{"id":7893,"date":"2021-08-15T16:10:45","date_gmt":"2021-08-15T15:10:45","guid":{"rendered":"https:\/\/webhosting.de\/?p=7893"},"modified":"2021-08-10T16:14:02","modified_gmt":"2021-08-10T15:14:02","slug":"expert-blog-using-open-source-tools-for-analysis-of-network-traffic-2","status":"publish","type":"post","link":"https:\/\/webhosting.de\/fr\/expertenblog-verwenden-von-open-source-tools-fuer-die-analyse-des-netzwerkverkehrs\/","title":{"rendered":"Blog d'experts : Utilisation d'outils open source pour analyser le trafic r\u00e9seau"},"content":{"rendered":"<h2><b>Blog d'experts : Utilisation d'outils open source pour analyser le trafic r\u00e9seau<\/b><\/h2>\n<p>&nbsp;<\/p>\n<div>\n<div class=\"preview\">La surveillance du trafic r\u00e9seau est une question particuli\u00e8rement importante aujourd'hui, notamment en raison des conditions impos\u00e9es par la pand\u00e9mie COVID 19 aux pratiques de travail \u00e0 distance. Les logiciels malveillants modernes parviennent \u00e0 contourner les techniques de mise en liste blanche et \u00e0 dissimuler efficacement leur pr\u00e9sence dans le syst\u00e8me. Voyons comment nous pouvons aborder la t\u00e2che ardue de la surveillance du r\u00e9seau.<\/p>\n<p>Alors que les fronti\u00e8res politiques des technologies de l'information se pr\u00e9cisent (des pays comme la Chine ou la Russie tentent de cr\u00e9er leurs propres \u00e9cosyst\u00e8mes qui permettent \u00e0 des <a href=\"https:\/\/webhosting.de\/fr\/flexoptix-universal-transceiver\/\">Internet<\/a>les services et les logiciels sp\u00e9cialis\u00e9s), le processus est exactement l'inverse dans l'environnement de l'entreprise. Les p\u00e9rim\u00e8tres se dissolvent de plus en plus dans le domaine de l'information, ce qui cause de s\u00e9rieux maux de t\u00eate aux responsables de la cybers\u00e9curit\u00e9.<\/p>\n<p>Les probl\u00e8mes sont partout. Les professionnels de la cybers\u00e9curit\u00e9 doivent faire face aux difficult\u00e9s du travail \u00e0 distance avec un environnement et des appareils non fiables, ainsi qu'avec une infrastructure fant\u00f4me - Shadow IT. De l'autre c\u00f4t\u00e9 des barricades, nous disposons de mod\u00e8les de cha\u00eenes d'\u00e9limination de plus en plus sophistiqu\u00e9s et d'une dissimulation soigneuse des intrus et de la pr\u00e9sence du r\u00e9seau.<\/p>\n<p>Les outils standard de surveillance des informations de cybers\u00e9curit\u00e9 ne peuvent pas toujours donner une image compl\u00e8te de ce qui se passe. Cela nous am\u00e8ne \u00e0 rechercher des sources d'information suppl\u00e9mentaires, telles que l'analyse du trafic r\u00e9seau.<\/p>\n<p>La croissance du Shadow IT<\/p>\n<p>Le concept de Bring Your Own Device (appareils personnels utilis\u00e9s dans un environnement d'entreprise) a soudainement \u00e9t\u00e9 remplac\u00e9 par Work From Your Home Device (un environnement d'entreprise transf\u00e9r\u00e9 sur des appareils personnels).