{"id":8475,"date":"2020-10-01T15:50:57","date_gmt":"2020-10-01T13:50:57","guid":{"rendered":"https:\/\/www.nextron-systems.com\/?p=8475"},"modified":"2022-03-25T14:15:42","modified_gmt":"2022-03-25T13:15:42","slug":"theres-a-thunderstorm-coming","status":"publish","type":"post","link":"https:\/\/www.nextron-systems.com\/2020\/10\/01\/theres-a-thunderstorm-coming\/","title":{"rendered":"There&#8217;s a Thunderstorm Coming"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_row _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2020\/08\/THOR-Service-1.png&#8221; title_text=&#8221;THOR-Service&#8221; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;3_5,2_5&#8243; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;30px|||||&#8221;]<\/p>\n<p>We are proud to announce a groundbreaking new scan mode named &#8220;Thunderstorm&#8221; that we&#8217;ve integrated into preview builds of the upcoming THOR version 10.6.<\/p>\n<p>This mode of operation turns THOR into a RESTful web service that is able to process thousands of samples per minute sent from any device within the network.<\/p>\n<p>Think of it as your ultra-fast on-premise scan service, wich is bundled with more than 13,000 hand-crafted YARA rules focusing on persistent threats and forensic artefacts.<\/p>\n<p><span style=\"font-size: 18px;\">Collect files and submit them for analysis from any operating system and any hardware platform. The possibilities are limitless.<\/span><\/p>\n<p>With this blog post, we&#8217;d like to highlight some of these new possibilities.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_testimonial author=&#8221;Norse Poem&#8221; portrait_url=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2020\/09\/god_of_thunder-1.png&#8221; quote_icon_color=&#8221;#009ec7&#8243; quote_icon_background_color=&#8221;#ffffff&#8221; portrait_width=&#8221;92px&#8221; use_icon_font_size=&#8221;on&#8221; icon_font_size=&#8221;46px&#8221; _builder_version=&#8221;4.6.2&#8243; _module_preset=&#8221;default&#8221; body_font=&#8221;||on||||||&#8221; body_text_color=&#8221;#000000&#8243;]<\/p>\n<p>Thunder rolls, lightning strikes &amp; the hammer flies across the sky.<br \/> God of the weather,<br \/> chariot of the storm,<br \/> master of rain &amp; torrents.<br \/> Son of the strength<br \/> of Mother Earth,<br \/> I ask you to grant me that strength for myself.<\/p>\n<p>[\/et_pb_testimonial][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<h3>What is THOR Thunderstorm?<\/h3>\n<p>A RESTful web service\u00a0that receives samples and returns a scan result. It is feature-rich and very fast.<br \/>\n[\/et_pb_text][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2020\/08\/Screenshot-2020-08-20-at-23.46.18.png&#8221; title_text=&#8221;Screenshot 2020-08-20 at 23.46.18&#8243; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<h1>Use Cases<\/h1>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;2_5,3_5&#8243; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|1px||||&#8221;]<\/p>\n<h3>Use Case 1 &#8211; Remote File Collection<\/h3>\n<p>During forensic investigations, automated file collection (ESI) from one or multiple remote systems can be combined with THOR Thunderstorm to improve the forensic anylsis.<\/p>\n<p>Alerts and warnings produced by THOR Thunderstorm highlight interesting elements in file data, registry hives, eventlog files and more.<br \/>\n[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2020\/08\/FileCollection_Thunderstorm.png&#8221; title_text=&#8221;FileCollection_Thunderstorm&#8221; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;2_5,3_5&#8243; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<h3>Use Case 2 &#8211; ICS Networks<\/h3>\n<p>ICS networks are mission critical, requiring immediate and high-availability. The installation of an endpoint agent or running a portable scanner is often out of question.<\/p>\n<p>With THOR Thunderstorm, you just have to collect and submit the files.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2020\/08\/ics_targets.png&#8221; title_text=&#8221;ics_targets&#8221; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;2_5,3_5&#8243; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<h3>Use Case 3 &#8211; Out of Reach Devices<\/h3>\n<p>Since file collection is a lot easier than endpoint scanning, all you need is way to export the remote system&#8217;s files or directly send them to THOR Thunderstorm.<\/p>\n<p>Imagine that you can collect and submit files from network devices, telephone systems or embedded devices.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2020\/08\/Screenshot-2020-08-20-at-17.31.02.png&#8221; title_text=&#8221;Screenshot 2020-08-20 at 17.31.02&#8243; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;2_5,3_5&#8243; _builder_version=&#8221;4.6.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.6.