{"id":7893,"date":"2021-08-15T16:10:45","date_gmt":"2021-08-15T15:10:45","guid":{"rendered":"https:\/\/webhosting.de\/?p=7893"},"modified":"2021-08-10T16:14:02","modified_gmt":"2021-08-10T15:14:02","slug":"expert-blog-using-open-source-tools-for-analysis-of-network-traffic","status":"publish","type":"post","link":"https:\/\/webhosting.de\/da\/expertenblog-verwenden-von-open-source-tools-fuer-die-analyse-des-netzwerkverkehrs\/","title":{"rendered":"Ekspertblog: Brug af open source-v\u00e6rkt\u00f8jer til at analysere netv\u00e6rkstrafik"},"content":{"rendered":"<h2><b>Ekspertblog: Brug af open source-v\u00e6rkt\u00f8jer til at analysere netv\u00e6rkstrafik<\/b><\/h2>\n<p>&nbsp;<\/p>\n<div>\n<div class=\"preview\">Overv\u00e5gning af netv\u00e6rkstrafikken er et s\u00e6rligt vigtigt sp\u00f8rgsm\u00e5l i dag, is\u00e6r i lyset af de betingelser, som COVID 19-pandemien har p\u00e5lagt fjernarbejdspraksis. Moderne malware omg\u00e5r med succes whitelisting-teknikker og kan effektivt skjule sin tilstedev\u00e6relse i systemet. Lad os diskutere, hvordan vi kan gribe den skr\u00e6mmende opgave med netv\u00e6rksoverv\u00e5gning an.<\/p>\n<p>Mens de politiske it-gr\u00e6nser er ved at blive klarere (lande som Kina og Rusland fors\u00f8ger at skabe deres egne \u00f8kosystemer, der tillader uafh\u00e6ngige <a href=\"https:\/\/webhosting.de\/da\/flexoptix-universal-transceiver\/\">Internet<\/a>, specialiserede tjenester og software), er processen pr\u00e6cis modsat i virksomhedsmilj\u00f8et. Perimeterne opl\u00f8ses i stigende grad i informationsomr\u00e5det, hvilket giver alvorlige hovedpiner for cybersikkerhedsansvarlige.<\/p>\n<p>Der er problemer overalt. Cybersikkerhedseksperter skal h\u00e5ndtere vanskelighederne ved at arbejde eksternt med deres up\u00e5lidelige milj\u00f8 og enheder og med skyggeinfrastruktur - Shadow IT. P\u00e5 den anden side af barrikaderne har vi mere og mere sofistikerede modeller for dr\u00e6berk\u00e6der og omhyggelig sl\u00f8ring af ubudne g\u00e6ster og netv\u00e6rkstilstedev\u00e6relse.<\/p>\n<p>Standardv\u00e6rkt\u00f8jer til overv\u00e5gning af cybersikkerhedsoplysninger kan ikke altid give et fuldst\u00e6ndigt billede af, hvad der sker. Dette f\u00e5r os til at s\u00f8ge efter yderligere informationskilder, f.eks. analyse af netv\u00e6rkstrafik.<\/p>\n<p>V\u00e6ksten af skygge-it<\/p>\n<p>Begrebet Bring Your Own Device (personlige enheder, der anvendes i et virksomhedsmilj\u00f8) blev pludselig erstattet af Work From Your Home Device (et virksomhedsmilj\u00f8, der overf\u00f8res til personlige enheder).<\/p>\n<p>Medarbejderne bruger pc'er til at f\u00e5 adgang til deres virtuelle arbejdsplads og e-mail. De bruger en personlig telefon til multi-faktor-autentifikation. Alle deres enheder er placeret i en afstand p\u00e5 nul fra potentielt inficerede computere eller <a href=\"https:\/\/webhosting.de\/da\/5-5g-mobilfunkstandard-bei-huawei-bereits-in-planung\/\">IoT<\/a> er forbundet til et hjemmenetv\u00e6rk, der ikke er tillid til. Alle disse faktorer tvinger sikkerhedspersonalet til at \u00e6ndre deres metoder og undertiden til at g\u00e5 over til den radikale nultillid.