{"id":7893,"date":"2021-08-15T16:10:45","date_gmt":"2021-08-15T15:10:45","guid":{"rendered":"https:\/\/webhosting.de\/?p=7893"},"modified":"2021-08-10T16:14:02","modified_gmt":"2021-08-10T15:14:02","slug":"expert-blog-using-open-source-tools-for-analysis-of-network-traffic","status":"publish","type":"post","link":"https:\/\/webhosting.de\/sv\/expertenblog-verwenden-von-open-source-tools-fuer-die-analyse-des-netzwerkverkehrs\/","title":{"rendered":"Expertblogg: Anv\u00e4nda verktyg med \u00f6ppen k\u00e4llkod f\u00f6r att analysera n\u00e4tverkstrafik"},"content":{"rendered":"<h2><b>Expertblogg: Anv\u00e4nda verktyg med \u00f6ppen k\u00e4llkod f\u00f6r att analysera n\u00e4tverkstrafik<\/b><\/h2>\n<p>&nbsp;<\/p>\n<div>\n<div class=\"preview\">\u00d6vervakning av n\u00e4tverkstrafiken \u00e4r en s\u00e4rskilt viktig fr\u00e5ga i dag, s\u00e4rskilt med tanke p\u00e5 de villkor som COVID 19-pandemin st\u00e4ller p\u00e5 distansarbete. Modern skadlig kod kringg\u00e5r framg\u00e5ngsrikt vitlistningstekniker och kan effektivt d\u00f6lja sin n\u00e4rvaro i systemet. L\u00e5t oss diskutera hur vi kan ta oss an den skr\u00e4mmande uppgiften med n\u00e4tverks\u00f6vervakning.<\/p>\n<p>Medan de politiska IT-gr\u00e4nserna blir allt tydligare (l\u00e4nder som Kina och Ryssland f\u00f6rs\u00f6ker skapa egna ekosystem som till\u00e5ter oberoende <a href=\"https:\/\/webhosting.de\/sv\/flexoptix-universal-transceiver\/\">Internet<\/a>, specialiserade tj\u00e4nster och mjukvara), \u00e4r processen precis tv\u00e4rtom i f\u00f6retagsmilj\u00f6n. Perimeterna l\u00f6ses upp alltmer inom informationsomr\u00e5det, vilket orsakar allvarliga problem f\u00f6r cybers\u00e4kerhetsansvariga.<\/p>\n<p>Problemen finns \u00f6verallt. Cybers\u00e4kerhetsexperter m\u00e5ste hantera sv\u00e5righeterna med att arbeta p\u00e5 distans i en milj\u00f6 och med enheter som inte \u00e4r betrodda, och med skugginfrastruktur - Shadow IT. P\u00e5 andra sidan barrikaderna har vi alltmer sofistikerade modeller f\u00f6r d\u00f6dskedjor och noggrann d\u00f6ljning av inkr\u00e4ktare och n\u00e4tverksn\u00e4rvaro.<\/p>\n<p>Standardverktyg f\u00f6r \u00f6vervakning av information om cybers\u00e4kerhet kan inte alltid ge en fullst\u00e4ndig bild av vad som h\u00e4nder. Detta leder till att vi m\u00e5ste s\u00f6ka efter ytterligare informationsk\u00e4llor, t.ex. analys av n\u00e4tverkstrafik.<\/p>\n<p>Tillv\u00e4xten av skugg-IT<\/p>\n<p>Begreppet Bring Your Own Device (personliga enheter som anv\u00e4nds i en f\u00f6retagsmilj\u00f6) ersattes pl\u00f6tsligt av Work From Your Home Device (en f\u00f6retagsmilj\u00f6 som \u00f6verf\u00f6rs till personliga enheter).<\/p>\n<p>Anst\u00e4llda anv\u00e4nder datorer f\u00f6r att f\u00e5 tillg\u00e5ng till sin virtuella arbetsplats och e-post. De anv\u00e4nder en personlig telefon f\u00f6r flerfaktorsautentisering. Alla deras enheter \u00e4r placerade p\u00e5 ett nollavst\u00e5nd fr\u00e5n potentiellt infekterade datorer eller <a href=\"https:\/\/webhosting.de\/sv\/5-5g-mobilfunkstandard-bei-huawei-bereits-in-planung\/\">IoT<\/a> \u00e4r ansluten till ett icke tillf\u00f6rlitligt hemn\u00e4tverk. Alla dessa faktorer tvingar s\u00e4kerhetspersonalen att \u00e4ndra sina metoder och ibland v\u00e4nda sig till radikalismen Zero Trust.