{"id":5819,"date":"2017-05-03T15:33:43","date_gmt":"2017-05-03T18:33:43","guid":{"rendered":"https:\/\/ostec.blog\/generico\/redirecionamentos-de-portas-ransomware"},"modified":"2020-08-31T13:28:11","modified_gmt":"2020-08-31T16:28:11","slug":"port-forwarding-to-prevent-ransomware-attacks","status":"publish","type":"post","link":"https:\/\/ostec.blog\/en\/perimeter\/port-forwarding-to-prevent-ransomware-attacks\/","title":{"rendered":"Port forwarding: care to prevent ransomware attacks"},"content":{"rendered":"<p>[vc_row row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;full_width&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; css_animation=&#8221;&#8221; css=&#8221;.vc_custom_1508957190897{padding-top: 25px !important;padding-bottom: 25px !important;}&#8221;][vc_column][vc_column_text]Talking about perimeter security, one of the main things we should consider is the care with exposing the ports used in the company&#8217;s internal services to the internet.<\/p>\n<p>This type of vulnerability, easily exploited by criminals with the use of relatively simple techniques (port scan with Nmap, for example), has been one of the major causes of <a href=\"https:\/\/blog.ostec.com.br\/geral-seguranca-informacao\/ransomware-como-se-proteger\">ransomware<\/a>in companies.<\/p>\n<h2>Knowing the anatomy of the attack<\/h2>\n<p>In order for us to work on prevention, it is important to understand the anatomy of this type of attack. In short, the modus operandi occurs as follows:<\/p>\n<ol>\n<li>A criminal performs port scan at the company&#8217;s url, searching for ports exposed to the internet (i.e. for connections coming from any source).<\/li>\n<li>In possession of this information, patterns are sought to direct the attacks, usually based on the standard ports used by the services (3389, for example, well known in remote Windows connections).<\/li>\n<li>Attacks follow two lines: exploiting system vulnerabilities and\/or vulnerabilities in credentials via brute-force (trial and error-breaking password).<\/li>\n<li>When getting access to the environment, the goal is to find what is important in the company network; databases are common targets.<\/li>\n<li>This data is encrypted with a virtually unbreakable key, usually based on AES-256. Another criminal practice that has also occurred is to threaten the data leakage (criminal technique called doxing, which focuses on the risk of disclosure of confidential information).<\/li>\n<li>In order for the company to have access to its data again and\/or have no confidential information disclosed, a kind of redemption is charged in bitcoin (virtual currency quoted in dollar and without traceability). It is worth emphasizing that payment gives absolutely no guarantee of redemption or maintenance of the confidentiality of your data, you are in the hands of criminals.<\/li>\n<\/ol>\n<p>After contextualizing on the type of attack, it is possible to present suggestions to prevent the occurrence of such a claim.<\/p>\n<h2>Forwarding ports to combat Ransomware attacks<\/h2>\n<p>The first step is to perform a port scan to identify the visibility of your company&#8217;s ports on the internet. The same as a malicious individual would do to reveal your weaknesses.<\/p>\n<p>When identifying open ports, it is important that a study be done on each of them, starting from the following model for classification:<\/p>\n<ol>\n<li>Obsolete and\/or unnecessary<strong>port forwarding<\/strong>:<\/li>\n<\/ol>\n<p>For these cases, the recommendation is simple and obvious: they should be immediately canceled.<\/p>\n<ol start=\"2\">\n<li><strong>Port forwarding <\/strong>used sporadically and\/or by specific users:<\/li>\n<\/ol>\n<p>These services, because they are used by a specific and predefined public, allow control and restriction policies to be applied more easily. Accesses can be used through secure VPN tunnels with individual credentials or implemented source restrictions only for specific IP addresses.<\/p>\n<ol start=\"3\">\n<li><strong>Forwarding ports <\/strong>that need to be exposed to the internet:<\/li>\n<\/ol>\n<p>For cases where there is no choice, we need to be aware of some critical details:<\/p>\n<blockquote><p><em>Credentials<\/em>: Avoid using standard user names such as &#8220;admin&#8221;, etc.<\/p>\n<p><em>Passwords<\/em>: Use complex passwords, including number letters, special characters with at least 12 characters.<\/p>\n<p><em>Updates<\/em>: Keep services always up to date. Many security loopholes are exploited in outdated systems, and updates released by manufacturers are precisely, for the most part, to solve discovered and mapped vulnerabilities.