{"id":7893,"date":"2021-08-15T16:10:45","date_gmt":"2021-08-15T15:10:45","guid":{"rendered":"https:\/\/webhosting.de\/?p=7893"},"modified":"2021-08-10T16:14:02","modified_gmt":"2021-08-10T15:14:02","slug":"experto-blog-utilizando-herramientas-de-codigo-abierto-para-analizar-el-trafico-de-la-red","status":"publish","type":"post","link":"https:\/\/webhosting.de\/es\/expertenblog-verwenden-von-open-source-tools-fuer-die-analyse-des-netzwerkverkehrs\/","title":{"rendered":"Blog de expertos: Uso de herramientas de c\u00f3digo abierto para analizar el tr\u00e1fico de red"},"content":{"rendered":"<h2><b>Blog de expertos: Uso de herramientas de c\u00f3digo abierto para analizar el tr\u00e1fico de red<\/b><\/h2>\n<p>&nbsp;<\/p>\n<div>\n<div class=\"preview\">El control del tr\u00e1fico de la red es una cuesti\u00f3n especialmente importante hoy en d\u00eda, sobre todo teniendo en cuenta las condiciones impuestas por la pandemia COVID 19 a las pr\u00e1cticas de trabajo a distancia. El malware moderno sortea con \u00e9xito las t\u00e9cnicas de listas blancas y puede ocultar eficazmente su presencia en el sistema. Analicemos c\u00f3mo podemos enfocar la desalentadora tarea de la supervisi\u00f3n de la red.<\/p>\n<p>Mientras los l\u00edmites pol\u00edticos de la inform\u00e1tica se van aclarando (pa\u00edses como China o Rusia intentan crear sus propios ecosistemas que permitan la independencia <a href=\"https:\/\/webhosting.de\/es\/flexoptix-universal-transceiver\/\">Internet<\/a>El proceso es exactamente lo contrario en el entorno corporativo. Los per\u00edmetros se disuelven cada vez m\u00e1s en el \u00e1mbito de la informaci\u00f3n, provocando graves dolores de cabeza a los responsables de la ciberseguridad.<\/p>\n<p>Los problemas est\u00e1n en todas partes. Los profesionales de la ciberseguridad tienen que lidiar con las dificultades de trabajar a distancia con su entorno y dispositivos no confiables, y con la infraestructura en la sombra - Shadow IT. Al otro lado de las barricadas, tenemos modelos de cadena de muerte cada vez m\u00e1s sofisticados y una cuidadosa ofuscaci\u00f3n de los intrusos y de la presencia en la red.<\/p>\n<p>Las herramientas est\u00e1ndar de supervisi\u00f3n de la informaci\u00f3n de ciberseguridad no siempre pueden ofrecer una imagen completa de lo que est\u00e1 ocurriendo. Esto nos lleva a buscar fuentes de informaci\u00f3n adicionales, como el an\u00e1lisis del tr\u00e1fico de la red.<\/p>\n<p>El crecimiento de la TI en la sombra<\/p>\n<p>El concepto de Bring Your Own Device (dispositivos personales utilizados en un entorno corporativo) fue sustituido repentinamente por Work From Your Home Device (un entorno corporativo trasladado a los dispositivos personales).<\/p>\n<p>Los empleados utilizan los ordenadores para acceder a su puesto de trabajo virtual y al correo electr\u00f3nico. Utilizan un tel\u00e9fono personal para la autenticaci\u00f3n multifactorial. Todos sus dispositivos est\u00e1n situados a una distancia cero de los ordenadores potencialmente infectados o <a href=\"https:\/\/webhosting.de\/es\/5-5g-mobilfunkstandard-bei-huawei-bereits-in-planung\/\">IoT<\/a> conectado a una red dom\u00e9stica no fiable. Todos estos factores obligan al personal de seguridad a cambiar sus m\u00e9todos y, en ocasiones, a recurrir al radicalismo de Confianza Cero.<\/p>\n<p>Con la llegada de los microservicios, el crecimiento de la TI en la sombra se ha intensificado. Las organizaciones no disponen de los recursos necesarios para equipar las estaciones de trabajo leg\u00edtimas con software antivirus y herramientas de detecci\u00f3n y procesamiento de amenazas (EDR) y supervisar esta cobertura. El rinc\u00f3n oscuro de la infraestructura se est\u00e1 convirtiendo en un verdadero \"infierno\".