<\/p>\n<p>I och med inf\u00f6randet av mikrotj\u00e4nster har tillv\u00e4xten av skugg-IT intensifierats. Organisationer har inte resurser att utrusta legitima arbetsstationer med antivirusprogram och verktyg f\u00f6r att uppt\u00e4cka och bearbeta hot (EDR) och \u00f6vervaka denna t\u00e4ckning. Infrastrukturens m\u00f6rka h\u00f6rn h\u00e5ller p\u00e5 att bli ett riktigt \"helvete\".<\/p>\n<p>som inte ger signaler om informationss\u00e4kerhetsh\u00e4ndelser eller infekterade objekt. Denna os\u00e4kerhet f\u00f6rsv\u00e5rar avsev\u00e4rt reaktionen p\u00e5 nya incidenter.<\/p>\n<p>F\u00f6r alla som vill f\u00f6rst\u00e5 vad som h\u00e4nder med informationss\u00e4kerheten har SIEM blivit en h\u00f6rnsten. SIEM \u00e4r dock inte ett allseende \u00f6ga. SIEM-jippot \u00e4r ocks\u00e5 borta. SIEM ser p\u00e5 grund av sina resurser och logiska begr\u00e4nsningar endast saker som skickas till f\u00f6retaget fr\u00e5n ett begr\u00e4nsat antal k\u00e4llor och som ocks\u00e5 kan avskiljas av hackare.<\/p>\n<p>Antalet skadliga installationsprogram som anv\u00e4nder legitima verktyg som redan finns p\u00e5 v\u00e4rden har \u00f6kat: wmic.exe, rgsvr32.exe, hh.exe och m\u00e5nga andra.<\/p>\n<p>Detta g\u00f6r att installationen av ett skadligt program sker i flera omg\u00e5ngar som integrerar anrop till legitima verktyg. D\u00e4rf\u00f6r kan automatiska uppt\u00e4cktsverktyg inte alltid kombinera dem till en kedja av installation av ett farligt objekt i systemet.<\/p>\n<p>N\u00e4r angriparna har f\u00e5tt en l\u00e5ngvarig n\u00e4rvaro p\u00e5 den infekterade arbetsstationen kan de d\u00f6lja sina handlingar p\u00e5 ett mycket exakt s\u00e4tt i systemet. I synnerhet arbetar de \"smart\" med loggning. Till exempel <a href=\"https:\/\/webhosting.de\/sv\/wordpress-gehackt-bekommen-sie-es-wieder-sicher\/\">rensa<\/a> De loggar inte bara, utan omdirigerar dem till en tillf\u00e4llig fil, utf\u00f6r skadliga \u00e5tg\u00e4rder och \u00e5terst\u00e4ller loggdatastr\u00f6mmen till sitt tidigare tillst\u00e5nd. P\u00e5 s\u00e5 s\u00e4tt kan de undvika att utl\u00f6sa scenariot \"loggfil raderad\" i SIEM.<\/p><\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Expertenblog: Verwenden von Open Source-Tools f\u00fcr die Analyse des Netzwerkverkehrs &nbsp; Die \u00dcberwachung des Netzwerkverkehrs ist heutzutage ein besonders wichtiges Thema, insbesondere angesichts der durch die COVID-19-Pandemie auferlegten Bedingungen f\u00fcr Fernarbeitspraktiken. Moderne Schadprogramme umgehen erfolgreich Whitelist-Techniken und k\u00f6nnen ihre Pr\u00e4senz im System effektiv verbergen. Lassen Sie uns diskutieren, wie wir uns der entmutigenden Aufgabe der [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":7894,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_crdt_document":"","inline_featured_image":false,"footnotes":""},"categories":[996],"tags":[1010,1009,1008],"class_list":["post-7893","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hosting-news","tag-cybersicherheit","tag-netzwerkverkehr","tag-open-source-tools"],"acf":[],"_wp_attached_file":null,"_wp_attachment_metadata":null,"litespeed-optimize-size":null,"litespeed-optimize-set":null,"_elementor_source_image_hash":null,"_wp_attachment_image_alt":null,"stockpack_author_name":null,"stockpack_author_url":null,"stockpack_provider":null,"stockpack_image_url":null,"stockpack_license":null,"stockpack_license_url":null,"stockpack_modification":null,"color":null,"original_id":null,"original_url":null,"original_link":null,"unsplash_location":null,"unsplash_sponsor":null,"unsplash_exif":null,"unsplash_attachment_metadata":null,"_elementor_is_screenshot":null,"surfer_file_name":null,"surfer_file_original_url":null,"envato_tk_source_kit":null,"envato_tk_source_index":null,"envato_tk_manifest":null,"envato_tk_folder_name":null,"envato_tk_builder":null,"envato_elements_download_event":null,"_menu_item_type":null,"_menu_item_menu_item_parent":null,"_menu_item_object_id":null,"_menu_item_object":null,"_menu_item_target":null,"_menu_item_classes":null,"_menu_item_xfn":null,"_menu_item_url":null,"_trp_menu_languages":null,"rank_math_primary_category":"996","rank_math_title":null,"inline_featured_image":null,"_yoast_wpseo_primary_category":null,"rank_math_schema_blogposting":null,"rank_math_schema_videoobject":null,"_oembed_049c719bc4a9f89deaead66a7da9fddc":null,"_oembed_time_049c719bc4a9f89deaead66a7da9fddc":null,"_yoast_wpseo_focuskw":null,"_yoast_wpseo_linkdex":null,"_oembed_27e3473bf8bec795fbeb3a9d38489348":null,"_oembed_c3b0f6959478faf92a1f343d8f96b19e":null,"_trp_translated_slug_en_us":null,"_wp_desired_post_slug":null,"_yoast_wpseo_title":null,"tldname":null,"tldpreis":null,"tldrubrik":null,"tldpolicylink":null,"tldsize":null,"tldregistrierungsdauer":null,"tldtransfer":null,"tldwhoisprivacy":null,"tldregistrarchange":null,"tldregistrantchange":null,"tldwhoisupdate":null,"tldnameserverupdate":null,"tlddeletesofort":null,"tlddeleteexpire":null,"tldumlaute":null,"tldrestore":null,"tldsubcategory":null,"tldbildname":null,"tldbildurl":null,"tldclean":null,"tldcategory":null,"tldpolicy":null,"tldbesonderheiten":null,"tld_bedeutung":null,"_oembed_d167040d816d8f94c072940c8009f5f8":null,"_oembed_b0a0fa59ef14f8870da2c63f2027d064":null,"_oembed_4792fa4dfb2a8f09ab950a73b7f313ba":null,"_oembed_33ceb1fe54a8ab775d9410abf699878d":null,"_oembed_fd7014d14d919b45ec004937c0db9335":null,"_oembed_21a029d076783ec3e8042698c351bd7e":null,"_oembed_be5ea8a0c7b18e658f08cc571a909452":null,"_oembed_a9ca7a298b19f9b48ec5914e010294d2":null,"_oembed_f8db6b27d08a2bb1f920e7647808899a":null,"_oembed_168ebde5096e77d8a89326519af9e022":null,"_oembed_cdb76f1b345b42743edfe25481b6f98f":null,"_oembed_87b0613611ae54e86e8864265404b0a1":null,"_oembed_27aa0e5cf3f1bb4bc416a4641a5ac273":null,"_oembed_time_27aa0e5cf3f1bb4bc416a4641a5ac273":null,"_tldname":null,"_tldclean":null,"_tldpreis":null,"_tldcategory":null,"_tldsubcategory":null,"_tldpolicy":null,"_tldpolicylink":null,"_tldsize":null,"_tldregistrierungsdauer":null,"_tldtransfer":null,"_tldwhoisprivacy":null,"_tldregistrarchange":