
{"id":1553,"date":"2011-09-29T16:44:03","date_gmt":"2011-09-29T19:44:03","guid":{"rendered":"http:\/\/www.talsoft.com.ar\/?p=1553"},"modified":"2011-09-29T16:44:03","modified_gmt":"2011-09-29T19:44:03","slug":"%c2%bfutilizas-contrasenas-seguras-no-seas-victima-de-morto","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/%c2%bfutilizas-contrasenas-seguras-no-seas-victima-de-morto\/","title":{"rendered":"\u00bfUtilizas contrase\u00f1as seguras? No seas v\u00edctima de Morto"},"content":{"rendered":"<p>Desde finales del mes pasado, estamos detectando en nuestros Sistemas de Detecci\u00f3n de Intrusos un aumento en los ataques dirigidos al puerto 3389 (servicio de Terminal Service). Se pens\u00f3 que este aumento pod\u00eda ser debido a una vulnerabilidad no conocida de este servicio, pero analizando el tr\u00e1fico capturado, pudimos comprobar que se trataba de intentos de acceso utilizando el mismo usuario y un grupo de contrase\u00f1as d\u00e9biles fijas.<\/p>\n<p>Investigamos un poco y vimos que este aumento podr\u00eda ser debido a un nuevo virus identificado como <a href=\"http:\/\/cert.inteco.es\/virusDetail\/Actualidad\/Actualidad_Virus\/Detalle_Virus\/Morto\">Morto<\/a>. Se trata de un gusano que se propaga por la red aprovech\u00e1ndose de contrase\u00f1as d\u00e9biles conocidas configuradas en los sistemas.<\/p>\n<p>&nbsp;<\/p>\n<p>A continuaci\u00f3n mostramos una gr\u00e1fica donde se ve el aumento de \u201cataques\u201d al servicio de Terminal Server; unas alertas relacionadas con el intento de login por protocolo RDP y otras espec\u00edficas del Morto una vez se a\u00f1adi\u00f3 la firma (el pico final es debido a un ataque desde m\u00faltiples or\u00edgenes que se acumularon y por eso dan ese valor tan alarmante).<\/p>\n<p><img decoding=\"async\" src=\"http:\/\/www.securityartwork.es\/wp-content\/uploads\/2011\/09\/51.jpg\" alt=\"\" \/><\/p>\n<p>El virus no tiene demasiado \u00e9xito, por el momento, ya que prueba con el usuario local \u201cAdministrator\u201d y utiliza un lista de unas 30 contrase\u00f1as, por lo que la probabilidad de acierto es realmente baja. No obstante, \u00bfc\u00f3mo podemos asegurarnos de que no somos vulnerables a este virus? O de forma gen\u00e9rica, \u00bfc\u00f3mo podemos comprobar que no se utilizan contrase\u00f1as d\u00e9biles en nuestros sistemas?<\/p>\n<p>En esta entrada vamos a recoger un par de soluciones para comprobar que no ser\u00edamos vulnerables a este gusano, en caso de que atacase nuestros sistemas. La <a href=\"http:\/\/carnal0wnage.attackresearch.com\/2011\/08\/using-ncrack-to-test-for-servers-vuln.html\">primera<\/a>, utiliza la herramienta <a href=\"http:\/\/nmap.org\/ncrack\/\">ncrack<\/a> (de los mismos creadores de nmap) para escanear la red, cargando los usuarios y contrase\u00f1as de la lista anterior.<\/p>\n<div><code><br \/>\n$ ncrack -vv -d7 --user administrator -P \/home\/user\/morto.txt 192.168.26.137:3389,CL=2<\/code>rdp:\/\/192.168.26.137:3389 (EID 1) Login failed: &#8216;administrator&#8217; &#8216;admin&#8217;<br \/>\nrdp:\/\/192.168.26.137:3389 (EID 1) Attempts: total 1 completed 1 supported 1 &#8212; rate 0.94<br \/>\nrdp:\/\/192.168.26.137:3389 (EID 2) Login failed: &#8216;administrator&#8217; &#8216;password&#8217;<br \/>\nrdp:\/\/192.168.26.137:3389 last: 0.00 current 0.50 parallelism 2&#8230;<\/p>\n<p>Discovered credentials on rdp:\/\/192.168.26.137:3389 &#8216;administrator&#8217; &#8216;admin123&#8217;<br \/>\nrdp:\/\/192.168.26.137:3389 last: 0.02 current 0.01 parallelism 2<br \/>\nrdp:\/\/192.168.26.137:3389 Increasing connection limit to: 2<br \/>\nrdp:\/\/192.168.26.137:3389 (EID 30) Attempts: total 30 completed 30 supported 1 &#8212; rate 1.62<br \/>\nrdp:\/\/192.168.26.137:3389 (EID 31) Login failed: &#8216;administrator&#8217; &#8216;1234567890&#8217;<br \/>\nrdp:\/\/192.168.26.137:3389 finished.<br \/>\nrdp:\/\/192.168.26.137:3389 (EID 31) Attempts: total 31 completed 31 supported 1 &#8212; rate 1.81<\/p>\n<p>nsock_loop returned 3<\/p>\n<p>Discovered credentials for rdp on 192.168.26.137 3389\/tcp:<br \/>\n192.168.26.137 3389\/tcp rdp: &#8216;administrator&#8217; &#8216;admin123&#8217;<\/p>\n<p>Ncrack done: 1 service scanned in 18.00 seconds.