<\/p>\n<p>que no proporciona se\u00f1ales sobre eventos de seguridad de la informaci\u00f3n u objetos infectados. Esta \u00e1rea de incertidumbre dificulta significativamente la respuesta a los incidentes emergentes.<\/p>\n<p>Para cualquiera que quiera entender lo que ocurre con la seguridad de la informaci\u00f3n, el SIEM se ha convertido en una piedra angular. Sin embargo, el SIEM no es un ojo que todo lo ve. El bulo del SIEM tambi\u00e9n ha desaparecido. El SIEM, debido a sus recursos y limitaciones l\u00f3gicas, s\u00f3lo ve las cosas que se env\u00edan a la empresa desde un n\u00famero limitado de fuentes y que tambi\u00e9n pueden ser separadas por los hackers.<\/p>\n<p>Ha aumentado el n\u00famero de instaladores maliciosos que utilizan utilidades leg\u00edtimas que ya est\u00e1n en el host: wmic.exe, rgsvr32.exe, hh.exe y muchos otros.<\/p>\n<p>Como resultado, la instalaci\u00f3n de un programa malicioso tiene lugar en varias iteraciones que integran llamadas a utilidades leg\u00edtimas. Por lo tanto, las herramientas de detecci\u00f3n autom\u00e1tica no siempre pueden combinarlas en una cadena de instalaci\u00f3n de un objeto peligroso en el sistema.<\/p>\n<p>Una vez que los atacantes han ganado persistencia en la estaci\u00f3n de trabajo infectada, pueden ocultar sus acciones con mucha precisi\u00f3n en el sistema. En particular, trabajan \"inteligentemente\" con la tala de \u00e1rboles. Por ejemplo <a href=\"https:\/\/webhosting.de\/es\/wordpress-gehackt-bekommen-sie-es-wieder-sicher\/\">limpiar<\/a> no s\u00f3lo registran, sino que los redirigen a un archivo temporal, realizan acciones maliciosas y devuelven el flujo de datos de registro a su estado anterior. De este modo, pueden evitar que se desencadene el escenario de \"archivo de registro eliminado\" en el SIEM.<\/p><\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Expertenblog: Verwenden von Open Source-Tools f\u00fcr die Analyse des Netzwerkverkehrs &nbsp; Die \u00dcberwachung des Netzwerkverkehrs ist heutzutage ein besonders wichtiges Thema, insbesondere angesichts der durch die COVID-19-Pandemie auferlegten Bedingungen f\u00fcr Fernarbeitspraktiken. Moderne Schadprogramme umgehen erfolgreich Whitelist-Techniken und k\u00f6nnen ihre Pr\u00e4senz im System effektiv verbergen. Lassen Sie uns diskutieren, wie wir uns der entmutigenden Aufgabe der [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":7894,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_crdt_document":"","inline_featured_image":false,"footnotes":""},"categories":[996],"tags":[1010,1009,1008],"class_list":["post-7893","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hosting-news","tag-cybersicherheit","tag-netzwerkverkehr","tag-open-source-tools"],"acf":[],"_wp_attached_file":null,"_wp_attachment_metadata":null,"litespeed-optimize-size":null,"litespeed-optimize-set":null,"_elementor_source_image_hash":null,"_wp_attachment_image_alt":null,"stockpack_author_name":null,"stockpack_author_url":null,"stockpack_provider":null,"stockpack_image_url":null,"stockpack_license":null,"stockpack_license_url":null,"stockpack_modification":null,"color":null,"original_id":null,"original_url":null,"original_link":null,"unsplash_location":null,"unsplash_sponsor":null,"unsplash_exif":null,"unsplash_attachment_metadata":null,"_elementor_is_screenshot":null,"surfer_file_name":null,"surfer_file_original_url":null,"envato_tk_source_kit":null,"envato_tk_source_index":null,"envato_tk_manifest":null,"envato_tk_folder_name":null,"envato_tk_builder":null,"envato_elements_download_event":null,"_menu_item_type":null,"_menu_item_menu_item_parent":null,"_menu_item_object_id":null,"_menu_item_object":null,"_menu_item_target":null,"_menu_item_classes":null,"_menu_item_xfn":null,"_menu_item_url":null,"_