null,"_tldregistrantchange":null,"_tldwhoisupdate":null,"_tldnameserverupdate":null,"_tlddeletesofort":null,"_tlddeleteexpire":null,"_tldumlaute":null,"_tldrestore":null,"_tldbildname":null,"_tldbildurl":null,"_tld_bedeutung":null,"_tldbesonderheiten":null,"_oembed_ad96e4112edb9f8ffa35731d4098bc6b":null,"_oembed_8357e2b8a2575c74ed5978f262a10126":null,"_oembed_3d5fea5103dd0d22ec5d6a33eff7f863":null,"_eael_widget_elements":null,"_oembed_0d8a206f09633e3d62b95a15a4dd0487":null,"_oembed_time_0d8a206f09633e3d62b95a15a4dd0487":null,"_aioseo_description":null,"_eb_attr":null,"_eb_data_table":null,"_oembed_819a879e7da16dd629cfd15a97334c8a":null,"_oembed_time_819a879e7da16dd629cfd15a97334c8a":null,"_acf_changed":null,"_wpcode_auto_insert":null,"_edit_last":"1","_edit_lock":"1628608424:1","_oembed_e7b913c6c84084ed9702cb4feb012ddd":"{{unknown}}","_oembed_bfde9e10f59a17b85fc8917fa7edf782":"<iframe title=\"Theming Nextcloud in 37 seconds\" width=\"368\" height=\"207\" src=\"https:\/\/www.youtube.com\/embed\/wqRgeFXYUys?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>","_oembed_time_bfde9e10f59a17b85fc8917fa7edf782":"1628608472","_oembed_03514b67990db061d7c4672de26dc514":"<iframe title=\"Gaia X\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/NhqLt_NJ6FA?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>","_oembed_time_03514b67990db061d7c4672de26dc514":"1628608465","rank_math_news_sitemap_robots":null,"rank_math_robots":null,"_eael_post_view_count":"4523","_trp_automatically_translated_slug_ru_ru":null,"_trp_automatically_translated_slug_et":"expert-blog-using-open-source-tools-for-analysis-of-network-traffic","_trp_automatically_translated_slug_lv":"eksperts-blog-izmantot-atverta-izcelsmes-rikus-tiklu-plusmas-analizes-analizei","_trp_automatically_translated_slug_fr_fr":null,"_trp_automatically_translated_slug_en_us":null,"_wp_old_slug":null,"_trp_automatically_translated_slug_da_dk":null,"_trp_automatically_translated_slug_pl_pl":null,"_trp_automatically_translated_slug_es_es":null,"_trp_automatically_translated_slug_hu_hu":null,"_trp_automatically_translated_slug_fi":"expert-blog-using-open-source-tools-for-analysis-of-network-traffic","_trp_automatically_translated_slug_ja":"%e3%82%a8%e3%82%ad%e3%82%b9%e3%83%91%e3%83%bc%e3%83%88%e3%83%bb%e3%83%96%e3%83%ad%e3%82%b0-%e3%83%8d%e3%83%83%e3%83%88%e3%83%af%e3%83%bc%e3%82%af%e3%83%bb%e3%83%88%e3%83%a9%e3%83%92%e3%83%83%e3%82%af","_trp_automatically_translated_slug_lt_lt":null,"_elementor_edit_mode":null,"_elementor_template_type":null,"_elementor_version":null,"_elementor_pro_version":null,"_wp_page_template":"default","_elementor_page_settings":null,"_elementor_data":null,"_elementor_css":null,"_elementor_conditions":null,"_happyaddons_elements_cache":null,"_oembed_75446120c39305f0da0ccd147f6de9cb":"{{unknown}}","_oembed_time_75446120c39305f0da0ccd147f6de9cb":null,"_oembed_3efb2c3e76a18143e7207993a2a6939a":"<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/BREAKING?src=hash&amp;ref_src=twsrc%5Etfw\">#BREAKING<\/a>: Texas takes the lead once more! Today, we\u2019re filing a lawsuit against <a href=\"https:\/\/twitter.com\/hashtag\/Google?src=hash&amp;ref_src=twsrc%5Etfw\">#Google<\/a> for anticompetitive conduct.