    {"id":2491,"date":"2023-07-31T04:50:37","date_gmt":"2023-07-31T04:50:37","guid":{"rendered":"https:\/\/student-activity.binus.ac.id\/csc\/?p=2491"},"modified":"2024-07-17T12:45:58","modified_gmt":"2024-07-17T12:45:58","slug":"juice-jacking","status":"publish","type":"post","link":"https:\/\/student-activity.binus.ac.id\/csc\/2023\/07\/juice-jacking\/","title":{"rendered":"Juice Jacking"},"content":{"rendered":"<h1 style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-2492\" src=\"http:\/\/student-activity.binus.ac.id\/csc\/wp-content\/uploads\/sites\/37\/2023\/07\/0.thumbnail.png\" alt=\"\" width=\"700\" height=\"409\" \/><\/h1>\n<p style=\"text-align: justify\"><strong>Juice jacking<\/strong><span style=\"font-weight: 400\"> (pembajakan pengisi daya USB) adalah salah satu serangan <\/span><em><span style=\"font-weight: 400\">cyber security<\/span><\/em><span style=\"font-weight: 400\"> dengan memanfaatkan kabel pengisian daya USB yang terhubung ke suatu <\/span><em><span style=\"font-weight: 400\">hardware<\/span><\/em><span style=\"font-weight: 400\"> tertentu yang sudah disiapkan sedemikian rupa sebagai penengah diantara <\/span><i><span style=\"font-weight: 400\">device<\/span><\/i><span style=\"font-weight: 400\"> yang ingin mengisi daya dengan <\/span><em><span style=\"font-weight: 400\">power outlet<\/span><\/em><span style=\"font-weight: 400\">, atau hanya dengan menggunakan kabel khusus yang disiapkan sedemikian rupa agar <\/span><em><span style=\"font-weight: 400\">attacker<\/span><\/em><span style=\"font-weight: 400\"> yang menyiapkan hal tersebut bisa untuk menanamkan <\/span><em><span style=\"font-weight: 400\">malware <\/span><\/em><span style=\"font-weight: 400\">ke dalam <\/span><em><span style=\"font-weight: 400\">device<\/span><\/em><span style=\"font-weight: 400\"> dan salah satu kemungkinan paling buruknya adalah pencurian data pada <\/span><em><span style=\"font-weight: 400\">device<\/span><\/em><span style=\"font-weight: 400\"> tersebut atau terinfeksi oleh <\/span><em><span style=\"font-weight: 400\">malware<\/span><\/em><span style=\"font-weight: 400\">. Sejak artikel ini dibuat belum ada satu kasus yang dilaporkan terkait <\/span><i><span style=\"font-weight: 400\">juice jacking<\/span><\/i><span style=\"font-weight: 400\"> ini, walaupun demikian secara teori dan praktiknya <\/span><strong><i>juice jacking<\/i><\/strong><span style=\"font-weight: 400\"> ini masih kemungkinan besar terjadi.<\/span><\/p>\n<p><span style=\"font-weight: 400\">\u00a0<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2493\" src=\"http:\/\/student-activity.binus.ac.id\/csc\/wp-content\/uploads\/sites\/37\/2023\/07\/1.USBPort.jpg\" alt=\"\" width=\"308\" height=\"231\" \/><\/p>\n<p style=\"text-align: center\"><span style=\"font-weight: 400\">Gambar 1<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span> <i><span style=\"font-weight: 400\">charging kiosk<\/span><\/i><\/p>\n<\/td>\n<td><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2494\" src=\"http:\/\/student-activity.binus.ac.id\/csc\/wp-content\/uploads\/sites\/37\/2023\/07\/2.InsideKioskCharging.jpg\" alt=\"\" width=\"304\" height=\"228\" \/><\/p>\n<p style=\"text-align: center\"><span style=\"font-weight: 400\">Gambar 2<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\"> didalam <\/span><i><span style=\"font-weight: 400\">charging kiosk<\/span><\/i><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"text-align: justify\"><span style=\"font-weight: 400\">Sebagai contoh pada acara DefCon 19 yang merupakan salah satu konferensi <\/span><em><span style=\"font-weight: 400\">cyber security<\/span><\/em><span style=\"font-weight: 400\"> terbesar yang diikuti oleh ribuan orang dimana terdapat kurang lebih 360 peserta yang merupakan penggiat <\/span><em><span style=\"font-weight: 400\">cyber security<\/span><\/em><span style=\"font-weight: 400\"> tidak <\/span><em><span style=\"font-weight: 400\">aware<\/span><\/em><span style=\"font-weight: 400\"> dengan <\/span><i><span style=\"font-weight: 400\">p<\/span><\/i><em><span