{"id":388,"date":"2024-02-08T05:09:18","date_gmt":"2024-02-08T02:09:18","guid":{"rendered":"https:\/\/sms-txt.net\/?p=388"},"modified":"2024-09-05T12:45:43","modified_gmt":"2024-09-05T09:45:43","slug":"kaip-programisiai-isnaudoja-ss7","status":"publish","type":"post","link":"https:\/\/sms-txt.net\/lt\/ss7-sms\/kaip-programisiai-isnaudoja-ss7\/","title":{"rendered":"Kaip \u012fsilau\u017e\u0117liai i\u0161naudoja SS7?"},"content":{"rendered":"<p>\u0160is laikmetis laikomas mobiliojo ry\u0161io eros prad\u017eia. Kiekvienas \u017emogus pernelyg da\u017enai naudojasi mobiliuoju telefonu. Naudojimasis mobiliuoju telefonu tapo kiekvieno \u017emogaus priklausomybe. Nuo vaik\u0173 iki profesional\u0173 - kiekvienas \u017emogus ki\u0161en\u0117je turi \u0161iuos prietaisus.<\/p>\n<p>Kibernetin\u0117s atakos per mobiliuosius telefonus tapo da\u017enesn\u0117s atsiradus 5G technologijai. Neabejotina, kad pasaulio telekomunikacij\u0173 sistema padeda \u017emon\u0117ms naudotis geriausiomis interneto paslaugomis. \u0160ios priemon\u0117s ne tik suteikia patogumo \u017emoni\u0173 gyvenimui. Ta\u010diau jos taip pat daro \u012ftak\u0105 mobiliuosiuose telefonuose esan\u010di\u0173 slapt\u0173 duomen\u0173 saugumui. Kadangi \u012fsilau\u017e\u0117li\u0173 nedomina visa informacija, pavyzd\u017eiui, muzikos istorijos informacija. Ta\u010diau jie k\u0117sinasi tik \u012f j\u016bs\u0173 jautri\u0105 informacij\u0105.<\/p>\n<h2>Kas yra SS7 ir kaip juo gali pasinaudoti \u012fsilau\u017e\u0117liai?<\/h2>\n<p>\u012ediegus pa\u017eangius \u012fsilau\u017eimo b\u016bdus ir nauj\u0105 programin\u0119 \u012frang\u0105, \u012fsilau\u017eimas tampa lengvesnis ir sud\u0117tingesnis. Dabar \u017emon\u0117s gali meistri\u0161kai atlikti bet koki\u0105 u\u017eduot\u012f internetu. Ta\u010diau tai taip pat daro neigiam\u0105 poveik\u012f duomen\u0173 saugumui. Ekspertai \u012frod\u0117, kad 2019 m. kenk\u0117ji\u0161k\u0173 program\u0173 atak\u0173 procentas padid\u0117jo iki 50%. 2020 m. pabaigoje kibernetini\u0173 atak\u0173 skai\u010dius gali i\u0161augti dar labiau.<\/p>\n<p>Pastaruosius kelerius metus mobiliojo ry\u0161io tinklus da\u017eniausiai puola <a href=\"https:\/\/yellow-jaguar-454368.hostingersite.com\/ss7-attacks\/\">SS7<\/a> protokolas. Tai daro neigiam\u0105 poveik\u012f ne tik naudotoj\u0173, bet ir paslaug\u0173 teik\u0117jo privatumui. SS7 buvo prad\u0117tas naudoti 1974 m. kaip jungtis tarp skirting\u0173 mobili\u0173j\u0173 \u012frengini\u0173. SS7 padeda perduoti SMS \u017einutes ir skambu\u010dius i\u0161 vieno mobiliojo \u012frenginio \u012f kit\u0105. Nors jo i\u0161radimo tikslas buvo kitoks. Ta\u010diau dabar jis i\u0161naudojamas kibernetin\u0117ms atakoms.<\/p>\n<p>Da\u017eniau \u012fsilau\u017e\u0117li\u0173 tikslas yra pa\u017eeisti vis\u0105 tinkl\u0105. Jie gauna vis\u0105 paslaug\u0173 teik\u0117j\u0173 abonent\u0173 informacij\u0105. \u012egij\u0119 prieig\u0105 prie paslaug\u0173 teik\u0117j\u0173 informacijos, jie gali saugiai pasiekti vis\u0173 abonent\u0173 asmenin\u0119 informacij\u0105. Taip jie \u012fgyja galimyb\u0119 valdyti visus skambu\u010dius ir prane\u0161imus. Be to, jie gali atsekti norimo asmens buvimo viet\u0105, net jei jo GPS yra i\u0161jungtas. Visas procesas vyksta tokiu saugiu b\u016bdu, be joki\u0173 saugumo persp\u0117jim\u0173 paslaug\u0173 teik\u0117jui.<\/p>\n<p>SS7 protokolas palengvina viso pasaulio neefektyv\u0173 ry\u0161\u012f. Mobiliojo ry\u0161io naudotojai visame pasaulyje naudojasi efektyviu ry\u0161iu. \u0160io protokolo \u012fdiegimas turi ir daugiau tr\u016bkum\u0173. D\u0117l to \u017emoni\u0173 asmenin\u0117 informacija tampa labiau pa\u017eeid\u017eiama kibernetini\u0173 atak\u0173.<\/p>\n<p>Protokolas nuo pat jo i\u0161radimo nebuvo atnaujintas. D\u0117l \u0161ios prie\u017easties jis gali b\u016bti lengvai naudojamas \u012fsilau\u017eim\u0173 pasaulyje. Did\u017eiausios pasaulio \u017evalgybos agent\u016bros taip pat naudoja \u0161\u012f protokol\u0105, kad teis\u0117tai gaut\u0173 reikiam\u0105 informacij\u0105. Deja, visa \u0161i informacija taip pat gali b\u016bti lengvai prieinama \u012fsilau\u017e\u0117liams.