{"id":246640,"date":"2025-02-17T15:21:50","date_gmt":"2025-02-17T15:21:50","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/penetration-testing-vs-red-team\/"},"modified":"2025-02-17T15:21:50","modified_gmt":"2025-02-17T15:21:50","slug":"penetration-testing-vs-red-team","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/penetration-testing-vs-red-team\/","title":{"rendered":"Key Differences Between Penetration Testing Vs Red Teaming"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>In today&#039;s digital landscape, <strong>leaked passwords<\/strong> pose a significant threat to personal and organizational security, making them a hot topic in <strong>cybersecurity discussions<\/strong>. Recently, a widely circulated password appeared in multiple <strong>data breaches<\/strong>, originating from popular websites and services that experienced security vulnerabilities. This particular password gained notoriety due to its simplicity and frequent reuse by users, highlighting a critical issue in <strong>password hygiene<\/strong>. As cybercriminals continue to exploit these leaks, understanding the implications of such vulnerabilities is essential for users to bolster their defenses and protect <strong>sensitive information<\/strong> from potential breaches.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/penetration-testing-vs-red-team\/#Key_Highlights\" >Key Highlights<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/penetration-testing-vs-red-team\/#Core_Objectives_and_Purpose\" >Core Objectives and Purpose<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/penetration-testing-vs-red-team\/#Scope_and_Methodology\" >Scope and Methodology<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/penetration-testing-vs-red-team\/#Duration_and_Time_Constraints\" >Duration and Time Constraints<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/penetration-testing-vs-red-team\/#Team_Composition_and_Expertise\" >Team Composition and Expertise<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/penetration-testing-vs-red-team\/#Attack_Simulation_Techniques\" >Attack Simulation Techniques<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/penetration-testing-vs-red-team\/#Reporting_and_Metrics\" >Reporting and Metrics<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/logmeonce.com\/resources\/penetration-testing-vs-red-team\/#Business_Impact_and_ROI_Analysis\" >Business Impact and ROI Analysis<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/logmeonce.com\/resources\/penetration-testing-vs-red-team\/#Frequently_Asked_Questions\" >Frequently Asked Questions<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/logmeonce.com\/resources\/penetration-testing-vs-red-team\/#How_Much_Do_Penetration_Testing_and_Red_Teaming_Services_Typically_Cost\" >How Much Do Penetration Testing and Red Teaming Services Typically Cost?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/logmeonce.com\/resources\/penetration-testing-vs-red-team\/#Can_Internal_Employees_Conduct_Red_Team_Exercises_Without_External_Consultants\" >Can Internal Employees Conduct Red Team Exercises Without External Consultants?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/logmeonce.com\/resources\/penetration-testing-vs-red-team\/#What_Certifications_Are_Recommended_for_Becoming_a_Red_Team_Member\" >What Certifications Are Recommended for Becoming a Red Team Member?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/logmeonce.com\/resources\/penetration-testing-vs-red-team\/#How_Often_Should_Organizations_Perform_Penetration_Tests_Versus_Red_Team_Assessments\" >How Often Should Organizations Perform Penetration Tests Versus Red Team Assessments?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/logmeonce.com\/resources\/penetration-testing-vs-red-team\/#Are_Penetration_Testing_and_Red_Teaming_Regulated_by_Specific_Industry_Standards\" >Are Penetration Testing and Red Teaming Regulated by Specific Industry Standards?<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/logmeonce.com\/resources\/penetration-testing-vs-red-team\/#The_Bottom_Line\" >The Bottom Line<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Key_Highlights\"><\/span>Key Highlights<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li>Penetration testing focuses on specific system vulnerabilities, while red teaming simulates comprehensive real-world attacks across an entire organization.<\/li>\n<li>Pen tests typically last 1-2 weeks with structured checklists, whereas red team engagements can extend several months using creative tactics.<\/li>\n<li>Penetration testing teams are smaller (1-3 members) with technical focus, while red teams are larger (3-8 members) with diverse skill sets.<\/li>\n<li>Pen testers identify and fix security holes in specific systems, while red teamers assess technical, human, and physical security aspects.