style=\"font-weight: 400\">ublic charging kiosk<\/span><\/em><span style=\"font-weight: 400\"> yang disiapkan itu <\/span><em><span style=\"font-weight: 400\">malicious<\/span><\/em><span style=\"font-weight: 400\">, mereka menamainya dengan &#8220;<\/span><em><span style=\"font-weight: 400\">Wall of Sheep<\/span><\/em><span style=\"font-weight: 400\">&#8221; (gambar 1 dan 2). Pada akhirnya itu merupakan edukasi yang diberikan oleh panitia kepada peserta kalau kita harus <\/span><em><span style=\"font-weight: 400\">aware<\/span><\/em><span style=\"font-weight: 400\"> terhadap kemungkinan terburuk pada <\/span><em><span style=\"font-weight: 400\">public charging station\/kiosk<\/span><\/em><span style=\"font-weight: 400\">.<\/span><\/p>\n<p><span style=\"font-weight: 400\">\u00a0<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-2495\" src=\"http:\/\/student-activity.binus.ac.id\/csc\/wp-content\/uploads\/sites\/37\/2023\/07\/3.IOSPrompt.png\" alt=\"\" width=\"333\" height=\"737\" \/><\/p>\n<p style=\"text-align: center\"><span style=\"font-weight: 400\">Gambar 3<\/span><\/p>\n<p style=\"text-align: center\"><span style=\"font-weight: 400\">Contoh <\/span><i><span style=\"font-weight: 400\">prompt<\/span><\/i><span style=\"font-weight: 400\"> IOS<\/span><\/p>\n<\/td>\n<td><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-2496\" src=\"http:\/\/student-activity.binus.ac.id\/csc\/wp-content\/uploads\/sites\/37\/2023\/07\/4.AndroidPrompt.png\" alt=\"\" width=\"317\" height=\"732\" \/><\/p>\n<p style=\"text-align: center\"><span style=\"font-weight: 400\">Gambar 4<\/span><\/p>\n<p style=\"text-align: center\"><span style=\"font-weight: 400\">Contoh <\/span><i><span style=\"font-weight: 400\">prompt<\/span><\/i><span style=\"font-weight: 400\"> android OS<\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify\"><span style=\"font-weight: 400\">Lalu bagaimana cara kerja <\/span><strong>juice jacking<\/strong><span style=\"font-weight: 400\"> ini? Pertama akan ada <\/span><span style=\"font-weight: 400\"><em>devices<\/em> <\/span><span style=\"font-weight: 400\">yang ingin diisi dayanya dan <\/span><em><span style=\"font-weight: 400\">public charging station<\/span><\/em><span style=\"font-weight: 400\"> yang hanya menyediakan pengisian daya hanya dengan USB <\/span><em><span style=\"font-weight: 400\">port <\/span><\/em><span style=\"font-weight: 400\">dan sebagai perantaranya tentu diperlukan sebuah kabel. Pada saat kabel terhubung antara <\/span><em><span style=\"font-weight: 400\">device<\/span><\/em><span style=\"font-weight: 400\"> dan <\/span><em><span style=\"font-weight: 400\">public charging station<\/span><\/em><span style=\"font-weight: 400\">, <\/span><em><span style=\"font-weight: 400\">devices <\/span><\/em><span style=\"font-weight: 400\">korban akan memunculkan <\/span><em><span style=\"font-weight: 400\">prompt <\/span><\/em><span style=\"font-weight: 400\">(gambar 3 dan 4) kalau suatu <\/span><em><span style=\"font-weight: 400\">devices <\/span><\/em><span style=\"font-weight: 400\">ingin akses ke dalam sistem, jika kita mengizinkannya maka data pada <\/span><em><span style=\"font-weight: 400\">device<\/span><\/em><span style=\"font-weight: 400\"> bisa saja diambil atau bahkan <\/span><em><span style=\"font-weight: 400\">device<\/span><\/em><span style=\"font-weight: 400\"> korban terinfeksi <\/span><em><span style=\"font-weight: 400\">malware<\/span><\/em><span style=\"font-weight: 400\"> tertentu. Atau dengan cara yang lebih <\/span><em><span style=\"font-weight: 400\">sophisticated<\/span><\/em><span style=\"font-weight: 400\">, pada saat <\/span><em><span style=\"font-weight: 400\">power station<\/span><\/em><span style=\"font-weight: 400\"> dan <\/span><em><span style=\"font-weight: 400\">device<\/span><\/em><span style=\"font-weight: 400\"> korban terhubung dengan kabel, pada <em>device<\/em> korban tidak akan memunculkan <\/span><em><span style=\"font-weight: 400\">prompt<\/span><\/em><span style=\"font-weight: 400\"> apapun tetapi dibelakang layar terdapat proses pencurian data dan <\/span><em><span style=\"font-weight: 400\">devices <\/span><\/em><span style=\"font-weight: 400\">kita bisa saja terinfeksi <em>malware<\/em> tertentu.