<\/p>\n<p>SS7 yra special\u016bs telefonijos signalizacijos protokolai. \u0160is signalizacijos protokolas yra atsakingas u\u017e vieno mobiliojo telefono skambu\u010dio sujungim\u0105 su kitu. Protokolas puikiai veikia ir belaid\u017eiuose, ir laidiniuose vie\u0161uosiuose telefonuose.<\/p>\n<h2>Kam turi \u012ftakos SS7 pa\u017eeid\u017eiamumas?<\/h2>\n<p>Ilgainiui SS7 protokolas buvo papildytas dar keliomis taikomosiomis programomis. Pagrindinis to tikslas buvo SMS paslaug\u0173 \u012fdiegimas. V\u0117liau buvo \u012fdiegtos skambu\u010di\u0173 peradresavimo, skambu\u010dio laukimo, konferencini\u0173 skambu\u010di\u0173 ir kt. funkcijos. \u012ediegus visas \u0161ias naujas programas, mobilieji prietaisai tapo da\u017eno \u012fsilau\u017eimo prie\u017eastimi. SS7 atakos - tai kenk\u0117ji\u0161k\u0173 program\u0173 atakos per mobiliuosius \u012frenginius.<\/p>\n<p>\u012esilau\u017e\u0117liai gauna prieig\u0105 prie asmenini\u0173 telefono skambu\u010di\u0173 ir tikslini\u0173 \u012frengini\u0173 prane\u0161im\u0173. Da\u017eniau atakos vykdomos per mobiliojo ry\u0161io paslaug\u0173 teik\u0117jus, kad b\u016bt\u0173 galima lengvai pasiekti visus naudotojus. I\u0161puoliai naudojant SS7 vykdomi per telefono ry\u0161\u012f, o ne per \"wifi\" ry\u0161\u012f.<\/p>\n<p>Autenti\u0161komis SS7 galimyb\u0117mis naudojasi \u012fsilau\u017e\u0117liai, nor\u0117dami gauti informacijos apie visus ry\u0161ius. Nor\u0117dami naudoti SS7 \u012fsilau\u017eimui, \u012fsilau\u017e\u0117liai turi i\u0161 interneto atsisi\u0173sti SS7 SDK. Tada jie naudoja SS7 SDK labai techni\u0161kai, kad s\u0117kmingai \u012fsilau\u017et\u0173.<\/p>\n<p>Tai padeda \u012fsilau\u017e\u0117liui prisijungti prie SS7 tinklo. Prisijung\u0119 jie eina \u012f tikslin\u012f tinkl\u0105. Tikslinis \u012frenginys negali to aptikti. Kadangi \u012frenginys j\u012f laiko MSC arba VLR mazgu.<br \/>\nPagrindin\u0117 veikla, kuri\u0105 atlieka \u012fsilau\u017e\u0117lis, nor\u0117damas gauti prieig\u0105 net prie labiausiai apsaugot\u0173 \u012frengini\u0173, yra \"MitM phishing\" ataka. Po \u0161ios atakos jis toliau siekia gauti norim\u0105 informacij\u0105. Tuomet \u012fsilau\u017e\u0117lis meistri\u0161kai gauna visus SMS ir skambu\u010di\u0173 duomenis, taip pat nustato tiksli\u0105 tikslinio asmens buvimo viet\u0105.<\/p>\n<p>Dauguma \u017emoni\u0173 naudoja 2FA kaip apsaug\u0105 nuo SS7 kenk\u0117ji\u0161k\u0173 program\u0173 atak\u0173. Ta\u010diau \u0161is mobiliojo ry\u0161io paslaug\u0173 teik\u0117j\u0173 apsaugos metodas nepasiteisina. Tokiais atvejais \u012fsilau\u017e\u0117liai j\u012f \u012fveikia ir kodus naudoja per\u0117mimo b\u016bdu. Jie naudoja kodus, kad gaut\u0173 prieig\u0105 prie daugyb\u0117s s\u0105skait\u0173, net banko s\u0105skait\u0173.<\/p>\n<p>Skaitmenin\u0117ms \u012fmon\u0117ms dabar gresia didesn\u0117 rizika. \u012esilau\u017e\u0117liai naudojasi vis\u0173 skaitmenini\u0173 \u012fmoni\u0173 asmenine informacija. Visa tai jie daro saugiai naudodami \"MitM phishing\" atakas. Skaitmenini\u0173 \u012fmoni\u0173 ry\u0161iai priklauso nuo SS7.<\/p>\n<p>Skaitmenin\u0117s \u012fmon\u0117s siun\u010dia savo svarbius profesinius failus, kuriuos visus gali lengvai pasiekti \u012fsilau\u017e\u0117liai. Skaitmenin\u0117je eroje daugyb\u0117 \u012frengini\u0173 naudoja mobiliuosius \u012frenginius svarbiems profesiniams duomenims perduoti. Skaitmenin\u0117ms \u012fmon\u0117ms gresia didesnis kibernetini\u0173 atak\u0173 pavojus. Ta\u010diau jos neskiria d\u0117mesio \u0161ioms atakoms \u012fveikti. \u012e \u0161i\u0105 problem\u0105 \u0161ios \u012fmon\u0117s tur\u0117t\u0173 \u017ei\u016br\u0117ti rimtai.<\/p>","protected":false},"excerpt":{"rendered":"<p>\u0160is laikmetis laikomas mobiliojo ry\u0161io eros prad\u017eia. Kiekvienas \u017emogus pernelyg da\u017enai naudojasi mobiliuoju telefonu. Naudojimasis mobiliuoju telefonu tapo kiekvieno \u017emogaus priklausomybe. Nuo vaik\u0173 iki profesional\u0173 - kiekvienas \u017emogus ki\u0161en\u0117je turi \u0161iuos prietaisus. Kibernetin\u0117s atakos per mobiliuosius telefonus tapo da\u017enesn\u0117s atsiradus 5G...