<\/p>\n<p>Med indf\u00f8relsen af mikroservices er v\u00e6ksten af skygge-it blevet intensiveret. Organisationer har ikke ressourcerne til at udstyre legitime arbejdsstationer med antivirusprogrammer og v\u00e6rkt\u00f8jer til registrering og behandling af trusler (EDR) og overv\u00e5ge denne d\u00e6kning. Det m\u00f8rke hj\u00f8rne af infrastrukturen er ved at blive et sandt \"helvede\".<\/p>\n<p>som ikke giver signaler om informationssikkerhedsh\u00e6ndelser eller inficerede objekter. Dette usikre omr\u00e5de h\u00e6mmer i h\u00f8j grad reaktionen p\u00e5 nye h\u00e6ndelser.<\/p>\n<p>For alle, der \u00f8nsker at forst\u00e5, hvad der sker med informationssikkerhed, er SIEM blevet en hj\u00f8rnesten. SIEM er dog ikke et altseende \u00f8je. SIEM-svindelnummeret er ogs\u00e5 v\u00e6k. SIEM ser p\u00e5 grund af sine ressourcer og logiske begr\u00e6nsninger kun ting, som sendes til virksomheden fra et begr\u00e6nset antal kilder, og som ogs\u00e5 kan adskilles af hackere.<\/p>\n<p>Antallet af ondsindede installat\u00f8rer, der bruger legitime v\u00e6rkt\u00f8jer, der allerede findes p\u00e5 v\u00e6rten, er steget: wmic.exe, rgsvr32.exe, hh.exe og mange andre.<\/p>\n<p>Som f\u00f8lge heraf foreg\u00e5r installationen af et skadeligt program i flere omgange, der integrerer opkald til lovlige v\u00e6rkt\u00f8jer. Derfor kan automatiske detektionsv\u00e6rkt\u00f8jer ikke altid kombinere dem i en k\u00e6de af installation af et farligt objekt i systemet.<\/p>\n<p>N\u00e5r angriberne har opn\u00e5et vedholdenhed p\u00e5 den inficerede arbejdsstation, kan de skjule deres handlinger meget pr\u00e6cist i systemet. De arbejder is\u00e6r \"snedigt\" med logning. For eksempel <a href=\"https:\/\/webhosting.de\/da\/wordpress-gehackt-bekommen-sie-es-wieder-sicher\/\">rense<\/a> de ikke kun logger, men omdirigerer dem til en midlertidig fil, udf\u00f8rer ondsindede handlinger og returnerer logdatastr\u00f8mmen til dens tidligere tilstand. P\u00e5 denne m\u00e5de kan de undg\u00e5 at udl\u00f8se \"logfil slettet\"-scenariet i SIEM.<\/p><\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Expertenblog: Verwenden von Open Source-Tools f\u00fcr die Analyse des Netzwerkverkehrs &nbsp; Die \u00dcberwachung des Netzwerkverkehrs ist heutzutage ein besonders wichtiges Thema, insbesondere angesichts der durch die COVID-19-Pandemie auferlegten Bedingungen f\u00fcr Fernarbeitspraktiken. Moderne Schadprogramme umgehen erfolgreich Whitelist-Techniken und k\u00f6nnen ihre Pr\u00e4senz im System effektiv verbergen. Lassen Sie uns diskutieren, wie wir uns der entmutigenden Aufgabe der [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":7894,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_crdt_document":"","inline_featured_image":false,"footnotes":""},"categories":[996],"tags":[1010,1009,1008],"class_list":["post-7893","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hosting-news","tag-cybersicherheit","tag-netzwerkverkehr","tag-open-source-tools"],"acf":[],"_wp_attached_file":null,"_wp_attachment_metadata":null,"litespeed-optimize-size":null,"litespeed-optimize-set":null,"_elementor_source_image_hash":null,"_wp_attachment_image_alt":null,"stockpack_author_name":null,"stockpack_author_url":null,"stockpack_provider":null,"stockpack_image_url":null,"stockpack_license":null,"stockpack_license_url":null,"stockpack_modification":null,"color":null,"original_id":null,"original_url":null,"original_link":null,"unsplash_location":null,"unsplash_sponsor":null,"unsplash_exif":null,"unsplash_attachment_metadata":null,"_elementor_is_screenshot":null,"surfer_file_name":null,"surfer_file_original_url":null,"envato_tk_source_kit":null,"envato_tk_source_index":null,"envato_tk_manifest":null,"envato_tk_folder_name":null,"envato_tk_builder":null,"envato_elements_download_event":null,"_menu_item_type":null,"_menu_item_menu_item_parent":null,"_menu_item_object_id":null,"_menu_item_object":null,"_menu_item_target":null,"_menu_item_classes":null,"_menu_item_xfn":null,"_menu_item_url":null,"_trp_menu_languages":null,"rank_math_primary_category":"996","rank_math_title":null,"inline_featured_image":null,"_yoast_wpseo_primary_category":null,"rank_math_schema_blogposting":null,"rank_math_schema_videoobject":null,"_oembed_049c719bc4a9f89deaead66a7da9fddc":null,"_oembed_time_049c719bc4a9f89deaead66a7da9fddc":null,"_yoast_wpseo_focuskw":null,"_yoast_wpseo_linkdex":null,"_oembed_27e3473bf8bec795fbeb3a9d38489348":null,"_oembed_c3b0f6959478faf92a1f343d8f96b19e":null,"_trp_translated_slug_en_us":null,"_wp_desired_post_slug":null,"_yoast_wpseo_title":null,"tldname":null,"tldpreis":null,"tldrubrik":null,"tldpolicylink":null,"tldsize":null,"tldregistrierungsdauer":null,"tldtransfer":null,"tldwhoisprivacy":null,"tldregistrarchange":null,"tldregistrantchange":null,"tldwhoisupdate":null,"tldnameserverupdate":null,"tlddeletesofort":null,"tlddeleteexpire":null,"tldumlaute":null,"tldrestore":null,"tldsubcategory":null,"tldbildname":null,"tldbildurl":null,"tldclean":null,"tldcategory":null,"tldpolicy":null,"tldbesonderheiten":null,"tld_bedeutung":null,"_oembed_d167040d816d8f94c072940c8009f5f8":null,"_oembed_b0a0fa59ef14f8870da2c63f2027d064":null,"_oembed_4792fa4dfb2a8f09ab950a73b7f313ba":null,"_oembed_33ceb1fe54a8ab775d9410abf699878d":null,"_oembed_fd7014d14d919b45ec004937c0db9335":null,"_oembed_21a029d076783ec3e8042698c351bd7e":null,"_oembed_be5ea8a0c7b18e658f08cc571a909452":null,"_oembed_a9ca7a298b19f9b48ec5914e010294d2":null,"_oembed_f8db6b27d08a2bb1f920e7647808899a":null,"_oembed_168ebde5096e77d8a89326519af9e022":null,"_oembed_cdb76f1b345b42743edfe25481b6f98f":null,"_oembed_87b0613611ae54e86e8864265404b0a1":null,"_oembed_27aa0e5cf3f1bb4bc416a4641a5ac273":null,"_oembed_time_27aa0e5cf3f1bb4bc416a4641a5ac273":null,"_tldname":null,"_tldclean":null,"_tldpreis":null,"_tldcategory":null,"_tldsubcategory":null,"_tldpolicy":null,"_tldpolicylink":null,"_tldsize":null,"_tldregistrierungsdauer":null,"_tldtransfer":null,"_tldwhoisprivacy":null,"_tldregistrarchange":null,"_tldregistrantchange":null,"_tldwhoisupdate":null,"_tldnameserverupdate":null,"_tlddeletesofort