<\/span><\/p>\n<p><span style=\"font-weight: 400\">\u00a0<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-2497\" src=\"http:\/\/student-activity.binus.ac.id\/csc\/wp-content\/uploads\/sites\/37\/2023\/07\/5.MactansCharger.png\" alt=\"\" width=\"749\" height=\"577\" \/><\/p>\n<p style=\"text-align: center\"><span style=\"font-weight: 400\">Gambar 5<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\"> Mactans <\/span><i><span style=\"font-weight: 400\">hardware<\/span><\/i><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"font-weight: 400\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify\"><span style=\"font-weight: 400\">Sebagai contoh <\/span><i><span style=\"font-weight: 400\">hardware<\/span><\/i><span style=\"font-weight: 400\"> penengah pada <\/span><i><span style=\"font-weight: 400\">juice jacking<\/span><\/i><span style=\"font-weight: 400\"> adalah &#8220;Mactans&#8221;. Pada <\/span><i><span style=\"font-weight: 400\">Black Hat<\/span><\/i><span style=\"font-weight: 400\"> 2013 terdapat <\/span><em><span style=\"font-weight: 400\">demo<\/span><\/em><span style=\"font-weight: 400\"> yang memperlihatkan bagaimana kemungkinan buruk yang bisa terjadi pada sebuah <\/span><em><span style=\"font-weight: 400\">smartphone<\/span><\/em><span style=\"font-weight: 400\"> bila terhubung ke sembarang USB <\/span><em><span style=\"font-weight: 400\">port charger<\/span><\/em><span style=\"font-weight: 400\">, <\/span><em><span style=\"font-weight: 400\">Mactans charger <\/span><\/em><span style=\"font-weight: 400\">adalah sebuah <\/span><em><span style=\"font-weight: 400\">hardware <\/span><\/em><span style=\"font-weight: 400\">khusus yang sudah dirancang sedemikian rupa agar dapat mengirimkan <\/span><em><span style=\"font-weight: 400\">malware <\/span><\/em><span style=\"font-weight: 400\">ke dalam <\/span><em><span style=\"font-weight: 400\">devices <\/span><\/em><span style=\"font-weight: 400\">korban, singkatnya <\/span><span style=\"font-weight: 400\"><em>Mactans<\/em> <\/span><span style=\"font-weight: 400\">memerlukan UDID dari <\/span><em><span style=\"font-weight: 400\">devices <\/span><\/em><span style=\"font-weight: 400\">lalu akan melakukan <\/span><em><span style=\"font-weight: 400\">pairing<\/span><\/em><span style=\"font-weight: 400\"> terhadap <\/span><em><span style=\"font-weight: 400\">device<\/span><\/em><span style=\"font-weight: 400\"> korban supaya terjadi pertukaran <\/span><em><span style=\"font-weight: 400\">key<\/span><\/em><span style=\"font-weight: 400\"> untuk <\/span><em><span style=\"font-weight: 400\">encrypting<\/span><\/em><span style=\"font-weight: 400\"> komunikasi yang akan datang, <\/span><em><span style=\"font-weight: 400\">install provisioning profile<\/span><\/em><span style=\"font-weight: 400\"> lalu menginstall <\/span><em><span style=\"font-weight: 400\">malicious app<\/span><\/em><span style=\"font-weight: 400\">, semua hal itu seperti dibelakang layar sehingga <\/span><em><span style=\"font-weight: 400\">user <\/span><\/em><span style=\"font-weight: 400\">tidak akan mengetahui apa yang sedang terjadi karena proses nya begitu cepat kurang lebih dibawah 3 menit.<\/span><\/p>\n<p><span style=\"font-weight: 400\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify\"><span style=\"font-weight: 400\">Selain terdapat <\/span><em><span style=\"font-weight: 400\">hardware<\/span><\/em><span style=\"font-weight: 400\"> penengah tertentu, <\/span><strong>juice jacking<\/strong><span style=\"font-weight: 400\"> juga dapat terjadi dengan menggunakan kabel khusus yang sudah terdapat <\/span><em><span style=\"font-weight: 400\">chip<\/span><\/em><span style=\"font-weight: 400\"> didalamnya sebagai contoh kabel dengan nama O.MG keluaran HAK5\u00a0 yang bisa <\/span><em><span style=\"font-weight: 400\">execute payload<\/span><\/em><span style=\"font-weight: 400\">, <\/span><em><span