<\/p>","protected":false},"author":1,"featured_media":401,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-388","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ss7-sms"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.7 (Yoast SEO v26.7) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How Hackers Are Exploiting SS7?<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sms-txt.net\/lt\/ss7-sms\/kaip-programisiai-isnaudoja-ss7\/\" \/>\n<meta property=\"og:locale\" content=\"lt_LT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Hackers Are Exploiting SS7?\" \/>\n<meta property=\"og:description\" content=\"This era is considered as the era of mobile use. Every single person is involved in excessive use of the mobile phone. Mobile use has become an addiction to every person. From kids to professionals, every person is having these gadgets in their pockets. Cyber-attacks over mobiles became more common with the arrival of 5G...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sms-txt.net\/lt\/ss7-sms\/kaip-programisiai-isnaudoja-ss7\/\" \/>\n<meta property=\"og:site_name\" content=\"SS7 Hacking\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-08T02:09:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-05T09:45:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7attack.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"761\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ss7\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ss7\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/\"},\"author\":{\"name\":\"ss7\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\"},\"headline\":\"How Hackers Are Exploiting SS7?\",\"datePublished\":\"2024-02-08T02:09:18+00:00\",\"dateModified\":\"2024-09-05T09:45:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/\"},\"wordCount\":879,\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7attack.jpg\",\"articleSection\":[\"SS7\"],\"inLanguage\":\"lt-LT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/\",\"url\":\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/\",\"name\":\"How Hackers Are Exploiting SS7?\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7attack.jpg\",\"datePublished\":\"2024-02-08T02:09:18+00:00\",\"dateModified\":\"2024-09-05T09:45:43+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#breadcrumb\"},\"inLanguage\":\"lt-LT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"lt-LT\",\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#primaryimage\",\"url\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7attack.jpg\",\"contentUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7attack.jpg\",\"width\":2000,\"height\":761,\"caption\":\"ss7 attack\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sms-txt.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Hackers Are Exploiting SS7?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sms-txt.net\/#website\",\"url\":\"https:\/\/sms-txt.net\/\",\"name\":\"SS7 Hacking\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sms-txt.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"lt-LT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sms-txt.net\/#organization\",\"name\":\"SS7\",\"url\":\"https:\/\/sms-txt.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"lt-LT\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"contentUrl\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"width\":866,\"height\":680,\"caption\":\"SS7\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\",\"name\":\"ss7\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Kaip \u012fsilau\u017e\u0117liai i\u0161naudoja SS7?