<\/p>\n<p>Les employ\u00e9s utilisent des PC pour acc\u00e9der \u00e0 leur lieu de travail virtuel et \u00e0 leur courrier \u00e9lectronique. Ils utilisent un t\u00e9l\u00e9phone personnel pour l'authentification multifactorielle. Tous leurs appareils sont situ\u00e9s \u00e0 une distance nulle d'ordinateurs ou d'appareils potentiellement infect\u00e9s. <a href=\"https:\/\/webhosting.de\/fr\/5-5g-mobilfunkstandard-bei-huawei-bereits-in-planung\/\">IoT<\/a> connect\u00e9 \u00e0 un r\u00e9seau domestique non fiable. Tous ces facteurs obligent le personnel de s\u00e9curit\u00e9 \u00e0 changer ses m\u00e9thodes et \u00e0 se tourner parfois vers le radicalisme de la confiance z\u00e9ro.<\/p>\n<p>Avec l'av\u00e8nement des microservices, la croissance du Shadow IT s'est intensifi\u00e9e. Les organisations ne disposent pas des ressources n\u00e9cessaires pour \u00e9quiper les postes de travail l\u00e9gitimes de logiciels antivirus et d'outils de d\u00e9tection et de traitement des menaces (EDR) et pour surveiller cette couverture. Le coin sombre de l'infrastructure est en train de devenir un v\u00e9ritable \"enfer\".<\/p>\n<p>qui ne fournit pas de signaux sur les \u00e9v\u00e9nements de s\u00e9curit\u00e9 de l'information ou les objets infect\u00e9s. Cette zone d'incertitude entrave consid\u00e9rablement la r\u00e9ponse aux incidents \u00e9mergents.<\/p>\n<p>Pour quiconque veut comprendre ce qui se passe en mati\u00e8re de s\u00e9curit\u00e9 de l'information, le SIEM est devenu une pierre angulaire. Cependant, le SIEM n'est pas un \u0153il omnipr\u00e9sent. Le canular du SIEM a \u00e9galement disparu. Le SIEM, en raison de ses ressources et de ses limites logiques, ne voit que les \u00e9l\u00e9ments qui sont envoy\u00e9s \u00e0 l'entreprise \u00e0 partir d'un nombre limit\u00e9 de sources et qui peuvent \u00e9galement \u00eatre s\u00e9par\u00e9s par des pirates.<\/p>\n<p>Le nombre d'installateurs malveillants utilisant des utilitaires l\u00e9gitimes d\u00e9j\u00e0 pr\u00e9sents sur l'h\u00f4te a augment\u00e9 : wmic.exe, rgsvr32.exe, hh.exe et bien d'autres.<\/p>\n<p>Par cons\u00e9quent, l'installation d'un programme malveillant se d\u00e9roule en plusieurs it\u00e9rations qui int\u00e8grent des appels \u00e0 des utilitaires l\u00e9gitimes. Par cons\u00e9quent, les outils de d\u00e9tection automatique ne peuvent pas toujours les combiner en une cha\u00eene d'installation d'un objet dangereux dans le syst\u00e8me.<\/p>\n<p>Une fois que les attaquants ont obtenu la persistance sur le poste de travail infect\u00e9, ils peuvent dissimuler tr\u00e8s pr\u00e9cis\u00e9ment leurs actions dans le syst\u00e8me. En particulier, ils travaillent \"intelligemment\" avec l'enregistrement. Par exemple <a href=\"https:\/\/webhosting.de\/fr\/wordpress-gehackt-bekommen-sie-es-wieder-sicher\/\">nettoyer<\/a> ils ne se contentent pas des journaux, mais les redirigent vers un fichier temporaire, ex\u00e9cutent des actions malveillantes et ram\u00e8nent le flux de donn\u00e9es des journaux \u00e0 son \u00e9tat ant\u00e9rieur. De cette fa\u00e7on, ils peuvent \u00e9viter de d\u00e9clencher le sc\u00e9nario \"fichier journal supprim\u00e9\" sur le SIEM.