{"id":193,"date":"2019-03-12T01:15:21","date_gmt":"2019-03-11T23:15:21","guid":{"rendered":"https:\/\/www.mozdomains.com\/blog\/en\/?p=193"},"modified":"2020-05-31T01:45:14","modified_gmt":"2020-05-30T23:45:14","slug":"what-is-an-sql-injection-sqli","status":"publish","type":"post","link":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-is-an-sql-injection-sqli\/","title":{"rendered":"What is an SQL Injection (SQLI)"},"content":{"rendered":"<p style=\"text-align: justify;\"><strong>What is SQL Injection (SQLI) Attack?<\/strong><\/p>\n<p style=\"text-align: justify;\">SQL Injection (SQLI) is a backend database method used by hackers to take control of a web application by injecting malicious SQL codes. SQLI attacks are becoming very widespread, because they are easy to do and require very little technical knowledge to perform. SQLI is a web application server issue which most of the developers are unaware of.<\/p>\n<p style=\"text-align: justify;\"><strong>SQL Injection Types:<\/strong><\/p>\n<p style=\"text-align: justify;\">Hackers insert malicious SQL codes using different methods which includes retrieving of data in form of errors, conditions, and time. Let\u2019s take a detailed look at the SQL Injection types:<\/p>\n<div>\n<h2 style=\"text-align: justify;\">SQL Injection Types<\/h2>\n<div style=\"text-align: justify;\">\n<div>\n<ul>\n<li>Error Based SQL Injection<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div style=\"text-align: justify;\">\n<div>\n<ul>\n<li>SQL Injection Based on Boolean Errors<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div style=\"text-align: justify;\">\n<div>\n<ul>\n<li>SQL Injection done through Time Based Query<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<p style=\"text-align: justify;\"><strong>1. Error Based SQL Injection:<\/strong><\/p>\n<p style=\"text-align: justify;\">In this method hackers can easily fetch details such as table names and content from visible database errors and this could be identified easily by hackers on the production servers. The best method here is to avoid displaying database error messages which in turn prevents hackers from fetching that information.<\/p>\n<p style=\"text-align: justify;\"><strong>2. SQL Injection Based on Boolean Errors:<\/strong><\/p>\n<p style=\"text-align: justify;\">In a few cases, the error message is not displayed in a page when an SQL Query fails which makes it difficult for the hackers to gain entry into the vulnerable application. But there is still a way for the hackers to find information. Whenever an SQL query fails some parts of the webpage seem to disappear or the whole website will fail to load.<\/p>\n<p style=\"text-align: justify;\">On confirmation of these notifications the hacker inserts a false condition into the SQL query to test the vulnerability level of the application and the proximity of data extraction.<\/p>\n<p style=\"text-align: justify;\"><strong>Example:<\/strong><br \/>\n<strong>https:\/\/xyz.com\/index.php?id=1+AND+1=1<\/strong><\/p>\n<p style=\"text-align: justify;\">After inserting this query if the website loads normally then it gives an indication that it is vulnerable to an SQL injection. To confirm this suspicion, the hacker would put a wrong query:<\/p>\n<p style=\"text-align: justify;\"><strong>https:\/\/xyz.com\/index.php?id=1+AND+1=2<\/strong><\/p>\n<p style=\"text-align: justify;\">As this condition is false and if the webpage does not work as usual it shows that webpage is vulnerable to SQL Injection attack.<\/p>\n<p style=\"text-align: justify;\"><strong>3. SQL Injection done through Time Based Query:<\/strong><\/p>\n<p style=\"text-align: justify;\">In many cases the Vulnerable SQL queries would be displayed visually in a web page but can be still easy to find out. Hackers here instruct the database to wait for a certain time period before responding. If the site denies this and loads without any pause it means that they are not vulnerable. The SQL query implemented here would be similar to Boolean Attack but would have a sleep function in the query. For example if the sleep time is 5 seconds then it instructs the database to sleep for 5 seconds.<\/p>\n<p style=\"text-align: justify;\"><strong>Example Query:<\/strong><br \/>\nhttps:\/\/xya.com\/index.php?id=1+AND+IF(version()+LIKE+\u20198%\u2019,sleep(5),false)<\/p>\n<p style=\"text-align: justify;\"><strong>Methods to Prevent SQL Query:<\/strong><\/p>\n<p style=\"text-align: justify;\">False SQL queries entry can be avoided by<\/p>\n<p style=\"text-align: justify;\">Locating these\u00a0 SQL queries in a manual aspect would prove to be costly as there are chances of missing out. Hence, getting a website security software is a good step.<\/p>\n<p style=\"text-align: justify;\">Implementing a\u00a0web security\u00a0software helps to validate this issue by having a thorough check on each and every query. Even if a vulnerable query is found it makes sure that web page is loading properly by hiding the queries from the database.<\/p>\n<ul>\n<li style=\"text-align: justify;\">replacing special characters such as ( \u201c\u201d, \u201c%\u201d, \u201c\\\u201d, \u201c_\u201d \u201d#\u201d).<\/li>\n<li style=\"text-align: justify;\">Stored procedures being used up in database<\/li>\n<li style=\"text-align: justify;\">Use of prepaid statements in queries.