<\/li>\n<li>Penetration test reports detail technical vulnerabilities and solutions, whereas red team reports tell the complete story of organizational security breaches.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Core_Objectives_and_Purpose\"><\/span>Core Objectives and Purpose<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>While both <strong>penetration testing<\/strong> and <strong>red teaming<\/strong> help keep <strong>computer systems<\/strong> safe, they&#039;re quite different &#8211; like playing hide-and-seek versus capture the flag!<\/p>\n<p>Think of penetration testing as a focused game where I look for specific holes in your computer&#039;s <strong>security<\/strong> &#8211; just like checking if all the windows in your house are locked. My goal is to find <strong>weaknesses<\/strong> and fix them. It&#039;s kind of like when your teacher checks your math homework for mistakes!<\/p>\n<p>Red teaming is more like being a spy in a movie! I try everything I can think of to sneak past security, just like how you might try different ways to get to the cookie jar without mom noticing. I act like a real bad guy would, testing not just computers but also people and buildings.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Scope_and_Methodology\"><\/span>Scope and Methodology<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Let me show you how different these two security tests can be! When testing our <strong>computer security<\/strong>, we need to think about how wide or narrow we want to look. It&#039;s like playing hide and seek &#8211; do you want to search just in your backyard or the whole neighborhood?<\/p>\n<ul>\n<li>Penetration tests focus on specific systems, like checking if your front door is locked.<\/li>\n<li>Red team tests look at everything, like playing a super-sneaky spy game.<\/li>\n<li>Pen testers follow a checklist, similar to your morning routine for school.<\/li>\n<li>Red teamers get creative and try unexpected ways in, like finding a secret passage!<\/li>\n<\/ul>\n<p>I love explaining how pen testers are like puzzle solvers, while red teamers are more like <strong>master spies<\/strong> in movies.<\/p>\n<p>Which one sounds more exciting to you?<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Duration_and_Time_Constraints\"><\/span>Duration and Time Constraints<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Time plays a big role in these <strong>security tests<\/strong> &#8211; just like how you need different amounts of time for different games!<\/p>\n<p>Penetration testing is like playing a <strong>quick game of tag<\/strong>. It usually takes about 1-2 weeks. I pop in, check for weak spots, and I&#039;m done! Have you ever timed yourself doing a puzzle? It&#039;s kind of like that.<\/p>\n<p>Red teaming is more like a <strong>long game of hide-and-seek<\/strong> that can last for months! I sneak around, try lots of different tricks, and take my time to be super sneaky. Think of it like building a huge LEGO castle &#8211; you can&#039;t rush it!<\/p>\n<p>Isn&#039;t it cool how some security tests are quick sprints while others are more like marathons? Which one do you think would be more fun to watch?<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Team_Composition_and_Expertise\"><\/span>Team Composition and Expertise<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Both <strong>security teams<\/strong> need different types of <strong>superheroes<\/strong>! While pen testers might be like solo superheroes focusing on specific skills, red teamers are more like the Avengers &#8211; they <strong>work together<\/strong> with lots of different powers!<\/p>\n<p>I&#039;ll show you what makes each team special.<\/p>\n<ul>\n<li>Pen testers are like computer detectives who know how to find security holes.<\/li>\n<li>Red teams have experts in hacking, social skills, physical security, and sneaky tricks.<\/li>\n<li>Pen testing usually needs 1-3 skilled people who are really good at testing systems.<\/li>\n<li>Red teams need 3-8 members with different talents, like lockpicking or tricking people.<\/li>\n<\/ul>\n<p>Think of it this way &#8211; pen testers are like soccer players who practice penalty kicks, while red teamers are like a whole team working together to score goals. Pretty cool, right?<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Attack_Simulation_Techniques\"><\/span>Attack Simulation Techniques<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>When pen testers and red teams go on their missions, they use totally different ways to test security! It&#039;s like playing two different games &#8211; one&#039;s like tag, and the other&#039;s like hide-and-seek. I&#039;ll show you how they work!