<\/p><\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Expertenblog: Verwenden von Open Source-Tools f\u00fcr die Analyse des Netzwerkverkehrs &nbsp; Die \u00dcberwachung des Netzwerkverkehrs ist heutzutage ein besonders wichtiges Thema, insbesondere angesichts der durch die COVID-19-Pandemie auferlegten Bedingungen f\u00fcr Fernarbeitspraktiken. Moderne Schadprogramme umgehen erfolgreich Whitelist-Techniken und k\u00f6nnen ihre Pr\u00e4senz im System effektiv verbergen. Lassen Sie uns diskutieren, wie wir uns der entmutigenden Aufgabe der [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":7894,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_crdt_document":"","inline_featured_image":false,"footnotes":""},"categories":[996],"tags":[1010,1009,1008],"class_list":["post-7893","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hosting-news","tag-cybersicherheit","tag-netzwerkverkehr","tag-open-source-tools"],"acf":[],"_wp_attached_file":null,"_wp_attachment_metadata":null,"litespeed-optimize-size":null,"litespeed-optimize-set":null,"_elementor_source_image_hash":null,"_wp_attachment_image_alt":null,"stockpack_author_name":null,"stockpack_author_url":null,"stockpack_provider":null,"stockpack_image_url":null,"stockpack_license":null,"stockpack_license_url":null,"stockpack_modification":null,"color":null,"original_id":null,"original_url":null,"original_link":null,"unsplash_location":null,"unsplash_sponsor":null,"unsplash_exif":null,"unsplash_attachment_metadata":null,"_elementor_is_screenshot":null,"surfer_file_name":null,"surfer_file_original_url":null,"envato_tk_source_kit":null,"envato_tk_source_index":null,"envato_tk_manifest":null,"envato_tk_folder_name":null,"envato_tk_builder":null,"envato_elements_download_event":null,"_menu_item_type":null,"_menu_item_menu_item_parent":null,"_menu_item_object_id":null,"_menu_item_object":null,"_menu_item_target":null,"_menu_item_classes":null,"_menu_item_xfn":null,"_menu_item_url":null,"_trp_menu_languages":null,"rank_math_primary_category":"996","rank_math_title":null,"inline_featured_image":null,"_yoast_wpseo_primary_category":null,"rank_math_schema_blogposting":null,"rank_math_schema_videoobject":null,"_oembed_049c719bc4a9f89deaead66a7da9fddc":null,"_oembed_time_049c719bc4a9f89deaead66a7da9fddc":null,"_yoast_wpseo_focuskw":null,"_yoast_wpseo_linkdex":null,"_oembed_27e3473bf8bec795fbeb3a9d38489348":null,"_oembed_c3b0f6959478faf92a1f343d8f96b19e":null,"_trp_translated_slug_en_us":null,"_wp_desired_post_slug":null,"_yoast_wpseo_title":null,"tldname":null,"tldpreis":null,"tldrubrik":null,"tldpolicylink":null,"tldsize":null,"tldregistrierungsdauer":null,"tldtransfer":null,"tldwhoisprivacy":null,"tldregistrarchange":null,"tldregistrantchange":null,"tldwhoisupdate":null,"tldnameserverupdate":null,"tlddeletesofort":null,"tlddeleteexpire":null,"tldumlaute":null,"tldrestore":null,"tldsubcategory":null,"tldbildname":null,"tldbildurl":null,"tldclean":null,"tldcategory":null,"tldpolicy":null,"tldbesonderheiten":null,"tld_bedeutung":null,"_oembed_d167040d816d8f94c072940c8009f5f8":null,"_oembed_b0a0fa59ef14f8870da2c63f2027d064":null,"_oembed_4792fa4dfb2a8f09ab950a73b7f313ba":null,"_oembed_33ceb1fe54a8ab775d9410abf699878d":null,"_oembed_fd7014d14d919b45ec004937c0db9335":null,"_oembed_21a029d076783ec3e8042698c351bd7e":null,"_oembed_be5ea8a0c7b18e658f08cc571a909452":null,"_oembed_a9ca7a298b19f9b48ec5914e010294d2":null,"_oembed_f8db6b27d08a2bb1f920e7647808899a":null,"_oembed_168ebde5096e77d8a89326519af9e022":null,"_oembed_cdb76f1b345b42743edfe25481b6f98f":null,"_oembed_87b0613611ae54e86e8864265