<\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>What is SQL Injection (SQLI) Attack? SQL Injection (SQLI) is a backend database method used by hackers to take control of a web application by injecting malicious SQL codes. SQLI attacks are becoming very widespread, because they are easy to do and require very little technical knowledge to perform. SQLI is a web application server issue which most of the developers are unaware of. SQL Injection Types: Hackers insert malicious SQL codes using different methods which includes retrieving of data in form of errors, conditions, and time. Let\u2019s take a detailed look at the SQL Injection types: SQL Injection Types\u2026<\/p>\n","protected":false},"author":3,"featured_media":194,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-193","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-website-security"],"blocksy_meta":{"styles_descriptor":{"styles":{"desktop":"","tablet":"","mobile":""},"google_fonts":[],"version":5}},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is an SQL Injection (SQLI) - MozDomains Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-is-an-sql-injection-sqli\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is an SQL Injection (SQLI) - MozDomains Blog\" \/>\n<meta property=\"og:description\" content=\"What is SQL Injection (SQLI) Attack? SQL Injection (SQLI) is a backend database method used by hackers to take control of a web application by injecting malicious SQL codes. SQLI attacks are becoming very widespread, because they are easy to do and require very little technical knowledge to perform. SQLI is a web application server issue which most of the developers are unaware of. SQL Injection Types: Hackers insert malicious SQL codes using different methods which includes retrieving of data in form of errors, conditions, and time. Let\u2019s take a detailed look at the SQL Injection types: SQL Injection Types\u2026\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-is-an-sql-injection-sqli\/\" \/>\n<meta property=\"og:site_name\" content=\"MozDomains Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-11T23:15:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-30T23:45:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/1473921124injection-attack.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"482\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Momed Jussub\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Momed Jussub\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/what-is-an-sql-injection-sqli\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/what-is-an-sql-injection-sqli\\\/\"},\"author\":{\"name\":\"Momed Jussub\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#\\\/schema\\\/person\\\/53ab8153fe48257d7e1210e28064b6e6\"},\"headline\":\"What is an SQL Injection (SQLI)\",\"datePublished\":\"2019-03-11T23:15:21+00:00\",\"dateModified\":\"2020-05-30T23:45:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/what-is-an-sql-injection-sqli\\\/\"},\"wordCount\":566,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/what-is-an-sql-injection-sqli\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/1473921124injection-attack.jpg\",\"articleSection\":[\"Website Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/what-is-an-sql-injection-sqli\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/what-is-an-sql-injection-sqli\\\/\",\"url\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/what-is-an-sql-injection-sqli\\\/\",\"name\":\"What is an SQL Injection (SQLI) - MozDomains Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/what-is-an-sql-injection-sqli\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/what-is-an-sql-injection-sqli\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/1473921124injection-attack.jpg\",\"datePublished\":\"2019-03-11T23:15:21+00:00\",\"dateModified\":\"2020-05-30T23:45:14+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/what-is-an-sql-injection-sqli\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/what-is-an-sql-injection-sqli\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/what-is-an-sql-injection-sqli\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/1473921124injection-attack.jpg\",\"contentUrl\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/1473921124injection-attack.jpg\",\"width\":1000,\"height\":482},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/what-is-an-sql-injection-sqli\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is an SQL Injection (SQLI)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/\",\"name\":\"MozDomains Blog\",\"description\":\"Tutorials and Tips\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#organization\",\"name\":\"MozDomains Blog\",\"url\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/mozdomains-logo.svg\",\"contentUrl\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/mozdomains-logo.svg\",\"caption\":\"MozDomains Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#\\\/schema\\\/person\\\/53ab8153fe48257d7e1210e28064b6e6\",\"name\":\"Momed Jussub\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fce591b84b6638bb4c5ae8975e5c2046f67170c09684919a68970367459d9fae?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fce591b84b6638bb4c5ae8975e5c2046f67170c09684919a68970367459d9fae?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fce591b84b6638bb4c5ae8975e5c2046f67170c09684919a68970367459d9fae?s=96&d=mm&r=g\",\"caption\":\"Momed Jussub\"},\"description\":\"Network Engineer (Cisco, Mikrotik, Juniper, Huawei, Ubiquiti, Fortigate, pfSense, Palo Alto), CCTV Engineer, IPTV Engineer, Virtualization Specialist OpenVZ, XEN, KVM and HyperV, Optical Fiber Network Specialist, System Administrator Windows \\\/Linux, PenTester, Full Stack Developer (HTML, CSS3, PHP, C # Desktop App, C # ASP.NET, MySQL, MSSQL) and Writer.