<\/p>\n<p><em>Web Cryptography<\/em>: For services running under the HTTP protocol, enable HTTPS (secure). Data trafficked over non-secure HTTP can be easily intercepted.<\/p><\/blockquote>\n<p>During the process, it is possible to identify a port whose existence is not clear. For these cases it is recommended to cancel <strong>port forwarding<\/strong>(as presented in item 1), documenting such intervention. After the intervention, establish a monitoring window to avoid compromising any critical service for the business. Taking these precautions, if necessary it will be possible to restore the redirection quickly.<\/p>\n<p>Another valuable tip is to modify, whenever possible, the default ports of services, making it harder for malicious users to act.<\/p>\n<p>As a complement, it is important to consider the implementation of monitoring policies with alerts and logs of external port accesses in order to facilitate the identification of abnormal connections, which may in fact be signs of malicious exploit attempts.<\/p>\n<p>Now that you know a little more, take the opportunity to close the ports of your company, avoiding virtual threats. If you still have questions about the topic, feel free to talk to one of our experts.[\/vc_column_text][vc_custom_heading text=&#8221;Keep increasing your knowledge&#8221; font_container=&#8221;tag:h3|text_align:left&#8221; use_theme_fonts=&#8221;yes&#8221; css=&#8221;.vc_custom_1529094170909{padding-top: 25px !important;padding-bottom: 25px !important;}&#8221;][blog_slider type=&#8221;carousel&#8221; auto_start=&#8221;true&#8221; info_position=&#8221;info_in_bottom_always&#8221; order_by=&#8221;date&#8221; order=&#8221;ASC&#8221; blogs_shown=&#8221;&#8221; category=&#8221;problem-recognition&#8221; show_categories=&#8221;no&#8221; show_date=&#8221;yes&#8221; title_tag=&#8221;h4&#8243; show_comments=&#8221;no&#8221; enable_navigation=&#8221;enable_navigation&#8221;][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;full_width&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; css_animation=&#8221;&#8221; css=&#8221;.vc_custom_1508957190897{padding-top: 25px !important;padding-bottom: 25px !important;}&#8221;][vc_column][vc_column_text]Talking about perimeter security, one of the main things we should consider is the care with exposing the ports used in the company&#8217;s internal services to the internet. This type of vulnerability, easily exploited by criminals with the use of relatively simple techniques [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":12811,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[984,988,992,411],"tags":[1641,1643],"class_list":["post-5819","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","category-information-loss-or-leakage","category-learning-and-discovery","category-perimeter","tag-ransomware-en","tag-redirecionamento-de-portas-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Port forwarding: care to prevent ransomware attacks - OSTEC Blog<\/title>\n<meta name=\"description\" content=\"Understand what problems can be triggered by the indiscriminate creation of port redirects in corporations. Learn how to prevent attacks by it.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ostec.blog\/en\/perimeter\/port-forwarding-to-prevent-ransomware-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Port forwarding: care to prevent ransomware attacks - OSTEC Blog\" \/>\n<meta property=\"og:description\" content=\"Understand what problems can be triggered by the indiscriminate creation of port redirects in corporations. Learn how to prevent attacks by it.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ostec.blog\/en\/perimeter\/port-forwarding-to-prevent-ransomware-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"OSTEC | Seguran\u00e7a digital de resultados\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ostec\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-03T18:33:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-08-31T16:28:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ostec.blog\/wp-content\/uploads\/2017\/05\/01.