404b0a1":null,"_oembed_27aa0e5cf3f1bb4bc416a4641a5ac273":null,"_oembed_time_27aa0e5cf3f1bb4bc416a4641a5ac273":null,"_tldname":null,"_tldclean":null,"_tldpreis":null,"_tldcategory":null,"_tldsubcategory":null,"_tldpolicy":null,"_tldpolicylink":null,"_tldsize":null,"_tldregistrierungsdauer":null,"_tldtransfer":null,"_tldwhoisprivacy":null,"_tldregistrarchange":null,"_tldregistrantchange":null,"_tldwhoisupdate":null,"_tldnameserverupdate":null,"_tlddeletesofort":null,"_tlddeleteexpire":null,"_tldumlaute":null,"_tldrestore":null,"_tldbildname":null,"_tldbildurl":null,"_tld_bedeutung":null,"_tldbesonderheiten":null,"_oembed_ad96e4112edb9f8ffa35731d4098bc6b":null,"_oembed_8357e2b8a2575c74ed5978f262a10126":null,"_oembed_3d5fea5103dd0d22ec5d6a33eff7f863":null,"_eael_widget_elements":null,"_oembed_0d8a206f09633e3d62b95a15a4dd0487":null,"_oembed_time_0d8a206f09633e3d62b95a15a4dd0487":null,"_aioseo_description":null,"_eb_attr":null,"_eb_data_table":null,"_oembed_819a879e7da16dd629cfd15a97334c8a":null,"_oembed_time_819a879e7da16dd629cfd15a97334c8a":null,"_acf_changed":null,"_wpcode_auto_insert":null,"_edit_last":"1","_edit_lock":"1628608424:1","_oembed_e7b913c6c84084ed9702cb4feb012ddd":"{{unknown}}","_oembed_bfde9e10f59a17b85fc8917fa7edf782":"<iframe title=\"Theming Nextcloud in 37 seconds\" width=\"368\" height=\"207\" src=\"https:\/\/www.youtube.com\/embed\/wqRgeFXYUys?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>","_oembed_time_bfde9e10f59a17b85fc8917fa7edf782":"1628608472","_oembed_03514b67990db061d7c4672de26dc514":"<iframe title=\"Gaia X\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/NhqLt_NJ6FA?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>","_oembed_time_03514b67990db061d7c4672de26dc514":"1628608465","rank_math_news_sitemap_robots":null,"rank_math_robots":null,"_eael_post_view_count":"4480","_trp_automatically_translated_slug_ru_ru":null,"_trp_automatically_translated_slug_et":"expert-blog-using-open-source-tools-for-analysis-of-network-traffic","_trp_automatically_translated_slug_lv":"eksperts-blog-izmantot-atverta-izcelsmes-rikus-tiklu-plusmas-analizes-analizei","_trp_automatically_translated_slug_fr_fr":null,"_trp_automatically_translated_slug_en_us":null,"_wp_old_slug":null,"_trp_automatically_translated_slug_da_dk":null,"_trp_automatically_translated_slug_pl_pl":null,"_trp_automatically_translated_slug_es_es":null,"_trp_automatically_translated_slug_hu_hu":null,"_trp_automatically_translated_slug_fi":"expert-blog-using-open-source-tools-for-analysis-of-network-traffic","_trp_automatically_translated_slug_ja":"%e3%82%a8%e3%82%ad%e3%82%b9%e3%83%91%e3%83%bc%e3%83%88%e3%83%bb%e3%83%96%e3%83%ad%e3%82%b0-%e3%83%8d%e3%83%83%e3%83%88%e3%83%af%e3%83%bc%e3%82%af%e3%83%bb%e3%83%88%e3%83%a9%e3%83%92%e3%83%83%e3%82%af","_trp_automatically_translated_slug_lt_lt":null,"_elementor_edit_mode":null,"_elementor_template_type":null,"_elementor_version":null,"_elementor_pro_version":null,"_wp_page_template":"default","_elementor_page_settings":null,"_elementor_data":null,"_elementor_css":null,"_elementor_conditions":null,"_happyaddons_elements_cache":null,"_oembed_75446120c39305f0da0ccd147f6de9cb":"{{unknown}}","_oembed_time_75446120c39305f0da0ccd147f6de9cb":null,"_oembed_3efb2c3e76a18143e7207993a2a6939a":"<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/BREAKING?src=hash&amp;ref_src=twsrc%5Etfw\">#BREAKING<\/a>: Texas takes the lead once more! Today, we\u2019re filing a lawsuit against <a href=\"https:\/\/twitter.com\/hashtag\/Google?src=hash&amp;ref_src=twsrc%5Etfw\">#Google<\/a> for anticompetitive conduct.