trp_menu_languages":null,"rank_math_primary_category":"996","rank_math_title":null,"inline_featured_image":null,"_yoast_wpseo_primary_category":null,"rank_math_schema_blogposting":null,"rank_math_schema_videoobject":null,"_oembed_049c719bc4a9f89deaead66a7da9fddc":null,"_oembed_time_049c719bc4a9f89deaead66a7da9fddc":null,"_yoast_wpseo_focuskw":null,"_yoast_wpseo_linkdex":null,"_oembed_27e3473bf8bec795fbeb3a9d38489348":null,"_oembed_c3b0f6959478faf92a1f343d8f96b19e":null,"_trp_translated_slug_en_us":null,"_wp_desired_post_slug":null,"_yoast_wpseo_title":null,"tldname":null,"tldpreis":null,"tldrubrik":null,"tldpolicylink":null,"tldsize":null,"tldregistrierungsdauer":null,"tldtransfer":null,"tldwhoisprivacy":null,"tldregistrarchange":null,"tldregistrantchange":null,"tldwhoisupdate":null,"tldnameserverupdate":null,"tlddeletesofort":null,"tlddeleteexpire":null,"tldumlaute":null,"tldrestore":null,"tldsubcategory":null,"tldbildname":null,"tldbildurl":null,"tldclean":null,"tldcategory":null,"tldpolicy":null,"tldbesonderheiten":null,"tld_bedeutung":null,"_oembed_d167040d816d8f94c072940c8009f5f8":null,"_oembed_b0a0fa59ef14f8870da2c63f2027d064":null,"_oembed_4792fa4dfb2a8f09ab950a73b7f313ba":null,"_oembed_33ceb1fe54a8ab775d9410abf699878d":null,"_oembed_fd7014d14d919b45ec004937c0db9335":null,"_oembed_21a029d076783ec3e8042698c351bd7e":null,"_oembed_be5ea8a0c7b18e658f08cc571a909452":null,"_oembed_a9ca7a298b19f9b48ec5914e010294d2":null,"_oembed_f8db6b27d08a2bb1f920e7647808899a":null,"_oembed_168ebde5096e77d8a89326519af9e022":null,"_oembed_cdb76f1b345b42743edfe25481b6f98f":null,"_oembed_87b0613611ae54e86e8864265404b0a1":null,"_oembed_27aa0e5cf3f1bb4bc416a4641a5ac273":null,"_oembed_time_27aa0e5cf3f1bb4bc416a4641a5ac273":null,"_tldname":null,"_tldclean":null,"_tldpreis":null,"_tldcategory":null,"_tldsubcategory":null,"_tldpolicy":null,"_tldpolicylink":null,"_tldsize":null,"_tldregistrierungsdauer":null,"_tldtransfer":null,"_tldwhoisprivacy":null,"_tldregistrarchange":null,"_tldregistrantchange":null,"_tldwhoisupdate":null,"_tldnameserverupdate":null,"_tlddeletesofort":null,"_tlddeleteexpire":null,"_tldumlaute":null,"_tldrestore":null,"_tldbildname":null,"_tldbildurl":null,"_tld_bedeutung":null,"_tldbesonderheiten":null,"_oembed_ad96e4112edb9f8ffa35731d4098bc6b":null,"_oembed_8357e2b8a2575c74ed5978f262a10126":null,"_oembed_3d5fea5103dd0d22ec5d6a33eff7f863":null,"_eael_widget_elements":null,"_oembed_0d8a206f09633e3d62b95a15a4dd0487":null,"_oembed_time_0d8a206f09633e3d62b95a15a4dd0487":null,"_aioseo_description":null,"_eb_attr":null,"_eb_data_table":null,"_oembed_819a879e7da16dd629cfd15a97334c8a":null,"_oembed_time_819a879e7da16dd629cfd15a97334c8a":null,"_acf_changed":null,"_wpcode_auto_insert":null,"_edit_last":"1","_edit_lock":"1628608424:1","_oembed_e7b913c6c84084ed9702cb4feb012ddd":"{{unknown}}","_oembed_bfde9e10f59a17b85fc8917fa7edf782":"<iframe title=\"Theming Nextcloud in 37 seconds\" width=\"368\" height=\"207\" src=\"https:\/\/www.youtube.com\/embed\/wqRgeFXYUys?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>","_oembed_time_bfde9e10f59a17b85fc8917fa7edf782":"1628608472","_oembed_03514b67990db061d7c4672de26dc514":"<iframe title=\"Gaia X\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/NhqLt_NJ6FA?