<br><br>This internet Goliath used its power to manipulate the market, destroy competition, and harm YOU, the consumer. Stay tuned\u2026 <a href=\"https:\/\/t.co\/fdEVEWQb0e\">pic.twitter.com\/fdEVEWQb0e<\/a><\/p>&mdash; Texas Attorney General (@TXAG) <a href=\"https:\/\/twitter.com\/TXAG\/status\/1339283520099856384?ref_src=twsrc%5Etfw\">December 16, 2020<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>","_oembed_time_3efb2c3e76a18143e7207993a2a6939a":"1628608458","_oembed_59808117857ddf57e478a31d79f76e4d":"<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">Happy to follow-on report that a huge chunk of <a href=\"https:\/\/twitter.com\/Flickr?ref_src=twsrc%5Etfw\">@Flickr<\/a> compute just successfully made the transition to Graviton2 <a href=\"https:\/\/twitter.com\/Arm?ref_src=twsrc%5Etfw\">@ARM<\/a> in <a href=\"https:\/\/twitter.com\/awscloud?ref_src=twsrc%5Etfw\">@awscloud<\/a> this afternoon. More services coming shortly. My aim is to get to 100% of non-GPU <a href=\"https:\/\/twitter.com\/SmugMug?ref_src=twsrc%5Etfw\">@SmugMug<\/a> and <a href=\"https:\/\/twitter.com\/Flickr?ref_src=twsrc%5Etfw\">@Flickr<\/a> compute on ARM within the year. <a href=\"https:\/\/t.co\/fwXWdg06xx\">https:\/\/t.co\/fwXWdg06xx<\/a><\/p>&mdash; Don MacAskill (@DonMacAskill) <a href=\"https:\/\/twitter.com\/DonMacAskill\/status\/1314050996486561792?ref_src=twsrc%5Etfw\">October 8, 2020<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>","_oembed_time_59808117857ddf57e478a31d79f76e4d":"1628608459","_oembed_965c5b49aa8d22ce37dfb3bde0268600":"<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"de\" dir=\"ltr\">Der <a href=\"https:\/\/twitter.com\/hashtag\/Finanzausschuss?src=hash&amp;ref_src=twsrc%5Etfw\">#Finanzausschuss<\/a> im <a href=\"https:\/\/twitter.com\/hashtag\/Bundestag?src=hash&amp;ref_src=twsrc%5Etfw\">#Bundestag<\/a> hat das <a href=\"https:\/\/twitter.com\/hashtag\/Jahressteuergesetz?src=hash&amp;ref_src=twsrc%5Etfw\">#Jahressteuergesetz<\/a> beschlossen. Damit wurde auch die <a href=\"https:\/\/twitter.com\/hashtag\/Gemeinn%C3%BCtzigkeit?src=hash&amp;ref_src=twsrc%5Etfw\">#Gemeinn\u00fctzigkeit<\/a> f\u00fcr <a href=\"https:\/\/twitter.com\/hashtag\/Freifunk?src=hash&amp;ref_src=twsrc%5Etfw\">#Freifunk<\/a> Initiativen beschlossen. Das ganze geht jetzt in der kommenden Woche ins Plenum zur Abstimmung und direkt in den <a href=\"https:\/\/twitter.com\/hashtag\/Bundesrat?src=hash&amp;ref_src=twsrc%5Etfw\">#Bundesrat<\/a><\/p>&mdash; Jens Zimmermann (@JensZSPD) <a href=\"https:\/\/twitter.com\/JensZSPD\/status\/1336581821706989568?ref_src=twsrc%5Etfw\">December 9, 2020<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>","_oembed_time_965c5b49aa8d22ce37dfb3bde0268600":"1628608461","_oembed_81002f7ee3604f645db4ebcfd1912acf":"<iframe title=\"Netzetag bei der Telekom: Antennen, Breitband, Glasfaser\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/6_NTa3VCRFo?