<br \/>\nProbes sent: 31 timed-out: 0 prematurely-closed: 0<\/p>\n<p><code>Ncrack finished.<\/code><\/p>\n<\/div>\n<p>La segunda es igual de f\u00e1cil de utilizar, desde la consola de <a href=\"http:\/\/metasploit.com\/\">Mestasploit<\/a>, msfconsole, como comentan en el <a href=\"https:\/\/community.rapid7.com\/community\/metasploit\/blog\/2011\/08\/29\/morto-another-reason-to-secure-local-user-accounts\">blog de Rapid7<\/a>.<\/p>\n<div><code>$ msfconsole<\/code><\/div>\n<p>Seleccionamos el m\u00f3dulo <strong>smb_login<\/strong> y cargamos el fichero especificando la variable <strong>USERPASS_FILE<\/strong>.<\/p>\n<div><code>msf &gt; use auxiliary\/scanner\/smb\/smb_login<br \/>\nmsf auxiliary(smb_login) &gt; set USERPASS_FILE \/tmp\/morto.txt<br \/>\n<\/code><\/div>\n<p>Especificamos el objetivo y el n\u00famero de pruebas concurrentes, as\u00ed como deshabilitar el modo \u201cverbose\u201d.<\/p>\n<div><code>msf auxiliary(smb_login) &gt; set RHOSTS 192.168.0.0\/24<br \/>\nmsf auxiliary(smb_login) &gt; set THREADS 128<br \/>\nmsf auxiliary(smb_login) &gt; set VERBOSE false<br \/>\n<\/code><\/div>\n<p>\u00danicamente configurados estos par\u00e1metros, pasamos a ejecutar el ataque.<\/p>\n<div><code>msf auxiliary(smb_login) &gt; run<\/code><code>[*] Scanned 026 of 256 hosts (010% complete)<br \/>\n[+] 192.168.0.141:445|WORKGROUP - SUCCESSFUL LOGIN (Windows 5.1) 'Administrator' : 'admin'<br \/>\n[*] Scanned 125 of 256 hosts (048% complete)<br \/>\n[*] Scanned 127 of 256 hosts (049% complete)<br \/>\n[*] Scanned 142 of 256 hosts (055% complete)<br \/>\n[*] Scanned 157 of 256 hosts (061% complete)<br \/>\n[*] Scanned 256 of 256 hosts (100% complete)<br \/>\n[*] Auxiliary module execution completed<br \/>\n<\/code><\/div>\n<p>Con estas herramientas podemos comprobar la autenticaci\u00f3n de diversos servidores y con esta u otras listas de contrase\u00f1as conocidas. Existen numerosos diccionarios, y en infinidad de idiomas, con los que podemos probar nuestros servicios. Animamos a nuestros lectores a que prueben si sus sistemas son vulnerables a estos ataques de diccionario (m\u00e1s cuando se trata de listas tan peque\u00f1as). Parece mentira que un ataque tan simple pueda tener tanto \u00e9xito (a escala de Internet), pero eso demuestra lo verde que estamos en materia de seguridad, ya que se incumplen varias recomendaciones: como ser\u00eda la de no utilizar contrase\u00f1as d\u00e9biles, no permitir accesos remotos como Administrador o no publicar este tipo de servicios directamente a Internet.<\/p>\n<p>As\u00ed que ya saben, si detectan un aumento en el tr\u00e1fico RDP puede que Morto est\u00e9 llamando a su puerta, pero pueden estar tranquilos de que no pasar\u00e1 (al menos, este).<\/p>\n<p>&nbsp;<\/p>\n<p>Fuente: http:\/\/www.securityartwork.es<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Desde finales del mes pasado, estamos detectando en nuestros Sistemas de Detecci\u00f3n de Intrusos un aumento en los ataques dirigidos al puerto 3389 (servicio de Terminal Service). Se pens\u00f3 que este aumento pod\u00eda ser debido a una vulnerabilidad no conocida de este servicio, pero analizando el tr\u00e1fico capturado, pudimos comprobar que se trataba de intentos [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-1553","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - \u00bfUtilizas contrase\u00f1as seguras? No seas v\u00edctima de Morto<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/\u00bfutilizas-contrasenas-seguras-no-seas-victima-de-morto\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/%c2%bfutilizas-contrasenas-seguras-no-seas-victima-de-morto\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/%c2%bfutilizas-contrasenas-seguras-no-seas-victima-de-morto\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"\u00bfUtilizas contrase\u00f1as seguras? No seas v\u00edctima de