":null,"_tlddeleteexpire":null,"_tldumlaute":null,"_tldrestore":null,"_tldbildname":null,"_tldbildurl":null,"_tld_bedeutung":null,"_tldbesonderheiten":null,"_oembed_ad96e4112edb9f8ffa35731d4098bc6b":null,"_oembed_8357e2b8a2575c74ed5978f262a10126":null,"_oembed_3d5fea5103dd0d22ec5d6a33eff7f863":null,"_eael_widget_elements":null,"_oembed_0d8a206f09633e3d62b95a15a4dd0487":null,"_oembed_time_0d8a206f09633e3d62b95a15a4dd0487":null,"_aioseo_description":null,"_eb_attr":null,"_eb_data_table":null,"_oembed_819a879e7da16dd629cfd15a97334c8a":null,"_oembed_time_819a879e7da16dd629cfd15a97334c8a":null,"_acf_changed":null,"_wpcode_auto_insert":null,"_edit_last":"1","_edit_lock":"1628608424:1","_oembed_e7b913c6c84084ed9702cb4feb012ddd":"{{unknown}}","_oembed_bfde9e10f59a17b85fc8917fa7edf782":"<iframe title=\"Theming Nextcloud in 37 seconds\" width=\"368\" height=\"207\" src=\"https:\/\/www.youtube.com\/embed\/wqRgeFXYUys?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>","_oembed_time_bfde9e10f59a17b85fc8917fa7edf782":"1628608472","_oembed_03514b67990db061d7c4672de26dc514":"<iframe title=\"Gaia X\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/NhqLt_NJ6FA?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>","_oembed_time_03514b67990db061d7c4672de26dc514":"1628608465","rank_math_news_sitemap_robots":null,"rank_math_robots":null,"_eael_post_view_count":"4515","_trp_automatically_translated_slug_ru_ru":null,"_trp_automatically_translated_slug_et":"expert-blog-using-open-source-tools-for-analysis-of-network-traffic","_trp_automatically_translated_slug_lv":"eksperts-blog-izmantot-atverta-izcelsmes-rikus-tiklu-plusmas-analizes-analizei","_trp_automatically_translated_slug_fr_fr":null,"_trp_automatically_translated_slug_en_us":null,"_wp_old_slug":null,"_trp_automatically_translated_slug_da_dk":null,"_trp_automatically_translated_slug_pl_pl":null,"_trp_automatically_translated_slug_es_es":null,"_trp_automatically_translated_slug_hu_hu":null,"_trp_automatically_translated_slug_fi":"expert-blog-using-open-source-tools-for-analysis-of-network-traffic","_trp_automatically_translated_slug_ja":"%e3%82%a8%e3%82%ad%e3%82%b9%e3%83%91%e3%83%bc%e3%83%88%e3%83%bb%e3%83%96%e3%83%ad%e3%82%b0-%e3%83%8d%e3%83%83%e3%83%88%e3%83%af%e3%83%bc%e3%82%af%e3%83%bb%e3%83%88%e3%83%a9%e3%83%92%e3%83%83%e3%82%af","_trp_automatically_translated_slug_lt_lt":null,"_elementor_edit_mode":null,"_elementor_template_type":null,"_elementor_version":null,"_elementor_pro_version":null,"_wp_page_template":"default","_elementor_page_settings":null,"_elementor_data":null,"_elementor_css":null,"_elementor_conditions":null,"_happyaddons_elements_cache":null,"_oembed_75446120c39305f0da0ccd147f6de9cb":"{{unknown}}","_oembed_time_75446120c39305f0da0ccd147f6de9cb":null,"_oembed_3efb2c3e76a18143e7207993a2a6939a":"<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/BREAKING?src=hash&amp;ref_src=twsrc%5Etfw\">#BREAKING<\/a>: Texas takes the lead once more! Today, we\u2019re filing a lawsuit against <a href=\"https:\/\/twitter.com\/hashtag\/Google?src=hash&amp;ref_src=twsrc%5Etfw\">#Google<\/a> for anticompetitive conduct.