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>","_oembed_time_81002f7ee3604f645db4ebcfd1912acf":"1628608461","_elementor_screenshot":null,"_oembed_7ea3429961cf98fa85da9747683af827":"<iframe title=\"Firewall: Wie du die Web Application Firewall im Plesk Men\u00fc verwendest und deine Website sch\u00fctzt.\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/CzAjqyJtEaw?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>","_oembed_time_7ea3429961cf98fa85da9747683af827":"1628608443","_elementor_controls_usage":null,"_elementor_page_assets":[],"_elementor_screenshot_failed":null,"theplus_transient_widgets":null,"_eael_custom_js":null,"_wp_old_date":null,"_trp_automatically_translated_slug_it_it":null,"_trp_automatically_translated_slug_pt_pt":null,"_trp_automatically_translated_slug_zh_cn":null,"_trp_automatically_translated_slug_nl_nl":null,"_trp_automatically_translated_slug_pt_br":null,"_trp_automatically_translated_slug_sv_se":null,"rank_math_analytic_object_id":null,"rank_math_internal_links_processed":null,"_trp_automatically_translated_slug_ro_ro":null,"_trp_automatically_translated_slug_sk_sk":null,"_trp_automatically_translated_slug_bg_bg":null,"_trp_automatically_translated_slug_sl_si":null,"litespeed_vpi_list":["webhostinglogo.png"],"litespeed_vpi_list_mobile":["webhostinglogo.png"],"rank_math_seo_score":"56","rank_math_contentai_score":null,"ilj_limitincominglinks":"","ilj_maxincominglinks":"1","ilj_limitoutgoinglinks":null,"ilj_maxoutgoinglinks":null,"ilj_limitlinksperparagraph":null,"ilj_linksperparagraph":null,"ilj_blacklistdefinition":[],"ilj_linkdefinition":["open source-tools","netzwerkverkehr","cybersicherheit"],"_eb_reusable_block_ids":null,"rank_math_focus_keyword":"Open Source-Tools","rank_math_og_content_image":null,"_yoast_wpseo_metadesc":null,"_yoast_wpseo_content_score":null,"_yoast_wpseo_focuskeywords":null,"_yoast_wpseo_keywordsynonyms":null,"_yoast_wpseo_estimated-reading-time-minutes":null,"rank_math_description":null,"surfer_last_post_update":null,"surfer_last_post_update_direction":null,"surfer_keywords":null,"surfer_location":null,"surfer_draft_id":null,"surfer_permalink_hash":null,"surfer_scrape_ready":null,"_thumbnail_id":"7894","footnotes":null,"_links":{"self":[{"href":"https:\/\/webhosting.de\/sv\/wp-json\/wp\/v2\/posts\/7893","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/webhosting.de\/sv\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/webhosting.de\/sv\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/webhosting.de\/sv\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/webhosting.de\/sv\/wp-json\/wp\/v2\/comments?post=7893"}],"version-history":[{"count":0,"href":"https:\/\/webhosting.de\/sv\/wp-json\/wp\/v2\/posts\/7893\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/webhosting.de\/sv\/wp-json\/wp\/v2\/media\/7894"}],"wp:attachment":[{"href":"https:\/\/webhosting.de\/sv\/wp-json\/wp\/v2\/media?parent=7893"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/webhosting.de\/sv\/wp-json\/wp\/v2\/categories?post=7893"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/webhosting.de\/sv\/wp-json\/wp\/v2\/tags?post=7893"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}