<br><br>This internet Goliath used its power to manipulate the market, destroy competition, and harm YOU, the consumer. Stay tuned\u2026 <a href=\"https:\/\/t.co\/fdEVEWQb0e\">pic.twitter.com\/fdEVEWQb0e<\/a><\/p>&mdash; Texas Attorney General (@TXAG) <a href=\"https:\/\/twitter.com\/TXAG\/status\/1339283520099856384?ref_src=twsrc%5Etfw\">December 16, 2020<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>","_oembed_time_3efb2c3e76a18143e7207993a2a6939a":"1628608458","_oembed_59808117857ddf57e478a31d79f76e4d":"<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">Happy to follow-on report that a huge chunk of <a href=\"https:\/\/twitter.com\/Flickr?ref_src=twsrc%5Etfw\">@Flickr<\/a> compute just successfully made the transition to Graviton2 <a href=\"https:\/\/twitter.com\/Arm?ref_src=twsrc%5Etfw\">@ARM<\/a> in <a href=\"https:\/\/twitter.com\/awscloud?ref_src=twsrc%5Etfw\">@awscloud<\/a> this afternoon. More services coming shortly. My aim is to get to 100% of non-GPU <a href=\"https:\/\/twitter.com\/SmugMug?ref_src=twsrc%5Etfw\">@SmugMug<\/a> and <a href=\"https:\/\/twitter.com\/Flickr?ref_src=twsrc%5Etfw\">@Flickr<\/a> compute on ARM within the year. <a href=\"https:\/\/t.co\/fwXWdg06xx\">https:\/\/t.co\/fwXWdg06xx<\/a><\/p>&mdash; Don MacAskill (@DonMacAskill) <a href=\"https:\/\/twitter.com\/DonMacAskill\/status\/1314050996486561792?ref_src=twsrc%5Etfw\">October 8, 2020<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>","_oembed_time_59808117857ddf57e478a31d79f76e4d":"1628608459","_oembed_965c5b49aa8d22ce37dfb3bde0268600":"<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"de\" dir=\"ltr\">Der <a href=\"https:\/\/twitter.com\/hashtag\/Finanzausschuss?src=hash&amp;ref_src=twsrc%5Etfw\">#Finanzausschuss<\/a> im <a href=\"https:\/\/twitter.com\/hashtag\/Bundestag?src=hash&amp;ref_src=twsrc%5Etfw\">#Bundestag<\/a> hat das <a href=\"https:\/\/twitter.com\/hashtag\/Jahressteuergesetz?src=hash&amp;ref_src=twsrc%5Etfw\">#Jahressteuergesetz<\/a> beschlossen. Damit wurde auch die <a href=\"https:\/\/twitter.com\/hashtag\/Gemeinn%C3%BCtzigkeit?src=hash&amp;ref_src=twsrc%5Etfw\">#Gemeinn\u00fctzigkeit<\/a> f\u00fcr <a href=\"https:\/\/twitter.com\/hashtag\/Freifunk?src=hash&amp;ref_src=twsrc%5Etfw\">#Freifunk<\/a> Initiativen beschlossen. Das ganze geht jetzt in der kommenden Woche ins Plenum zur Abstimmung und direkt in den <a href=\"https:\/\/twitter.com\/hashtag\/Bundesrat?src=hash&amp;ref_src=twsrc%5Etfw\">#Bundesrat<\/a><\/p>&mdash; Jens Zimmermann (@JensZSPD) <a href=\"https:\/\/twitter.com\/JensZSPD\/status\/1336581821706989568?ref_src=twsrc%5Etfw\">December 9, 2020<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>","_oembed_time_965c5b49aa8d22ce37dfb3bde0268600":"1628608461","_oembed_81002f7ee3604f645db4ebcfd1912acf":"<iframe title=\"Netzetag bei der Telekom: Antennen, Breitband, Glasfaser\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/6_NTa3VCRFo?