\",\"sameAs\":[\"https:\\\/\\\/www.mozdomains.co.mz\",\"http:\\\/\\\/instagram.com\\\/momedjussub\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/momedjussub\"],\"url\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/author\\\/momed-jussub\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is an SQL Injection (SQLI) - MozDomains Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-is-an-sql-injection-sqli\/","og_locale":"en_US","og_type":"article","og_title":"What is an SQL Injection (SQLI) - MozDomains Blog","og_description":"What is SQL Injection (SQLI) Attack? SQL Injection (SQLI) is a backend database method used by hackers to take control of a web application by injecting malicious SQL codes. SQLI attacks are becoming very widespread, because they are easy to do and require very little technical knowledge to perform. SQLI is a web application server issue which most of the developers are unaware of. SQL Injection Types: Hackers insert malicious SQL codes using different methods which includes retrieving of data in form of errors, conditions, and time. Let\u2019s take a detailed look at the SQL Injection types: SQL Injection Types\u2026","og_url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-is-an-sql-injection-sqli\/","og_site_name":"MozDomains Blog","article_published_time":"2019-03-11T23:15:21+00:00","article_modified_time":"2020-05-30T23:45:14+00:00","og_image":[{"width":1000,"height":482,"url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/1473921124injection-attack.jpg","type":"image\/jpeg"}],"author":"Momed Jussub","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Momed Jussub","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-is-an-sql-injection-sqli\/#article","isPartOf":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-is-an-sql-injection-sqli\/"},"author":{"name":"Momed Jussub","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#\/schema\/person\/53ab8153fe48257d7e1210e28064b6e6"},"headline":"What is an SQL Injection (SQLI)","datePublished":"2019-03-11T23:15:21+00:00","dateModified":"2020-05-30T23:45:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-is-an-sql-injection-sqli\/"},"wordCount":566,"commentCount":0,"publisher":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#organization"},"image":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-is-an-sql-injection-sqli\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/1473921124injection-attack.jpg","articleSection":["Website Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-is-an-sql-injection-sqli\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-is-an-sql-injection-sqli\/","url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-is-an-sql-injection-sqli\/","name":"What is an SQL Injection (SQLI) - MozDomains Blog","isPartOf":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-is-an-sql-injection-sqli\/#primaryimage"},"image":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-is-an-sql-injection-sqli\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/1473921124injection-attack.jpg","datePublished":"2019-03-11T23:15:21+00:00","dateModified":"2020-05-30T23:45:14+00:00","breadcrumb":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-is-an-sql-injection-sqli\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-is-an-sql-injection-sqli\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-is-an-sql-injection-sqli\/#primaryimage","url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/1473921124injection-attack.jpg","contentUrl":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/1473921124injection-attack.jpg","width":1000,"height":482},{"@type":"BreadcrumbList","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-is-an-sql-injection-sqli\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.mozdomains.co.mz\/blog\/en\/"},{"@type":"ListItem","position":2,"name":"What is an SQL Injection (SQLI)"}]},{"@type":"WebSite","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#website","url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/","name":"MozDomains Blog","description":"Tutorials and Tips","publisher":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mozdomains.co.mz\/blog\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#organization","name":"MozDomains Blog","url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2021\/05\/mozdomains-logo.svg","contentUrl":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2021\/05\/mozdomains-logo.svg","caption":"MozDomains Blog"},"image":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#\/schema\/person\/53ab8153fe48257d7e1210e28064b6e6","name":"Momed Jussub","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fce591b84b6638bb4c5ae8975e5c2046f67170c09684919a68970367459d9fae?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fce591b84b6638bb4c5ae8975e5c2046f67170c09684919a68970367459d9fae?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fce591b84b6638bb4c5ae8975e5c2046f67170c09684919a68970367459d9fae?s=96&d=mm&r=g","caption":"Momed Jussub"},"description":"Network Engineer (Cisco, Mikrotik, Juniper, Huawei, Ubiquiti, Fortigate, pfSense, Palo Alto), CCTV Engineer, IPTV Engineer, Virtualization Specialist OpenVZ, XEN, KVM and HyperV, Optical Fiber Network Specialist, System Administrator Windows \/Linux, PenTester, Full Stack Developer (HTML, CSS3, PHP, C # Desktop App, C # ASP.NET, MySQL, MSSQL) and Writer.","sameAs":["https:\/\/www.mozdomains.co.mz","http:\/\/instagram.com\/momedjussub","https:\/\/www.linkedin.com\/in\/momedjussub"],"url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/author\/momed-jussub\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/posts\/193","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/comments?post=193"}],"version-history":[{"count":0,"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/posts\/193\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/media\/194"}],"wp:attachment":[{"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/media?parent=193"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/categories?post=193"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/tags?post=193"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}