Morto\",\"datePublished\":\"2011-09-29T19:44:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/%c2%bfutilizas-contrasenas-seguras-no-seas-victima-de-morto\/\"},\"wordCount\":626,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/%c2%bfutilizas-contrasenas-seguras-no-seas-victima-de-morto\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.securityartwork.es\/wp-content\/uploads\/2011\/09\/51.jpg\",\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/%c2%bfutilizas-contrasenas-seguras-no-seas-victima-de-morto\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/%c2%bfutilizas-contrasenas-seguras-no-seas-victima-de-morto\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - \u00bfUtilizas contrase\u00f1as seguras? No seas v\u00edctima de Morto\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/%c2%bfutilizas-contrasenas-seguras-no-seas-victima-de-morto\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/%c2%bfutilizas-contrasenas-seguras-no-seas-victima-de-morto\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.securityartwork.es\/wp-content\/uploads\/2011\/09\/51.jpg\",\"datePublished\":\"2011-09-29T19:44:03+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/%c2%bfutilizas-contrasenas-seguras-no-seas-victima-de-morto\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/%c2%bfutilizas-contrasenas-seguras-no-seas-victima-de-morto\/#primaryimage\",\"url\":\"http:\/\/www.securityartwork.es\/wp-content\/uploads\/2011\/09\/51.jpg\",\"contentUrl\":\"http:\/\/www.securityartwork.es\/wp-content\/uploads\/2011\/09\/51.jpg\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - \u00bfUtilizas contrase\u00f1as seguras? No seas v\u00edctima de Morto","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/\u00bfutilizas-contrasenas-seguras-no-seas-victima-de-morto\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/%c2%bfutilizas-contrasenas-seguras-no-seas-victima-de-morto\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/%c2%bfutilizas-contrasenas-seguras-no-seas-victima-de-morto\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"\u00bfUtilizas contrase\u00f1as seguras? No seas v\u00edctima de Morto","datePublished":"2011-09-29T19:44:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/%c2%bfutilizas-contrasenas-seguras-no-seas-victima-de-morto\/"},"wordCount":626,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/%c2%bfutilizas-contrasenas-seguras-no-seas-victima-de-morto\/#primaryimage"},"thumbnailUrl":"http:\/\/www.securityartwork.es\/wp-content\/uploads\/2011\/09\/51.jpg","articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/%c2%bfutilizas-contrasenas-seguras-no-seas-victima-de-morto\/","url":"https:\/\/www.talsoft-security.com\/site\/%c2%bfutilizas-contrasenas-seguras-no-seas-victima-de-morto\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - \u00bfUtilizas contrase\u00f1as seguras? No seas v\u00edctima de Morto","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/%c2%bfutilizas-contrasenas-seguras-no-seas-victima-de-morto\/#primaryimage"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/%c2%bfutilizas-contrasenas-seguras-no-seas-victima-de-morto\/#primaryimage"},"thumbnailUrl":"http:\/\/www.securityartwork.es\/wp-content\/uploads\/2011\/09\/51.jpg","datePublished":"2011-09-29T19:44:03+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/%c2%bfutilizas-contrasenas-seguras-no-seas-victima-de-morto\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/%c2%bfutilizas-contrasenas-seguras-no-seas-victima-de-morto\/#primaryimage","url":"http:\/\/www.securityartwork.es\/wp-content\/uploads\/2011\/09\/51.jpg","contentUrl":"http:\/\/www.securityartwork.es\/wp-content\/uploads\/2011\/09\/51.jpg"},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/1553","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=1553"}],"version-history":[{"count":2,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/1553\/revisions"}],"predecessor-version":[{"id":1555,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/1553\/revisions\/1555"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=1553"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=1553"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=1553"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}