style=\"font-weight: 400\">inject mouse movement<\/span><\/em><span style=\"font-weight: 400\">, <\/span><em><span style=\"font-weight: 400\">keylogger<\/span><\/em><span style=\"font-weight: 400\">, <\/span><em><span style=\"font-weight: 400\">self destruct<\/span><\/em><span style=\"font-weight: 400\"> atau COTTONMOUTH yang bisa digunakan untuk <\/span><em><span style=\"font-weight: 400\">wireless brigde<\/span><\/em><span style=\"font-weight: 400\"> ke <\/span><em><span style=\"font-weight: 400\">network<\/span><\/em><span style=\"font-weight: 400\"> yang diinginkan dan kemampuan <\/span><em><span style=\"font-weight: 400\">exploit software<\/span><\/em><span style=\"font-weight: 400\"> pada PC target.<\/span><\/p>\n<p><span style=\"font-weight: 400\">\u00a0<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2498\" src=\"http:\/\/student-activity.binus.ac.id\/csc\/wp-content\/uploads\/sites\/37\/2023\/07\/6.DataBlocker.png\" alt=\"\" width=\"295\" height=\"230\" \/><\/p>\n<p style=\"text-align: center\"><span style=\"font-weight: 400\">Gambar 6<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\"> Data blocker<\/span><\/p>\n<\/td>\n<td><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2499\" src=\"http:\/\/student-activity.binus.ac.id\/csc\/wp-content\/uploads\/sites\/37\/2023\/07\/7.DataBlockerFlow.png\" alt=\"\" width=\"409\" height=\"204\" \/><\/p>\n<p style=\"text-align: center\"><span style=\"font-weight: 400\">Gambar 7<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\"> Ilustrasi penggunaan data blocker<\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify\"><span style=\"font-weight: 400\">Setelah mengetahui cara kerja <\/span><strong>juice jacking<\/strong><span style=\"font-weight: 400\">, apakah anda menjadi anti terhadap <\/span><em><span style=\"font-weight: 400\">public charging station<\/span><\/em><span style=\"font-weight: 400\">? Ingat setiap hal pasti ada solusinya, begitu pula dengan <\/span><strong>juice jacking<\/strong><span style=\"font-weight: 400\">. <\/span><strong>Juice jacking<\/strong><span style=\"font-weight: 400\"> bisa diatasi dengan menggunakan <\/span><em><span style=\"font-weight: 400\">hardware <\/span><\/em><span style=\"font-weight: 400\">khusus bernama <\/span><em><span style=\"font-weight: 400\">data blocker<\/span><\/em><span style=\"font-weight: 400\"> (gambar 6, 7, 8).<\/span><\/p>\n<p><span style=\"font-weight: 400\">\u00a0<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-2500\" src=\"http:\/\/student-activity.binus.ac.id\/csc\/wp-content\/uploads\/sites\/37\/2023\/07\/8.ExamplePortPin.png\" alt=\"\" width=\"1054\" height=\"568\" \/><\/p>\n<p style=\"text-align: center\"><span style=\"font-weight: 400\">Gambar 8<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\"> Contoh <\/span><i><span style=\"font-weight: 400\">socket Type A<\/span><\/i><span style=\"font-weight: 400\"> dan <\/span><i><span style=\"font-weight: 400\">Type B<\/span><\/i><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400\">Bagaimana cara kerja <\/span><em><span style=\"font-weight: 400\">data blocker<\/span><\/em><span style=\"font-weight: 400\"> ini? <\/span><em><span style=\"font-weight: 400\">Data blocker<\/span><\/em><span style=\"font-weight: 400\"> akan meniadakan pin <\/span><em><span style=\"font-weight: 400\">transfering<\/span><\/em><span style=\"font-weight: 400\"> dan <\/span><em><span style=\"font-weight: 400\">receiving <\/span><\/em><span style=\"font-weight: 400\">data<\/span><span style=\"font-weight: 400\"> pada <\/span><em><span style=\"font-weight: 400\">socket <\/span><\/em><span style=\"font-weight: 400\">pin terkait, sehingga hanya akan ada pin untuk <\/span><em><span style=\"font-weight: 400\">tranfering<\/span><\/em><span style=\"font-weight: 400\"> daya dan <\/span><em><span style=\"font-weight: 400\">ground<\/span><\/em><span style=\"font-weight: 400\">. Sebagai contoh pada <\/span><em><span style=\"font-weight: 400\">socket <\/span><\/em><span style=\"font-weight: 400\">USB <\/span><i><span style=\"font-weight: 400\">type