<\/p>\n<table>\n<thead>\n<tr>\n<th style=\"text-align: center\">Activity Type<\/th>\n<th style=\"text-align: center\">Pen Testing<\/th>\n<th style=\"text-align: center\">Red Teaming<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td style=\"text-align: center\">Time Frame<\/td>\n<td style=\"text-align: center\">Quick attacks<\/td>\n<td style=\"text-align: center\">Long sneaky missions<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\">Target Focus<\/td>\n<td style=\"text-align: center\">Single system<\/td>\n<td style=\"text-align: center\">Whole organization<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\">Methods Used<\/td>\n<td style=\"text-align: center\">Direct testing<\/td>\n<td style=\"text-align: center\">Tricky disguises<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>You know how when you&#039;re playing capture the flag, there are different ways to win? Pen testers are like the players who run straight for the flag, while red teams are like the sneaky players who make clever plans. Red teams might even pretend to be delivery people or send fake emails &#8211; just like spies in movies! What way would you try to test security?<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Reporting_and_Metrics\"><\/span>Reporting and Metrics<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Finding bad guys in computer systems is like being a detective, and just like detectives write case reports, security testers need to write reports too!<\/p>\n<p>I create special reports that show exactly what I found during my tests &#8211; it&#039;s like making a treasure map of all the <strong>weak spots<\/strong>!<\/p>\n<p>Here&#039;s what makes <strong>penetration test reports<\/strong> different from <strong>red team reports<\/strong>:<\/p>\n<ul>\n<li>Pen test reports include technical details and step-by-step fixes<\/li>\n<li>Red team reports focus on telling the story of how systems were breached<\/li>\n<li>Pen tests measure success by counting vulnerabilities found<\/li>\n<li>Red teams track metrics like detection time and incident response<\/li>\n<\/ul>\n<p>When I write my reports, I make sure everyone can understand them &#8211; from computer experts to regular folks.<\/p>\n<p>It&#039;s just like <strong>translating a secret code<\/strong> into plain English!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Business_Impact_and_ROI_Analysis\"><\/span>Business Impact and ROI Analysis<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Money matters when it comes to keeping computers safe! Think of <strong>penetration testing<\/strong> like buying a bike helmet &#8211; it costs money but keeps you protected.<\/p>\n<p>Red teaming is more like hiring a whole safety team for your neighborhood bike race!<\/p>\n<p>When companies spend money on <strong>security testing<\/strong>, they want to know if it&#039;s worth it. I&#039;ll tell you a secret &#8211; it totally is! Penetration testing usually costs less and shows quick results, like finding a missing puzzle piece.<\/p>\n<p>But <strong>red teaming<\/strong>, while more expensive, helps prevent bigger problems, like stopping a whole avalanche of snowballs before they start rolling!<\/p>\n<p>Want to know something cool? Companies that spend wisely on both kinds of testing <strong>save way more money<\/strong> than those who don&#039;t.<\/p>\n<p>It&#039;s just like saving your allowance to buy better locks for your <strong>treasure chest<\/strong>!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Frequently_Asked_Questions\"><\/span>Frequently Asked Questions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"How_Much_Do_Penetration_Testing_and_Red_Teaming_Services_Typically_Cost\"><\/span>How Much Do Penetration Testing and Red Teaming Services Typically Cost?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I&#039;ll tell you about the <strong>costs<\/strong> &#8211; they&#039;re pretty big!<\/p>\n<p>Penetration testing usually costs between $4,000 to $50,000, depending on what needs testing.<\/p>\n<p>Red teaming is even pricier at $20,000 to $100,000+ because it&#039;s more complex and takes longer.<\/p>\n<p>Think of pen testing like checking a single door&#039;s lock, while <strong>red teaming<\/strong> is like trying every way possible to get into a whole building!<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Can_Internal_Employees_Conduct_Red_Team_Exercises_Without_External_Consultants\"><\/span>Can Internal Employees Conduct Red Team Exercises Without External Consultants?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I wouldn&#039;t recommend having internal employees conduct <strong>red team exercises<\/strong> alone.<\/p>\n<p>While they might know your systems well, they often lack the specialized skills and outside perspective that make red teaming effective.