\/master\/post\/windows\/gather\/credentials\/mcafee_hashdump.rb\ncurl https:\/\/raw.githubusercontent.com\/m7x\/stuff\/master\/john.local.conf &gt;&gt; your_john_path\/john.local.conf\n<\/pre>\n<p>Usage<\/p>\n<p style=\"margin: 0.5em 0px; font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: #ffffff;\">Once Meterpreter is running on the targeted machine and has enough permissions for accessing the registry key you can run the post exploitation module as shown below.<br>\n<img decoding=\"async\" style=\"border: 0px; max-width: 100%; width: 517px; height: 82px;\" src=\"\/wp-content\/uploads\/files\/mcafee5.jpg\"><br>\nThe module stores the hash in the Metasploit database which is a good place to keep all harvested credentials.<br>\n<img decoding=\"async\" style=\"border: 0px; max-width: 100%; width: 740px; height: 105px;\" src=\"\/wp-content\/uploads\/files\/mcafee6.jpg\"><br>\nFinally, you need to load the hash in john specifying the dynamic format and hope that the password or some variants are in your dictionary.<br>\n<img decoding=\"async\" style=\"border: 0px; max-width: 100%;\" src=\"\/wp-content\/uploads\/files\/mcafee7.jpg\"><\/p>\n<p style=\"margin: 0.5em 0px; font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: #ffffff;\">Obtaining clear-text passwords during a penetration test is always good since the same passwords might have been re-used in other systems and could let you to compromise other systems. However, if you have physical access to the target machine and you can reboot it (which is normally not possible during an assessment) you could enter in Safe Mode and set to blank the following registry key:<\/p>\n<div class=\"codeblock\" style=\"padding: 5px; border: 1px solid #cccccc; font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: #eeeeee;\"><code style=\"font-family: 'Courier New', 'DejaVu Sans Mono', monospace, sans-serif; font-size: 1em; line-height: 1.5em;\">HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\McAfee\\DesktopProtection\\UIP = \"\"<\/code><\/div>\n<p style=\"margin: 0.5em 0px; font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: #ffffff;\">And set this other one to 0:<\/p>\n<div class=\"codeblock\" style=\"padding: 5px; border: 1px solid #cccccc; font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: #eeeeee;\"><code style=\"font-family: 'Courier New', 'DejaVu Sans Mono', monospace, sans-serif; font-size: 1em; line-height: 1.5em;\">HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\McAfee\\DesktopProtection\\UIPMode = \"0\"<\/code><\/div>\n<p style=\"margin: 0.5em 0px; font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: #ffffff;\">This would let you open McAfee console without requiring a password.<\/p>\n<p>Troubleshooting<\/p>\n<p style=\"margin: 0.5em 0px; font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: #ffffff;\">If John returns the following error message when you are trying to crack the hash, use the option &#8220;-enc:8859-1&#8221;<br>\n<code>This format does not yet support other encodings than ISO-8859-1<\/code><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>In a recent internal penetration test I came across in a situation where although I was local administrator on a Windows server and I could not run Windows Credentials Editor (WCE) because it was detected as a malicious threat in the McAfee on-access scan, as you can see below: The first thought was to disable [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[209],"class_list":["post-2869","post","type-post","status-publish","format-standard","hentry","category-researchblog","tag-infrastructure","wpbf-post"],"contentshake_article_id":"","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Disabling McAfee On-Access Scanning<\/title>\n<meta name=\"description\" content=\"In a recent internal penetration test I came across in a situation where although I was local administrator on a Windows server and I could not run\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dionach.com\/nl\/disabling-mcafee-on-access-scanning\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Disabling McAfee On-Access Scanning\" \/>\n<meta property=\"og:description\" content=\"In a recent internal penetration test I came across in a situation where although I was local administrator on a Windows server and I could not run\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dionach.com\/nl\/disabling-mcafee-on-access-scanning\/\" \/>\n<meta property=\"og:site_name\" content=\"Dionach\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/dionachcyber\" \/>\n<meta property=\"article:published_time\" content=\"2014-12-09T11:54:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-06T12:18:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg?fit=512%2C512&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"512\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dionach Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@dionachcyber\" \/>\n<meta name=\"twitter:site\" content=\"@dionachcyber\" \/>\n<meta name=\"twitter:label1\" content=\"Geschreven door\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dionach Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/dionach.com\/nl\/disabling-mcafee-on-access-scanning\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/dionach.com\/nl\/disabling-mcafee-on-access-scanning\/\"},\"author\":{\"name\":\"Dionach Admin\",\"@id\":\"https:\/\/dionach.com\/nl\/#\/schema\/person\/e73f3537233924cf4944f7807068b3c8\"},\"headline\":\"Disabling McAfee On-Access Scanning\",\"datePublished\":\"2014-12-09T11:54:46+00:00\",\"dateModified\":\"2024-02-06T12:18:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/dionach.com\/nl\/disabling-mcafee-on-access-scanning\/\"},\"wordCount\":423,\"publisher\":{\"@id\":\"https:\/\/dionach.com\/nl\/#organization\"},\"keywords\":[\"infrastructure\"],\"articleSection\":[\"researchblog\"],\"inLanguage\":\"nl-NL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dionach.com\/nl\/disabling-mcafee-on-access-scanning\/\",\"url\":\"https:\/\/dionach.com\/nl\/disabling-mcafee-on-access-scanning\/\",\"name\":\"Disabling McAfee On-Access Scanning\",\"isPartOf\":{\"@id\":\"https:\/\/dionach.com\/nl\/#website\"},\"datePublished\":\"2014-12-09T11:54:46+00:00\",\"dateModified\":\"2024-02-06T12:18:13+00:00\",\"description\":\"In a recent internal penetration test I came across in a situation where