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>","_oembed_time_03514b67990db061d7c4672de26dc514":"1628608465","rank_math_news_sitemap_robots":null,"rank_math_robots":null,"_eael_post_view_count":"4480","_trp_automatically_translated_slug_ru_ru":null,"_trp_automatically_translated_slug_et":"expert-blog-using-open-source-tools-for-analysis-of-network-traffic","_trp_automatically_translated_slug_lv":"eksperts-blog-izmantot-atverta-izcelsmes-rikus-tiklu-plusmas-analizes-analizei","_trp_automatically_translated_slug_fr_fr":null,"_trp_automatically_translated_slug_en_us":null,"_wp_old_slug":null,"_trp_automatically_translated_slug_da_dk":null,"_trp_automatically_translated_slug_pl_pl":null,"_trp_automatically_translated_slug_es_es":null,"_trp_automatically_translated_slug_hu_hu":null,"_trp_automatically_translated_slug_fi":"expert-blog-using-open-source-tools-for-analysis-of-network-traffic","_trp_automatically_translated_slug_ja":"%e3%82%a8%e3%82%ad%e3%82%b9%e3%83%91%e3%83%bc%e3%83%88%e3%83%bb%e3%83%96%e3%83%ad%e3%82%b0-%e3%83%8d%e3%83%83%e3%83%88%e3%83%af%e3%83%bc%e3%82%af%e3%83%bb%e3%83%88%e3%83%a9%e3%83%92%e3%83%83%e3%82%af","_trp_automatically_translated_slug_lt_lt":null,"_elementor_edit_mode":null,"_elementor_template_type":null,"_elementor_version":null,"_elementor_pro_version":null,"_wp_page_template":"default","_elementor_page_settings":null,"_elementor_data":null,"_elementor_css":null,"_elementor_conditions":null,"_happyaddons_elements_cache":null,"_oembed_75446120c39305f0da0ccd147f6de9cb":"{{unknown}}","_oembed_time_75446120c39305f0da0ccd147f6de9cb":null,"_oembed_3efb2c3e76a18143e7207993a2a6939a":"<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/BREAKING?src=hash&amp;ref_src=twsrc%5Etfw\">#BREAKING<\/a>: Texas takes the lead once more! Today, we\u2019re filing a lawsuit against <a href=\"https:\/\/twitter.com\/hashtag\/Google?src=hash&amp;ref_src=twsrc%5Etfw\">#Google<\/a> for anticompetitive conduct.<br><br>This internet Goliath used its power to manipulate the market, destroy competition, and harm YOU, the consumer. Stay tuned\u2026 <a href=\"https:\/\/t.co\/fdEVEWQb0e\">pic.twitter.com\/fdEVEWQb0e<\/a><\/p>&mdash; Texas Attorney General (@TXAG) <a href=\"https:\/\/twitter.com\/TXAG\/status\/1339283520099856384?ref_src=twsrc%5Etfw\">December 16, 2020<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>","_oembed_time_3efb2c3e76a18143e7207993a2a6939a":"1628608458","_oembed_59808117857ddf57e478a31d79f76e4d":"<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">Happy to follow-on report that a huge chunk of <a href=\"https:\/\/twitter.com\/Flickr?ref_src=twsrc%5Etfw\">@Flickr<\/a> compute just successfully made the transition to Graviton2 <a href=\"https:\/\/twitter.com\/Arm?ref_src=twsrc%5Etfw\">@ARM<\/a> in <a href=\"https:\/\/twitter.com\/awscloud?ref_src=twsrc%5Etfw\">@awscloud<\/a> this afternoon. More services coming shortly. My aim is to get to 100% of non-GPU <a href=\"https:\/\/twitter.com\/SmugMug?ref_src=twsrc%5Etfw\">@SmugMug<\/a> and <a href=\"https:\/\/twitter.com\/Flickr?ref_src=twsrc%5Etfw\">@Flickr<\/a> compute on ARM within the year. <a href=\"https:\/\/t.co\/fwXWdg06xx\">https:\/\/t.co\/fwXWdg06xx<\/a><\/p>&mdash; Don MacAskill (@DonMacAskill) <a href=\"https:\/\/twitter.com\/DonMacAskill\/status\/1314050996486561792?ref_src=twsrc%5Etfw\">October 8, 2020<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>","_oembed_time_59808117857ddf57e478a31d79f76e4d":"1628608459","_oembed_965c5b49aa8d22ce37dfb3bde0268600":"<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"de\" dir=\"ltr\">Der <a href=\"https:\/\/twitter.com\/hashtag\/Finanzausschuss?src=hash&amp;ref_src=twsrc%5Etfw\">#Finanzausschuss<\/a> im <a href=\"https:\/\/twitter.com\/hashtag\/Bundestag?src=hash&amp;ref_src=twsrc%5Etfw\">#Bundestag<\/a> hat das <a href=\"https:\/\/twitter.com\/hashtag\/Jahressteuergesetz?src=hash&amp;ref_src=twsrc%5Etfw\">#Jahressteuergesetz<\/a> beschlossen. Damit wurde auch die <a href=\"https:\/\/twitter.com\/hashtag\/Gemeinn%C3%BCtzigkeit?src=hash&amp;ref_src=twsrc%5Etfw\">#Gemeinn\u00fctzigkeit<\/a> f\u00fcr <a href=\"https:\/\/twitter.com\/hashtag\/Freifunk?src=hash&amp;ref_src=twsrc%5Etfw\">#Freifunk<\/a> Initiativen beschlossen. Das ganze geht jetzt in der kommenden Woche ins Plenum zur