<br><br>This internet Goliath used its power to manipulate the market, destroy competition, and harm YOU, the consumer. Stay tuned\u2026 <a href=\"https:\/\/t.co\/fdEVEWQb0e\">pic.twitter.com\/fdEVEWQb0e<\/a><\/p>&mdash; Texas Attorney General (@TXAG) <a href=\"https:\/\/twitter.com\/TXAG\/status\/1339283520099856384?ref_src=twsrc%5Etfw\">December 16, 2020<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>","_oembed_time_3efb2c3e76a18143e7207993a2a6939a":"1628608458","_oembed_59808117857ddf57e478a31d79f76e4d":"<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">Happy to follow-on report that a huge chunk of <a href=\"https:\/\/twitter.com\/Flickr?ref_src=twsrc%5Etfw\">@Flickr<\/a> compute just successfully made the transition to Graviton2 <a href=\"https:\/\/twitter.com\/Arm?ref_src=twsrc%5Etfw\">@ARM<\/a> in <a href=\"https:\/\/twitter.com\/awscloud?ref_src=twsrc%5Etfw\">@awscloud<\/a> this afternoon. More services coming shortly. My aim is to get to 100% of non-GPU <a href=\"https:\/\/twitter.com\/SmugMug?ref_src=twsrc%5Etfw\">@SmugMug<\/a> and <a href=\"https:\/\/twitter.com\/Flickr?ref_src=twsrc%5Etfw\">@Flickr<\/a> compute on ARM within the year. <a href=\"https:\/\/t.co\/fwXWdg06xx\">https:\/\/t.co\/fwXWdg06xx<\/a><\/p>&mdash; Don MacAskill (@DonMacAskill) <a href=\"https:\/\/twitter.com\/DonMacAskill\/status\/1314050996486561792?ref_src=twsrc%5Etfw\">October 8, 2020<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>","_oembed_time_59808117857ddf57e478a31d79f76e4d":"1628608459","_oembed_965c5b49aa8d22ce37dfb3bde0268600":"<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"de\" dir=\"ltr\">Der <a href=\"https:\/\/twitter.com\/hashtag\/Finanzausschuss?src=hash&amp;ref_src=twsrc%5Etfw\">#Finanzausschuss<\/a> im <a href=\"https:\/\/twitter.com\/hashtag\/Bundestag?src=hash&amp;ref_src=twsrc%5Etfw\">#Bundestag<\/a> hat das <a href=\"https:\/\/twitter.com\/hashtag\/Jahressteuergesetz?src=hash&amp;ref_src=twsrc%5Etfw\">#Jahressteuergesetz<\/a> beschlossen. Damit wurde auch die <a href=\"https:\/\/twitter.com\/hashtag\/Gemeinn%C3%BCtzigkeit?src=hash&amp;ref_src=twsrc%5Etfw\">#Gemeinn\u00fctzigkeit<\/a> f\u00fcr <a href=\"https:\/\/twitter.com\/hashtag\/Freifunk?src=hash&amp;ref_src=twsrc%5Etfw\">#Freifunk<\/a> Initiativen beschlossen. Das ganze geht jetzt in der kommenden Woche ins Plenum zur Abstimmung und direkt in den <a href=\"https:\/\/twitter.com\/hashtag\/Bundesrat?src=hash&amp;ref_src=twsrc%5Etfw\">#Bundesrat<\/a><\/p>&mdash; Jens Zimmermann (@JensZSPD) <a href=\"https:\/\/twitter.com\/JensZSPD\/status\/1336581821706989568?ref_src=twsrc%5Etfw\">December 9, 2020<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>","_oembed_time_965c5b49aa8d22ce37dfb3bde0268600":"1628608461","_oembed_81002f7ee3604f645db4ebcfd1912acf":"<iframe title=\"Netzetag bei der Telekom: Antennen, Breitband, Glasfaser\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/6_NTa3VCRFo?