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.6.2&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<h3>Use Case 4 &#8211; Out of Reach Operating Systems<\/h3>\n<p>File collection scripts for many old or usually unsupported operating systems allow you to upload samples for analysis.<\/p>\n<p>Select files based on size, age or type and schedule frequent upload tasks to analyze only new or modified files.\u00a0<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.6.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2020\/09\/Thunderstorm_OS_Listing-1.png&#8221; title_text=&#8221;Thunderstorm_OS_Listing&#8221; _builder_version=&#8221;4.6.5&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;2_5,3_5&#8243; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<h3>Use Case 5 &#8211; S3 Bucket Scanning<\/h3>\n<p>We&#8217;ve been working with our partner\u00a0<a href=\"https:\/\/www.adolus.com\/\">Adolus<\/a>\u00a0to showcase a <a href=\"https:\/\/github.com\/NextronSystems\/binaryalert\">tuned version<\/a> of AirBnb&#8217;s <a href=\"http:\/\/www.binaryalert.io\/\">BinaryAlert<\/a> in which the standard YARA analyzer has been replaced by THOR Thunderstorm.<\/p>\n<p>By using it in a container that scales with the demand, you can process millions of files in a few minutes.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2020\/08\/Screenshot-2020-08-20-at-08.29.26.png&#8221; title_text=&#8221;Screenshot 2020-08-20 at 08.29.26&#8243; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.5.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.5.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.5.7&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<h1>Flexibility<\/h1>\n<p>Most operating system provide tools to walk the file system and submit files via HTTP. The following examples are intentionally short and compact to inspire you with their simplicity. Think of all devices that you could analyze this way. No agent, no portable scanner, just simple file submission via HTTP.<br \/>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_4,3_4&#8243; _builder_version=&#8221;4.5.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.5.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.5.7&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<h3>Windows 10 Batch<\/h3>\n<p>This example shows a simple batch file that walks recursively over a given folder an submits all files. You could extend it to the whole disk and reduce the submission to certain file extensions (e.g. exe, bat, ps1, js).<br \/>\n[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;3_4&#8243; _builder_version=&#8221;4.5.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2020\/08\/Screenshot-2020-08-22-at-08.53.28.png&#8221; title_text=&#8221;Screenshot 2020-08-22 at 08.53.28&#8243; _builder_version=&#8221;4.5.7&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2020\/08\/Screenshot-2020-08-22-at-08.32.36.png&#8221; title_text=&#8221;Screenshot 2020-08-22 at 08.32.36&#8243; _builder_version=&#8221;4.5.7&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_4,3_4&#8243; _builder_version=&#8221;4.5.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.5.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.5.7&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<h3>Linux Web Server<\/h3>\n<p>This examples shows how easy it is to get all files in a web server root checked by THOR Thunderstorm just by using bash, find and curl.<\/p>\n<p>&nbsp;<br \/>\n[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;3_4&#8243; _builder_version=&#8221;4.5.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2020\/08\/thunderstorm-linux-curl.gif&#8221; title_text=&#8221;thunderstorm-linux-curl&#8221; _builder_version=&#8221;4.5.7&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.6.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.6.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.6.3&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;-1px|||||&#8221;]<\/p>\n<h1>Thunderstorm Components<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.6.3&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<p>The following slide lists the different components that can be used with THOR Thunderstorm. We provide a server installer script, collectors, a Python API client and update scripts.\u00a0<\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2020\/09\/Screenshot-2020-09-25-at-09.21.17.png&#8221; title_text=&#8221;Screenshot 2020-09-25 at 09.21.17&#8243; _builder_version=&#8221;4.6.3&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.6.3&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<p>In addition to the Thunderstorm server we provide a set of simple sample collection tools called <a href=\"https:\/\/github.com\/NextronSystems\/thunderstorm-collector\">Thunderstorm Collectors<\/a>, a <a href=\"https:\/\/github.com\/NextronSystems\/thunderstormAPI\">Python-based API library<\/a> with command line client and a set of <a href=\"https:\/\/github.com\/NextronSystems\/nextron-helper-scripts\/tree\/master\/thunderstorm\">helper scripts<\/a>.