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>","_oembed_time_81002f7ee3604f645db4ebcfd1912acf":"1628608461","_elementor_screenshot":null,"_oembed_7ea3429961cf98fa85da9747683af827":"<iframe title=\"Firewall: Wie du die Web Application Firewall im Plesk Men\u00fc verwendest und deine Website sch\u00fctzt.\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/CzAjqyJtEaw?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>","_oembed_time_7ea3429961cf98fa85da9747683af827":"1628608443","_elementor_controls_usage":null,"_elementor_page_assets":[],"_elementor_screenshot_failed":null,"theplus_transient_widgets":null,"_eael_custom_js":null,"_wp_old_date":null,"_trp_automatically_translated_slug_it_it":null,"_trp_automatically_translated_slug_pt_pt":null,"_trp_automatically_translated_slug_zh_cn":null,"_trp_automatically_translated_slug_nl_nl":null,"_trp_automatically_translated_slug_pt_br":null,"_trp_automatically_translated_slug_sv_se":null,"rank_math_analytic_object_id":null,"rank_math_internal_links_processed":null,"_trp_automatically_translated_slug_ro_ro":null,"_trp_automatically_translated_slug_sk_sk":null,"_trp_automatically_translated_slug_bg_bg":null,"_trp_automatically_translated_slug_sl_si":null,"litespeed_vpi_list":["webhostinglogo.png"],"litespeed_vpi_list_mobile":["webhostinglogo.png"],"rank_math_seo_score":"56","rank_math_contentai_score":null,"ilj_limitincominglinks":"","ilj_maxincominglinks":"1","ilj_limitoutgoinglinks":null,"ilj_maxoutgoinglinks":null,"ilj_limitlinksperparagraph":null,"ilj_linksperparagraph":null,"ilj_blacklistdefinition":[],"ilj_linkdefinition":["open source-tools","netzwerkverkehr","cybersicherheit"],"_eb_reusable_block_ids":null,"rank_math_focus_keyword":"Open Source-Tools","rank_math_og_content_image":null,"_yoast_wpseo_metadesc":null,"_yoast_wpseo_content_score":null,"_yoast_wpseo_focuskeywords":null,"_yoast_wpseo_keywordsynonyms":null,"_yoast_wpseo_estimated-reading-time-minutes":null,"rank_math_description":null,"surfer_last_post_update":null,"surfer_last_post_update_direction":null,"surfer_keywords":null,"surfer_location":null,"surfer_draft_id":null,"surfer_permalink_hash":null,"surfer_scrape_ready":null,"_thumbnail_id":"7894","footnotes":null,"_links":{"self":[{"href":"https:\/\/webhosting.de\/fr\/wp-json\/wp\/v2\/posts\/7893","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/webhosting.de\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/webhosting.de\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/webhosting.de\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/webhosting.de\/fr\/wp-json\/wp\/v2\/comments?post=7893"}],"version-history":[{"count":0,"href":"https:\/\/webhosting.de\/fr\/wp-json\/wp\/v2\/posts\/7893\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/webhosting.de\/fr\/wp-json\/wp\/v2\/media\/7894"}],"wp:attachment":[{"href":"https:\/\/webhosting.de\/fr\/wp-json\/wp\/v2\/media?parent=7893"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/webhosting.de\/fr\/wp-json\/wp\/v2\/categories?post=7893"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/webhosting.de\/fr\/wp-json\/wp\/v2\/tags?post=7893"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}