Abstimmung und direkt in den <a href=\"https:\/\/twitter.com\/hashtag\/Bundesrat?src=hash&amp;ref_src=twsrc%5Etfw\">#Bundesrat<\/a><\/p>&mdash; Jens Zimmermann (@JensZSPD) <a href=\"https:\/\/twitter.com\/JensZSPD\/status\/1336581821706989568?ref_src=twsrc%5Etfw\">December 9, 2020<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>","_oembed_time_965c5b49aa8d22ce37dfb3bde0268600":"1628608461","_oembed_81002f7ee3604f645db4ebcfd1912acf":"<iframe title=\"Netzetag bei der Telekom: Antennen, Breitband, Glasfaser\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/6_NTa3VCRFo?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>","_oembed_time_81002f7ee3604f645db4ebcfd1912acf":"1628608461","_elementor_screenshot":null,"_oembed_7ea3429961cf98fa85da9747683af827":"<iframe title=\"Firewall: Wie du die Web Application Firewall im Plesk Men\u00fc verwendest und deine Website sch\u00fctzt.\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/CzAjqyJtEaw?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>","_oembed_time_7ea3429961cf98fa85da9747683af827":"1628608443","_elementor_controls_usage":null,"_elementor_page_assets":[],"_elementor_screenshot_failed":null,"theplus_transient_widgets":null,"_eael_custom_js":null,"_wp_old_date":null,"_trp_automatically_translated_slug_it_it":null,"_trp_automatically_translated_slug_pt_pt":null,"_trp_automatically_translated_slug_zh_cn":null,"_trp_automatically_translated_slug_nl_nl":null,"_trp_automatically_translated_slug_pt_br":null,"_trp_automatically_translated_slug_sv_se":null,"rank_math_analytic_object_id":null,"rank_math_internal_links_processed":null,"_trp_automatically_translated_slug_ro_ro":null,"_trp_automatically_translated_slug_sk_sk":null,"_trp_automatically_translated_slug_bg_bg":null,"_trp_automatically_translated_slug_sl_si":null,"litespeed_vpi_list":["webhostinglogo.png"],"litespeed_vpi_list_mobile":["webhostinglogo.png"],"rank_math_seo_score":"56","rank_math_contentai_score":null,"ilj_limitincominglinks":"","ilj_maxincominglinks":"1","ilj_limitoutgoinglinks":null,"ilj_maxoutgoinglinks":null,"ilj_limitlinksperparagraph":null,"ilj_linksperparagraph":null,"ilj_blacklistdefinition":[],"ilj_linkdefinition":["open source-tools","netzwerkverkehr","cybersicherheit"],"_eb_reusable_block_ids":null,"rank_math_focus_keyword":"Open Source-Tools","rank_math_og_content_image":null,"_yoast_wpseo_metadesc":null,"_yoast_wpseo_content_score":null,"_yoast_wpseo_focuskeywords":null,"_yoast_wpseo_keywordsynonyms":null,"_yoast_wpseo_estimated-reading-time-minutes":null,"rank_math_description":null,"surfer_last_post_update":null,"surfer_last_post_update_direction":null,"surfer_keywords":null,"surfer_location":null,"surfer_draft_id":null,"surfer_permalink_hash":null,"surfer_scrape_ready":null,"_thumbnail_id":"7894","footnotes":null,"_links":{"self":[{"href":"https:\/\/webhosting.de\/es\/wp-json\/wp\/v2\/posts\/7893","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/webhosting.de\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/webhosting.de\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/webhosting.de\/es\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/webhosting.de\/es\/wp-json\/wp\/v2\/comments?post=7893"}],"version-history":[{"count":0,"href":"https:\/\/webhosting.de\/es\/wp-json\/wp\/v2\/posts\/7893\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/webhosting.de\/es\/wp-json\/wp\/v2\/media\/7894"}],"wp:attachment":[{"href":"https:\/\/webhosting.de\/es\/wp-json\/wp\/v2\/media?parent=7893"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/webhosting.de\/es\/wp-json\/wp\/v2\/categories?post=7893"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/webhosting.de\/es\/wp-json\/wp\/v2\/tags?post=7893"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}