\u00a0<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.6.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.6.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.6.3&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<h1>Thunderstorm Collectors<\/h1>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;2_5,3_5&#8243; _builder_version=&#8221;4.6.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.6.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.6.2&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<p>The Thunderstorm Collector <a href=\"https:\/\/github.com\/NextronSystems\/thunderstorm-collector\">repository<\/a> contains a Go based collector, precompiled for <a href=\"https:\/\/github.com\/NextronSystems\/thunderstorm-collector\/releases\">many different operating<\/a> systems and architectures as well as collectors scripts (Batch, Bash, PowerShell).<\/p>\n<p>We have pre-build collectors for Windows, Linux, macOS, AIX, Solaris on x86, x64, Arm, PowerPC, MIPS, RISC-V, Plan9, S390x (IBM Z) architectures.<span style=\"font-size: 18px;\"><\/span><\/p>\n<p><span style=\"font-size: 18px;\">These collectors allow you select files based on age, size and type for submission to a Thunderstorm server.<\/span><\/p>\n<p>It is easy to set up a task like:\u00a0<\/p>\n<p>&#8220;Select all files that have been created or modified within the last 24 hours and submit them to Thunderstorm for analysis. Run this task daily.&#8221;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.6.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2020\/09\/Screenshot-2020-09-25-at-09.27.54.png&#8221; title_text=&#8221;Screenshot 2020-09-25 at 09.27.54&#8243; _builder_version=&#8221;4.6.3&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2020\/09\/Screenshot-2020-09-29-at-16.09.53.png&#8221; title_text=&#8221;Screenshot 2020-09-29 at 16.09.53&#8243; _builder_version=&#8221;4.6.5&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.6.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.6.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_blurb title=&#8221;Low CPU and RAM Usage&#8221; image=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2020\/05\/Anti-virus-Security-16.png&#8221; _builder_version=&#8221;4.6.3&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<p>A collection task requires 0.75-2% of the CPU and 20MB memory.\u00a0<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.6.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_blurb title=&#8221;Any OS, Any Arch&#8221; image=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2020\/09\/Thunderstorm_OS_Listing-1.png&#8221; _builder_version=&#8221;4.6.5&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<p>Our collectors run on any operating system and processor architecture<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.6.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_blurb title=&#8221;High Speed&#8221; image=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2020\/05\/Speed_256.png&#8221; _builder_version=&#8221;4.6.3&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<p>It allows ultra fast collection runs. (Our tests: Win 10, collect last 3 days, any type, full disk = 3 minutes run)<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.6.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.6.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.6.3&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<h1>Thunderstorm API Client<\/h1>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;2_5,3_5&#8243; _builder_version=&#8221;4.6.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.6.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.6.3&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<p><span>We provide a\u00a0<\/span><a href=\"https:\/\/github.com\/NextronSystems\/thunderstormAPI\">Python module and Python based API client<\/a><span>\u00a0that supports multi-threaded submission to the THOR Thunderstorm service.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.6.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2020\/08\/Screenshot-2020-08-20-at-17.57.33.png&#8221; title_text=&#8221;Screenshot 2020-08-20 at 17.57.33&#8243; _builder_version=&#8221;4.6.3&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<h1>Modes of Operation<\/h1>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.6.2&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<h3>Service Mode<\/h3>\n<p>The service can be started in two scan modes:<\/p>\n<ul>\n<li>Pure YARA<\/li>\n<li>Full-Featured<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_blurb title=&#8221;Pure YARA&#8221; image=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2020\/08\/pure_yara.png&#8221; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;]In the pure YARA mode (&#8211;pure-yara) THOR Thunderstorm only applies the 13,000 internal and all custom YARA rules to the submitted samples. It&#8217;s leightweight and super fast.