A<\/span><\/i><span style=\"font-weight: 400\"> dan <\/span><i><span style=\"font-weight: 400\">Type B<\/span><\/i><span style=\"font-weight: 400\">, jika menggunakan <\/span><i><span style=\"font-weight: 400\">data <\/span><\/i><em><span style=\"font-weight: 400\">blocker<\/span><\/em><span style=\"font-weight: 400\"> maka pin nomor 2 dan 3 akan di nonaktifkan dan yang akan terhubung ke <\/span><i><span style=\"font-weight: 400\">device<\/span><\/i><span style=\"font-weight: 400\"> hanya pin 1 dan 4 untuk kebutuhan daya saja. Solusi lainnya, selain menggunakan <\/span><i><span style=\"font-weight: 400\">data <\/span><\/i><em><span style=\"font-weight: 400\">blocker<\/span><\/em><span style=\"font-weight: 400\"> adalah dengan membawa kabel dan adaptor sendiri atau membawa <\/span><em><span style=\"font-weight: 400\">power bank<\/span><\/em><span style=\"font-weight: 400\"> sendiri.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Referensi<\/span><\/p>\n<ul>\n<li><a href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/juice-jacking\"><span style=\"font-weight: 400\">https:\/\/www.techtarget.com\/searchsecurity\/definition\/juice-jacking<\/span><\/a><\/li>\n<li><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/04\/dont-plug-your-phone-into-a-free-charging-station-warns-fbi\"><span style=\"font-weight: 400\">https:\/\/www.malwarebytes.com\/blog\/news\/2023\/04\/dont-plug-your-phone-into-a-free-charging-station-warns-fbi<\/span><\/a><\/li>\n<li><a href=\"https:\/\/krebsonsecurity.com\/2011\/08\/beware-of-juice-jacking\/\"><span style=\"font-weight: 400\">https:\/\/krebsonsecurity.com\/2011\/08\/beware-of-juice-jacking\/<\/span><\/a><\/li>\n<li><a href=\"https:\/\/components101.com\/connectors\/usb-type-a-male-connector\"><span style=\"font-weight: 400\">https:\/\/components101.com\/connectors\/usb-type-a-male-connector<\/span><\/a><\/li>\n<li><a href=\"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/8\/85\/NSA_COTTONMOUTH-I.jpg\"><span style=\"font-weight: 400\">https:\/\/upload.wikimedia.org\/wikipedia\/commons\/8\/85\/NSA_COTTONMOUTH-I.jpg<\/span><\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Juice jacking (pembajakan pengisi daya USB) adalah salah satu serangan cyber security dengan memanfaatkan kabel pengisian daya USB yang terhubung ke suatu hardware tertentu yang sudah disiapkan sedemikian rupa sebagai penengah diantara device yang ingin mengisi daya dengan power outlet, atau hanya dengan menggunakan kabel khusus yang disiapkan sedemikian rupa agar attacker yang menyiapkan hal [&hellip;]<\/p>\n","protected":false},"author":42,"featured_media":2492,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,4],"tags":[],"class_list":["post-2491","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles","category-featured"],"_links":{"self":[{"href":"https:\/\/student-activity.binus.ac.id\/csc\/wp-json\/wp\/v2\/posts\/2491","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/student-activity.binus.ac.id\/csc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/student-activity.binus.ac.id\/csc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/student-activity.binus.ac.id\/csc\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/student-activity.binus.ac.id\/csc\/wp-json\/wp\/v2\/comments?post=2491"}],"version-history":[{"count":2,"href":"https:\/\/student-activity.binus.ac.id\/csc\/wp-json\/wp\/v2\/posts\/2491\/revisions"}],"predecessor-version":[{"id":2502,"href":"https:\/\/student-activity.binus.ac.id\/csc\/wp-json\/wp\/v2\/posts\/2491\/revisions\/2502"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/student-activity.binus.ac.id\/csc\/wp-json\/wp\/v2\/media\/2492"}],"wp:attachment":[{"href":"https:\/\/student-activity.binus.ac.id\/csc\/wp-json\/wp\/v2\/media?parent=2491"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/student-activity.binus.ac.id\/csc\/wp-json\/wp\/v2\/categories?post=2491"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/student-activity.binus.ac.id\/csc\/wp-json\/wp\/v2\/tags?post=2491"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}