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>","_oembed_time_81002f7ee3604f645db4ebcfd1912acf":"1628608461","_elementor_screenshot":null,"_oembed_7ea3429961cf98fa85da9747683af827":"<iframe title=\"Firewall: Wie du die Web Application Firewall im Plesk Men\u00fc verwendest und deine Website sch\u00fctzt.\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/CzAjqyJtEaw?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>","_oembed_time_7ea3429961cf98fa85da9747683af827":"1628608443","_elementor_controls_usage":null,"_elementor_page_assets":[],"_elementor_screenshot_failed":null,"theplus_transient_widgets":null,"_eael_custom_js":null,"_wp_old_date":null,"_trp_automatically_translated_slug_it_it":null,"_trp_automatically_translated_slug_pt_pt":null,"_trp_automatically_translated_slug_zh_cn":null,"_trp_automatically_translated_slug_nl_nl":null,"_trp_automatically_translated_slug_pt_br":null,"_trp_automatically_translated_slug_sv_se":null,"rank_math_analytic_object_id":null,"rank_math_internal_links_processed":null,"_trp_automatically_translated_slug_ro_ro":null,"_trp_automatically_translated_slug_sk_sk":null,"_trp_automatically_translated_slug_bg_bg":null,"_trp_automatically_translated_slug_sl_si":null,"litespeed_vpi_list":["webhostinglogo.png"],"litespeed_vpi_list_mobile":["webhostinglogo.png"],"rank_math_seo_score":"56","rank_math_contentai_score":null,"ilj_limitincominglinks":"","ilj_maxincominglinks":"1","ilj_limitoutgoinglinks":null,"ilj_maxoutgoinglinks":null,"ilj_limitlinksperparagraph":null,"ilj_linksperparagraph":null,"ilj_blacklistdefinition":[],"ilj_linkdefinition":["open source-tools","netzwerkverkehr","cybersicherheit"],"_eb_reusable_block_ids":null,"rank_math_focus_keyword":"Open Source-Tools","rank_math_og_content_image":null,"_yoast_wpseo_metadesc":null,"_yoast_wpseo_content_score":null,"_yoast_wpseo_focuskeywords":null,"_yoast_wpseo_keywordsynonyms":null,"_yoast_wpseo_estimated-reading-time-minutes":null,"rank_math_description":null,"surfer_last_post_update":null,"surfer_last_post_update_direction":null,"surfer_keywords":null,"surfer_location":null,"surfer_draft_id":null,"surfer_permalink_hash":null,"surfer_scrape_ready":null,"_thumbnail_id":"7894","footnotes":null,"_links":{"self":[{"href":"https:\/\/webhosting.de\/da\/wp-json\/wp\/v2\/posts\/7893","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/webhosting.de\/da\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/webhosting.de\/da\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/webhosting.de\/da\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/webhosting.de\/da\/wp-json\/wp\/v2\/comments?post=7893"}],"version-history":[{"count":0,"href":"https:\/\/webhosting.de\/da\/wp-json\/wp\/v2\/posts\/7893\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/webhosting.de\/da\/wp-json\/wp\/v2\/media\/7894"}],"wp:attachment":[{"href":"https:\/\/webhosting.de\/da\/wp-json\/wp\/v2\/media?parent=7893"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/webhosting.de\/da\/wp-json\/wp\/v2\/categories?post=7893"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/webhosting.de\/da\/wp-json\/wp\/v2\/tags?post=7893"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}