<br \/>\n[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_blurb title=&#8221;Full-Featured&#8221; image=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2020\/08\/full_featured.png&#8221; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;]The full-featured mode is the default. In this mode Thunderstorm also parses and analyses Windows Eventlogs (EVTX), registry hives, memory dumps, Windows error reports (WER) and more. It&#8217;s not just a YARA scan, but a full forensic processing.<br \/>\n[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<h1>More Features<\/h1>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_blurb title=&#8221;Completely On Premise&#8221; image=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2020\/08\/Anti-virus-Security-32.png&#8221; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<p>THOR Thunderstorm can be installed on any internal system and runs as a service within your network<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_blurb title=&#8221;Sample Storage&#8221; image=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2020\/09\/Anti-virus-Security-05.png&#8221; _builder_version=&#8221;4.6.3&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<p>Store suspicious or all transmitted samples with a reference to the source system to facilitate the deeper analysis<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_blurb title=&#8221;Forensic Modules&#8221; image=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2020\/08\/Anti-virus-Security-44.png&#8221; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<p>THOR Thunderstorm supports the analysis of different file types that get collected for forensic analysis purposes (e.g. EVTX files, Registry Hives)<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.6.5&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.6.5&#8243; _module_preset=&#8221;default&#8221;][et_pb_blurb title=&#8221;Custom Signatures and IOCs&#8221; image=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2020\/09\/Anti-virus-Security-23.png&#8221; _builder_version=&#8221;4.6.5&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<p>Add you own YARA signatures, Sigma rules, hash and filename IOCs and apply them to incoming samples<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.6.5&#8243; _module_preset=&#8221;default&#8221;][et_pb_blurb title=&#8221;SIEM Integration&#8221; image=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2020\/09\/Anti-virus-Security-15.png&#8221; _builder_version=&#8221;4.6.5&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<p>THOR Thunderstorm offers many ways to output information (Text, JSON, Syslog), which makes it easy to integrate the findings into your favorite SIEM system<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.6.5&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.6.0&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<h1>Web GUI and API Documentation<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.6.0&#8243; _module_preset=&#8221;default&#8221;]The API documentation is embedded into the web service itself. You can even send requests right from the browser to test it live. [\/et_pb_text][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2020\/08\/thor-thunderstorm-webgui.gif&#8221; title_text=&#8221;thor-thunderstorm-webgui&#8221; _builder_version=&#8221;4.6.0&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;2_5,3_5&#8243; _builder_version=&#8221;4.6.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.6.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.6.3&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<p>The Web GUI contains important information about the service like the signature set version, uptime, number of processed and queued samples and much more.\u00a0<\/p>\n<p>It contains some graphs that help you to assess the actual server load and processing speed.\u00a0<\/p>\n<p>It also contains links to the API documentation, the Python API library and the Thunderstorm Collectors for your convenience.\u00a0<\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.6.