although I was local administrator on a Windows server and I could not run\",\"breadcrumb\":{\"@id\":\"https:\/\/dionach.com\/nl\/disabling-mcafee-on-access-scanning\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dionach.com\/nl\/disabling-mcafee-on-access-scanning\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dionach.com\/nl\/disabling-mcafee-on-access-scanning\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/dionach.com\/nl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Disabling McAfee On-Access Scanning\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dionach.com\/nl\/#website\",\"url\":\"https:\/\/dionach.com\/nl\/\",\"name\":\"Dionach\",\"description\":\"Real Security in a Virtual World\",\"publisher\":{\"@id\":\"https:\/\/dionach.com\/nl\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dionach.com\/nl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/dionach.com\/nl\/#organization\",\"name\":\"Dionach\",\"url\":\"https:\/\/dionach.com\/nl\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/dionach.com\/nl\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg\",\"contentUrl\":\"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg\",\"width\":512,\"height\":512,\"caption\":\"Dionach\"},\"image\":{\"@id\":\"https:\/\/dionach.com\/nl\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/dionachcyber\",\"https:\/\/x.com\/dionachcyber\",\"https:\/\/uk.linkedin.com\/company\/dionach-ltd\",\"https:\/\/www.instagram.com\/dionachcyber\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/dionach.com\/nl\/#\/schema\/person\/e73f3537233924cf4944f7807068b3c8\",\"name\":\"Dionach Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g\",\"caption\":\"Dionach Admin\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Disabling McAfee On-Access Scanning","description":"In a recent internal penetration test I came across in a situation where although I was local administrator on a Windows server and I could not run","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dionach.com\/nl\/disabling-mcafee-on-access-scanning\/","og_locale":"nl_NL","og_type":"article","og_title":"Disabling McAfee On-Access Scanning","og_description":"In a recent internal penetration test I came across in a situation where although I was local administrator on a Windows server and I could not run","og_url":"https:\/\/dionach.com\/nl\/disabling-mcafee-on-access-scanning\/","og_site_name":"Dionach","article_publisher":"https:\/\/www.facebook.com\/dionachcyber","article_published_time":"2014-12-09T11:54:46+00:00","article_modified_time":"2024-02-06T12:18:13+00:00","og_image":[{"width":512,"height":512,"url":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg?fit=512%2C512&ssl=1","type":"image\/jpeg"}],"author":"Dionach Admin","twitter_card":"summary_large_image","twitter_creator":"@dionachcyber","twitter_site":"@dionachcyber","twitter_misc":{"Geschreven door":"Dionach Admin","Geschatte leestijd":"4 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dionach.com\/nl\/disabling-mcafee-on-access-scanning\/#article","isPartOf":{"@id":"https:\/\/dionach.com\/nl\/disabling-mcafee-on-access-scanning\/"},"author":{"name":"Dionach Admin","@id":"https:\/\/dionach.com\/nl\/#\/schema\/person\/e73f3537233924cf4944f7807068b3c8"},"headline":"Disabling McAfee On-Access Scanning","datePublished":"2014-12-09T11:54:46+00:00","dateModified":"2024-02-06T12:18:13+00:00","mainEntityOfPage":{"@id":"https:\/\/dionach.com\/nl\/disabling-mcafee-on-access-scanning\/"},"wordCount":423,"publisher":{"@id":"https:\/\/dionach.com\/nl\/#organization"},"keywords":["infrastructure"],"articleSection":["researchblog"],"inLanguage":"nl-NL"},{"@type":"WebPage","@id":"https:\/\/dionach.com\/nl\/disabling-mcafee-on-access-scanning\/","url":"https:\/\/dionach.com\/nl\/disabling-mcafee-on-access-scanning\/","name":"Disabling McAfee On-Access Scanning","isPartOf":{"@id":"https:\/\/dionach.com\/nl\/#website"},"datePublished":"2014-12-09T11:54:46+00:00","dateModified":"2024-02-06T12:18:13+00:00","description":"In a recent internal penetration test I came across in a situation where although I was local administrator on a Windows server and I could not run","breadcrumb":{"@id":"https:\/\/dionach.com\/nl\/disabling-mcafee-on-access-scanning\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dionach.com\/nl\/disabling-mcafee-on-access-scanning\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/dionach.com\/nl\/disabling-mcafee-on-access-scanning\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dionach.com\/nl\/"},{"@type":"ListItem","position":2,"name":"Disabling McAfee On-Access Scanning"}]},{"@type":"WebSite","@id":"https:\/\/dionach.com\/nl\/#website","url":"https:\/\/dionach.com\/nl\/","name":"Dionach","description":"Real Security in a Virtual World","publisher":{"@id":"https:\/\/dionach.com\/nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dionach.com\/nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/dionach.com\/nl\/#organization","name":"Dionach","url":"https:\/\/dionach.com\/nl\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/dionach.com\/nl\/#\/schema\/logo\/image\/","url":"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg","contentUrl":"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg","width":512,"height":512,"caption":"Dionach"},"image":{"@id":"https:\/\/dionach.com\/nl\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/dionachcyber","https:\/\/x.com\/dionachcyber","https:\/\/uk.linkedin.com\/company\/dionach-ltd","https:\/\/www.instagram.com\/dionachcyber\/"]},{"@type":"Person","@id":"https:\/\/dionach.com\/nl\/#\/schema\/person\/e73f3537233924cf4944f7807068b3c8","name":"Dionach Admin","image":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g","caption":"Dionach Admin"}}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/ph4Ojq-Kh","_links":{"self":[{"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/posts\/2869","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/comments?post=2869"}],"version-history":[{"count":0,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/posts\/2869\/revisions"}],"wp:attachment":[{"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/media?parent=2869"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/categories?post=2869"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/tags?post=2869"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}