<\/p>\n<p>It&#039;s like trying to spot mistakes in your own writing &#8211; it&#039;s harder when you&#039;re too close!<\/p>\n<p>I suggest partnering internal teams with <strong>external experts<\/strong> to combine <strong>insider knowledge<\/strong> with professional red teaming expertise.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"What_Certifications_Are_Recommended_for_Becoming_a_Red_Team_Member\"><\/span>What Certifications Are Recommended for Becoming a Red Team Member?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I&#039;d recommend starting with CompTIA Security+ &#8211; it&#039;s like getting your first superhero badge!<\/p>\n<p>Then level up to CEH (Certified Ethical Hacker) and OSCP (Offensive Security Certified Professional). These are your power-ups!<\/p>\n<p>Want to be extra awesome? Add CRTO (Certified Red Team Operator) and SANS GPEN to your collection.<\/p>\n<p>Think of it like collecting trading cards, each one makes you stronger!<\/p>\n<h3><span class=\"ez-toc-section\" id=\"How_Often_Should_Organizations_Perform_Penetration_Tests_Versus_Red_Team_Assessments\"><\/span>How Often Should Organizations Perform Penetration Tests Versus Red Team Assessments?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I recommend running <strong>penetration tests<\/strong> at least twice a year and <strong>red team assessments<\/strong> annually.<\/p>\n<p>Think of pen tests like regular health check-ups &#8211; they look for known problems and weaknesses.<\/p>\n<p>Red team tests are more like surprise fire drills &#8211; they&#039;re bigger, more complex, and test your entire <strong>security readiness<\/strong>.<\/p>\n<p>For critical systems or after major changes, you&#039;ll want to do these tests more frequently.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Are_Penetration_Testing_and_Red_Teaming_Regulated_by_Specific_Industry_Standards\"><\/span>Are Penetration Testing and Red Teaming Regulated by Specific Industry Standards?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I&#039;ll tell you about the rules for these security tests. Many industries have special guidelines they must follow.<\/p>\n<p>For example, banks follow the <strong>FFIEC rules<\/strong>, while healthcare organizations use <strong>HIPAA standards<\/strong>. The Payment Card Industry (PCI) has its own rules too &#8211; just like how your school has playground rules!<\/p>\n<p>Some industries require yearly tests, while others let companies choose their testing schedule.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_Bottom_Line\"><\/span>The Bottom Line<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Understanding the differences between <strong>penetration testing<\/strong> and <strong>red teaming<\/strong> is crucial for strengthening your organization&#039;s cybersecurity posture. Just as these testing methods reveal vulnerabilities, it&#039;s essential to consider how <strong>password security<\/strong> plays a vital role in protecting your sensitive information. <strong>Weak passwords<\/strong> can be a gateway for attackers, so implementing robust <strong>password management<\/strong> practices is key.<\/p>\n<p>To enhance your security measures, explore solutions that simplify password management and provide an extra layer of protection. A reliable password manager can help you create <strong>strong, unique passwords<\/strong> for all your accounts. Additionally, consider adopting passkey management for even greater security.<\/p>\n<p>Ready to take control of your password security? Sign up for a free account at <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a> and start safeguarding your digital assets today! Your organization&#039;s security is only as strong as your weakest link&#x2014;don&#039;t wait to reinforce it!<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Knowing the distinctions between penetration testing and red teaming could make the difference between basic and bulletproof security protection.<\/p>\n","protected":false},"author":5,"featured_media":246639,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[24718],"tags":[12662,37081,17467],"class_list":["post-246640","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-password","tag-penetration-testing","tag-red-teaming","tag-security-protection"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/246640","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=246640"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/246640\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media\/246639"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=246640"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=246640"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=246640"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}