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2020\/09\/Screenshot-2020-09-25-at-09.54.19.png&#8221; title_text=&#8221;Screenshot 2020-09-25 at 09.54.19&#8243; _builder_version=&#8221;4.6.3&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2020\/09\/Screenshot-2020-09-25-at-09.51.15.png&#8221; title_text=&#8221;Screenshot 2020-09-25 at 09.51.15&#8243; _builder_version=&#8221;4.6.3&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<h1>On The Roadmap<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<p>The following tasks are on our roadmap for THOR Thunderstorm<\/p>\n<ul>\n<li>Collector service that uses file system notifications to submit new files in real-time<\/li>\n<li>Cortex Analyzer<\/li>\n<li><span style=\"font-size: 18px;\">ICAP Support (allows interfacing with Web Proxies)<\/span><\/li>\n<li><span style=\"font-size: 18px;\">File format support: PCAP, MFT<\/span><\/li>\n<li>Recursive extraction of nested archives<\/li>\n<li>Docker setup guide<\/li>\n<\/ul>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.6.5&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<h1>Getting Started<\/h1>\n<p>Please use the &#8220;GET STARTED&#8221; button in the upper right corner or <a href=\"https:\/\/www.nextron-systems.com\/get-started\/\">this link<\/a> to request more information.<\/p>\n<p>The <a href=\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2020\/10\/THOR_Thunderstorm_EN_2020_Sep.pdf\">release slide deck<\/a> contains more detailed information on some of the mentioned aspects.<\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We are proud to announce a groundbreaking new scan mode named &#8220;Thunderstorm&#8221; that we&#8217;ve integrated into preview builds of the upcoming THOR version 10.6. This mode of operation turns THOR into a RESTful web service that is able to process thousands of samples per minute sent from any device within the network. Think of it as your ultra-fast on-premise scan service, wich is bundled with more than 13,000 hand-crafted YARA rules focusing on persistent threats and forensic artefacts. Collect files and submit them for analysis from any operating system and any hardware platform. The possibilities are limitless. With this blog post, we&#8217;d like to highlight some of these new possibilities.Thunder rolls, lightning strikes &amp; the hammer flies across the sky. God of the weather, chariot of the storm, master of rain &amp; torrents. Son of the strength of Mother Earth, I ask you to grant me that strength for myself.What is THOR Thunderstorm? A RESTful web service\u00a0that receives samples and returns a scan result. It is feature-rich and very fast. Use Cases Use Case 1 &#8211; Remote File Collection During forensic investigations, automated file collection (ESI) from one or multiple remote systems can be combined with THOR Thunderstorm to improve [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[46,32,574,47],"tags":[159,579,578,581,575,577,576,580,218,78,94,359,5,48],"class_list":["post-8475","post","type-post","status-publish","format-standard","hentry","category-newsletter","category-thor","category-thunderstorm","category-yara","tag-api","tag-aws","tag-binaryalert","tag-buckets","tag-json","tag-processing","tag-restful","tag-s3","tag-sample","tag-scanning","tag-server","tag-service","tag-thor","tag-yara"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>There&#039;s a Thunderstorm Coming - Nextron Systems<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.nextron-systems.com\/2020\/10\/01\/theres-a-thunderstorm-coming\/\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.nextron-systems.com\/2020\/10\/01\/theres-a-thunderstorm-coming\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2020\/10\/01\/theres-a-thunderstorm-coming\/\"},\"author\":{\"name\":\"Florian Roth\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919\"},\"headline\":\"There&#8217;s a Thunderstorm Coming\",\"datePublished\":\"2020-10-01T13:50:57+00:00\",\"dateModified\":\"2022-03-25T13:15:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2020\/10\/01\/theres-a-thunderstorm-coming\/\"},\"wordCount\":3062,\"publisher\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\"},\"keywords\":[\"api\",\"aws\",\"binaryalert\",\"buckets\",\"json\",\"processing\",\"RESTful\",\"s3\",\"sample\",\"scanning\",\"server\",\"service\",\"thor\",\"YARA\"],\"articleSection\":[\"Newsletter\",\"THOR\",\"Thunderstorm\",\"YARA\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.nextron-systems.com\/2020\/10\/01\/theres-a-thunderstorm-coming\/\",\"url\":\"https:\/\/www.nextron-systems.com\/2020\/10\/01\/theres-a-thunderstorm-coming\/\",\"name\":\"There's a Thunderstorm Coming - Nextron Systems\",\"isPartOf\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#website\"},\"datePublished\":\"2020-10-01T13:50:57+00:00\",\"dateModified\":\"2022-03-25T13:15:42+00:00\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.nextron-systems.com\/2020\/10\/01\/theres-a-thunderstorm-coming\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.nextron-systems.com\/#website\",\"url\":\"https:\/\/www.nextron-systems.com\/\",\"name\":\"Nextron Systems\",\"description\":\"We Detect Hackers\",\"publisher\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.nextron-systems.