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sms-txt.net\/lt\/ss7-sms\/kaip-programisiai-isnaudoja-ss7\/","og_locale":"lt_LT","og_type":"article","og_title":"How Hackers Are Exploiting SS7?","og_description":"This era is considered as the era of mobile use. Every single person is involved in excessive use of the mobile phone. Mobile use has become an addiction to every person. From kids to professionals, every person is having these gadgets in their pockets. Cyber-attacks over mobiles became more common with the arrival of 5G...","og_url":"https:\/\/sms-txt.net\/lt\/ss7-sms\/kaip-programisiai-isnaudoja-ss7\/","og_site_name":"SS7 Hacking","article_published_time":"2024-02-08T02:09:18+00:00","article_modified_time":"2024-09-05T09:45:43+00:00","og_image":[{"width":2000,"height":761,"url":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7attack.jpg","type":"image\/jpeg"}],"author":"ss7","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ss7","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#article","isPartOf":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/"},"author":{"name":"ss7","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0"},"headline":"How Hackers Are Exploiting SS7?","datePublished":"2024-02-08T02:09:18+00:00","dateModified":"2024-09-05T09:45:43+00:00","mainEntityOfPage":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/"},"wordCount":879,"publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"image":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#primaryimage"},"thumbnailUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7attack.jpg","articleSection":["SS7"],"inLanguage":"lt-LT"},{"@type":"WebPage","@id":"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/","url":"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/","name":"Kaip \u012fsilau\u017e\u0117liai i\u0161naudoja SS7?","isPartOf":{"@id":"https:\/\/sms-txt.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#primaryimage"},"image":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#primaryimage"},"thumbnailUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7attack.jpg","datePublished":"2024-02-08T02:09:18+00:00","dateModified":"2024-09-05T09:45:43+00:00","breadcrumb":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#breadcrumb"},"inLanguage":"lt-LT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/"]}]},{"@type":"ImageObject","inLanguage":"lt-LT","@id":"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#primaryimage","url":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7attack.jpg","contentUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7attack.jpg","width":2000,"height":761,"caption":"ss7 attack"},{"@type":"BreadcrumbList","@id":"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sms-txt.net\/"},{"@type":"ListItem","position":2,"name":"How Hackers Are Exploiting SS7?"}]},{"@type":"WebSite","@id":"https:\/\/sms-txt.net\/#website","url":"https:\/\/sms-txt.net\/","name":"SS7 \u012fsilau\u017eimas","description":"","publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sms-txt.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"lt-LT"},{"@type":"Organization","@id":"https:\/\/sms-txt.net\/#organization","name":"SS7","url":"https:\/\/sms-txt.net\/","logo":{"@type":"ImageObject","inLanguage":"lt-LT","@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/","url":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","contentUrl":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","width":866,"height":680,"caption":"SS7"},"image":{"@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0","name":"ss7"}]}},"_links":{"self":[{"href":"https:\/\/sms-txt.net\/lt\/wp-json\/wp\/v2\/posts\/388","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sms-txt.net\/lt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sms-txt.net\/lt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/lt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/lt\/wp-json\/wp\/v2\/comments?post=388"}],"version-history":[{"count":0,"href":"https:\/\/sms-txt.net\/lt\/wp-json\/wp\/v2\/posts\/388\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/lt\/wp-json\/wp\/v2\/media\/401"}],"wp:attachment":[{"href":"https:\/\/sms-txt.net\/lt\/wp-json\/wp\/v2\/media?parent=388"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sms-txt.net\/lt\/wp-json\/wp\/v2\/categories?post=388"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sms-txt.net\/lt\/wp-json\/wp\/v2\/tags?post=388"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}