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"928\" \/>\n\t<meta property=\"og:image:height\" content=\"534\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Labbo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ostecsecurity\" \/>\n<meta name=\"twitter:site\" content=\"@ostecsecurity\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/port-forwarding-to-prevent-ransomware-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/port-forwarding-to-prevent-ransomware-attacks\/\"},\"author\":{\"name\":\"Labbo\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/399c5da334130a35cfb243a9c0e5d11f\"},\"headline\":\"Port forwarding: care to prevent ransomware attacks\",\"datePublished\":\"2017-05-03T18:33:43+00:00\",\"dateModified\":\"2020-08-31T16:28:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/port-forwarding-to-prevent-ransomware-attacks\/\"},\"wordCount\":826,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/port-forwarding-to-prevent-ransomware-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2017\/05\/01.jpg\",\"keywords\":[\"Ransomware\",\"redirecionamento de portas\"],\"articleSection\":[\"General\",\"Information loss or leakage\",\"Learning and discovery\",\"Perimeter\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ostec.blog\/en\/perimeter\/port-forwarding-to-prevent-ransomware-attacks\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/port-forwarding-to-prevent-ransomware-attacks\/\",\"url\":\"https:\/\/ostec.blog\/en\/perimeter\/port-forwarding-to-prevent-ransomware-attacks\/\",\"name\":\"Port forwarding: care to prevent ransomware attacks - OSTEC Blog\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/port-forwarding-to-prevent-ransomware-attacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/port-forwarding-to-prevent-ransomware-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2017\/05\/01.jpg\",\"datePublished\":\"2017-05-03T18:33:43+00:00\",\"dateModified\":\"2020-08-31T16:28:11+00:00\",\"description\":\"Understand what problems can be triggered by the indiscriminate creation of port redirects in corporations. Learn how to prevent attacks by it.\",\"breadcrumb\":{\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/port-forwarding-to-prevent-ransomware-attacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ostec.blog\/en\/perimeter\/port-forwarding-to-prevent-ransomware-attacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/port-forwarding-to-prevent-ransomware-attacks\/#primaryimage\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2017\/05\/01.jpg\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2017\/05\/01.jpg\",\"width\":928,\"height\":534,\"caption\":\"Tela exibindo n\u00fameros bin\u00e1rios\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/port-forwarding-to-prevent-ransomware-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/ostec.blog\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Port forwarding: care to prevent ransomware attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ostec.blog\/#website\",\"url\":\"https:\/\/ostec.blog\/\",\"name\":\"OSTEC | Seguran\u00e7a digital de resultados\",\"description\":\"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.\",\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ostec.blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ostec.blog\/#organization\",\"name\":\"OSTEC Business Security\",\"url\":\"https:\/\/ostec.blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"width\":251,\"height\":67,\"caption\":\"OSTEC Business Security\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ostec\",\"https:\/\/x.com\/ostecsecurity\",\"https:\/\/www.instagram.com\/ostecsecurity\/\",\"https:\/\/linkedin.com\/company\/ostec-security\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/399c5da334130a35cfb243a9c0e5d11f\",\"name\":\"Labbo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/85e96904a64ff6e523f78e80d83c7b89?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/85e96904a64ff6e523f78e80d83c7b89?s=96&d=mm&r=g\",\"caption\":\"Labbo\"},\"url\":\"https:\/\/ostec.blog\/en\/author\/labbo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Port forwarding: care to prevent ransomware attacks - OSTEC Blog","description":"Understand what problems can be triggered by the indiscriminate creation of port redirects in corporations. Learn how to prevent attacks by it.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ostec.blog\/en\/perimeter\/port-forwarding-to-prevent-ransomware-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Port forwarding: care to prevent ransomware attacks - OSTEC Blog","og_description":"Understand what problems can be triggered by the indiscriminate creation of port redirects in corporations. Learn how to prevent attacks by it.","og_url":"https:\/\/ostec.blog\/en\/perimeter\/port-forwarding-to-prevent-ransomware-attacks\/","og_site_name":"OSTEC | Seguran\u00e7a digital de