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\",\"name\":\"Nextron Systems GmbH\",\"url\":\"https:\/\/www.nextron-systems.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png\",\"contentUrl\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png\",\"width\":260,\"height\":260,\"caption\":\"Nextron Systems GmbH\"},\"image\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919\",\"name\":\"Florian Roth\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g\",\"caption\":\"Florian Roth\"},\"description\":\"Florian Roth serves as the Head of Research and Development at Nextron Systems. With a background in IT security since 2000, he has delved deep into nation-state cyber attacks since 2012. Florian has developed the THOR Scanner and actively engages with the community via his Twitter handle @cyb3rops. He has contributed to open-source projects, including 'Sigma', a generic SIEM rule format, and 'LOKI', an open-source scanner. Additionally, he has shared valuable resources like a mapping of APT groups and operations and an Antivirus Event Analysis Cheat Sheet.\",\"url\":\"https:\/\/www.nextron-systems.com\/author\/florian\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"There's a Thunderstorm Coming - Nextron Systems","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.nextron-systems.com\/2020\/10\/01\/theres-a-thunderstorm-coming\/","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.nextron-systems.com\/2020\/10\/01\/theres-a-thunderstorm-coming\/#article","isPartOf":{"@id":"https:\/\/www.nextron-systems.com\/2020\/10\/01\/theres-a-thunderstorm-coming\/"},"author":{"name":"Florian Roth","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919"},"headline":"There&#8217;s a Thunderstorm Coming","datePublished":"2020-10-01T13:50:57+00:00","dateModified":"2022-03-25T13:15:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.nextron-systems.com\/2020\/10\/01\/theres-a-thunderstorm-coming\/"},"wordCount":3062,"publisher":{"@id":"https:\/\/www.nextron-systems.com\/#organization"},"keywords":["api","aws","binaryalert","buckets","json","processing","RESTful","s3","sample","scanning","server","service","thor","YARA"],"articleSection":["Newsletter","THOR","Thunderstorm","YARA"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.nextron-systems.com\/2020\/10\/01\/theres-a-thunderstorm-coming\/","url":"https:\/\/www.nextron-systems.com\/2020\/10\/01\/theres-a-thunderstorm-coming\/","name":"There's a Thunderstorm Coming - Nextron Systems","isPartOf":{"@id":"https:\/\/www.nextron-systems.com\/#website"},"datePublished":"2020-10-01T13:50:57+00:00","dateModified":"2022-03-25T13:15:42+00:00","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nextron-systems.com\/2020\/10\/01\/theres-a-thunderstorm-coming\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.nextron-systems.com\/#website","url":"https:\/\/www.nextron-systems.com\/","name":"Nextron Systems","description":"We Detect Hackers","publisher":{"@id":"https:\/\/www.nextron-systems.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nextron-systems.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.nextron-systems.com\/#organization","name":"Nextron Systems GmbH","url":"https:\/\/www.nextron-systems.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png","contentUrl":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png","width":260,"height":260,"caption":"Nextron Systems GmbH"},"image":{"@id":"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919","name":"Florian Roth","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g","caption":"Florian Roth"},"description":"Florian Roth serves as the Head of Research and Development at Nextron Systems. With a background in IT security since 2000, he has delved deep into nation-state cyber attacks since 2012. Florian has developed the THOR Scanner and actively engages with the community via his Twitter handle @cyb3rops. He has contributed to open-source projects, including 'Sigma', a generic SIEM rule format, and 'LOKI', an open-source scanner. Additionally, he has shared valuable resources like a mapping of APT groups and operations and an Antivirus Event Analysis Cheat Sheet.","url":"https:\/\/www.nextron-systems.com\/author\/florian\/"}]}},"_links":{"self":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/8475","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/comments?post=8475"}],"version-history":[{"count":62,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/8475\/revisions"}],"predecessor-version":[{"id":8793,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/8475\/revisions\/8793"}],"wp:attachment":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/media?parent=8475"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/categories?post=8475"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/tags?post=8475"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}