resultados","article_publisher":"https:\/\/www.facebook.com\/ostec","article_published_time":"2017-05-03T18:33:43+00:00","article_modified_time":"2020-08-31T16:28:11+00:00","og_image":[{"width":928,"height":534,"url":"https:\/\/ostec.blog\/wp-content\/uploads\/2017\/05\/01.jpg","type":"image\/jpeg"}],"author":"Labbo","twitter_card":"summary_large_image","twitter_creator":"@ostecsecurity","twitter_site":"@ostecsecurity","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ostec.blog\/en\/perimeter\/port-forwarding-to-prevent-ransomware-attacks\/#article","isPartOf":{"@id":"https:\/\/ostec.blog\/en\/perimeter\/port-forwarding-to-prevent-ransomware-attacks\/"},"author":{"name":"Labbo","@id":"https:\/\/ostec.blog\/#\/schema\/person\/399c5da334130a35cfb243a9c0e5d11f"},"headline":"Port forwarding: care to prevent ransomware attacks","datePublished":"2017-05-03T18:33:43+00:00","dateModified":"2020-08-31T16:28:11+00:00","mainEntityOfPage":{"@id":"https:\/\/ostec.blog\/en\/perimeter\/port-forwarding-to-prevent-ransomware-attacks\/"},"wordCount":826,"commentCount":0,"publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"image":{"@id":"https:\/\/ostec.blog\/en\/perimeter\/port-forwarding-to-prevent-ransomware-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2017\/05\/01.jpg","keywords":["Ransomware","redirecionamento de portas"],"articleSection":["General","Information loss or leakage","Learning and discovery","Perimeter"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ostec.blog\/en\/perimeter\/port-forwarding-to-prevent-ransomware-attacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ostec.blog\/en\/perimeter\/port-forwarding-to-prevent-ransomware-attacks\/","url":"https:\/\/ostec.blog\/en\/perimeter\/port-forwarding-to-prevent-ransomware-attacks\/","name":"Port forwarding: care to prevent ransomware attacks - OSTEC Blog","isPartOf":{"@id":"https:\/\/ostec.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ostec.blog\/en\/perimeter\/port-forwarding-to-prevent-ransomware-attacks\/#primaryimage"},"image":{"@id":"https:\/\/ostec.blog\/en\/perimeter\/port-forwarding-to-prevent-ransomware-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2017\/05\/01.jpg","datePublished":"2017-05-03T18:33:43+00:00","dateModified":"2020-08-31T16:28:11+00:00","description":"Understand what problems can be triggered by the indiscriminate creation of port redirects in corporations. Learn how to prevent attacks by it.","breadcrumb":{"@id":"https:\/\/ostec.blog\/en\/perimeter\/port-forwarding-to-prevent-ransomware-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ostec.blog\/en\/perimeter\/port-forwarding-to-prevent-ransomware-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ostec.blog\/en\/perimeter\/port-forwarding-to-prevent-ransomware-attacks\/#primaryimage","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2017\/05\/01.jpg","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2017\/05\/01.jpg","width":928,"height":534,"caption":"Tela exibindo n\u00fameros bin\u00e1rios"},{"@type":"BreadcrumbList","@id":"https:\/\/ostec.blog\/en\/perimeter\/port-forwarding-to-prevent-ransomware-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/ostec.blog\/en\/"},{"@type":"ListItem","position":2,"name":"Port forwarding: care to prevent ransomware attacks"}]},{"@type":"WebSite","@id":"https:\/\/ostec.blog\/#website","url":"https:\/\/ostec.blog\/","name":"OSTEC | Seguran\u00e7a digital de resultados","description":"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.","publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ostec.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ostec.blog\/#organization","name":"OSTEC Business Security","url":"https:\/\/ostec.blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","width":251,"height":67,"caption":"OSTEC Business Security"},"image":{"@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ostec","https:\/\/x.com\/ostecsecurity","https:\/\/www.instagram.com\/ostecsecurity\/","https:\/\/linkedin.com\/company\/ostec-security"]},{"@type":"Person","@id":"https:\/\/ostec.blog\/#\/schema\/person\/399c5da334130a35cfb243a9c0e5d11f","name":"Labbo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ostec.blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/85e96904a64ff6e523f78e80d83c7b89?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/85e96904a64ff6e523f78e80d83c7b89?s=96&d=mm&r=g","caption":"Labbo"},"url":"https:\/\/ostec.blog\/en\/author\/labbo\/"}]}},"_links":{"self":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/posts\/5819","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/comments?post=5819"}],"version-history":[{"count":0,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/posts\/5819\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/media\/12811"}],"wp:attachment":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/media?parent=5819"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/categories?post=5819"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/tags?post=5819"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}