{"id":473,"date":"2020-07-31T08:09:32","date_gmt":"2020-07-31T08:09:32","guid":{"rendered":"https:\/\/sms-txt.net\/?p=473"},"modified":"2021-03-19T20:13:24","modified_gmt":"2021-03-19T17:13:24","slug":"principalele-tipuri-de-atacuri-ss7","status":"publish","type":"post","link":"https:\/\/sms-txt.net\/ro\/ss7-sms\/principalele-tipuri-de-atacuri-ss7\/","title":{"rendered":"Principalele tipuri de atacuri SS7"},"content":{"rendered":"<h1>\u00cen principal SS7 atac\u0103 3 tipuri:<\/h1>\n<ol>\n<li>Ocolirea rutei de domiciliu SMS<\/li>\n<li>\u00cembun\u0103t\u0103\u021birea pozi\u021bion\u0103rii \u00een timpul urm\u0103ririi loca\u021biei<\/li>\n<li>Interceptarea invizibil\u0103 a mesajelor scurte<\/li>\n<\/ol>\n<h2>SMS Rutare menajer\u0103 By-pass<\/h2>\n<p>Un r\u0103uf\u0103c\u0103tor poate s\u0103ri cu u\u0219urin\u021b\u0103 peste majoritatea procedurilor de protec\u021bie \u00een cazul \u00een care au configurat gre\u0219eli care nu sunt clare la prima vedere. Unii speciali\u0219ti simt c\u0103 \u00een cazul \u00een care au executat SMS Household Routing Alternative \u0219i configurat cu folosind unelte de centru pentru a obstruc\u021biona \u00een mod automat categoria Inch mesaje, nu ar fi posibil pentru intrus s\u0103 dob\u00e2ndeasc\u0103 IMSI (International Mobile Subscriber Id ) \u0219i s\u0103 execute lovituri periculoase de la dvs. <a href=\"https:\/\/yellow-jaguar-454368.hostingersite.com\/hack\/ss7-services-1-sms-intercept-call-location-tracking\/\">SS7<\/a> re\u021bea. SMS Household Routing este \u00eentr-adev\u0103r o solu\u021bie software \u0219i hardware care afirm\u0103 acte Proxy de identificatori de abonat privat \u0219i adrese de unelte<\/p>\n<p>Atunci c\u00e2nd se achizi\u021bioneaz\u0103 texte de la rela\u021bii externe. Categoria Inch cuprinde mesajele SS7, care ar trebui, \u00een general, s\u0103 fie ob\u021binute doar din interiorul aceleia\u0219i re\u021bele, mai degrab\u0103 dec\u00e2t pe hyperlink-uri de interconectare din alte re\u021bele, cu excep\u021bia cazului \u00een care exist\u0103 un aranjament specific pentru a realiza acest lucru. IMSI este considerat\u0103 informa\u021bie confiden\u021bial\u0103 deoarece este utilizat\u0103 pentru a trata cu abona\u021bii \u00een majoritatea opera\u021biunilor. Un atacator ar putea efectua atacuri mai complexe folosind un IMSI recuperat.<\/p>\n<h2>\u00cembun\u0103t\u0103\u021birea pozi\u021bion\u0103rii \u00een timpul urm\u0103ririi loca\u021biei<\/h2>\n<p>Printre absolut, cele mai cunoscute greve pe re\u021bele SS7 este monitorizarea loca\u021biei. Chiar \u0219i o cerere pentru loca\u021bia abonatului este direc\u021bionat\u0103 prin re\u021bele SS7 \u0219i, de asemenea, r\u0103spunsul include Individualitatea sta\u021biei de baz\u0103. Fiecare sta\u021bie de baz\u0103 are coordonate speciale \u0218i se ocup\u0103 de o loca\u021bie foarte anumit\u0103. Ca urmare, locul de politic\u0103 la un, de densitate Metropola variaz\u0103 de la mii de mii la zeci de mii de metri. O persoan\u0103 poate Folosi aceste particularit\u0103\u021bi ale re\u021belei mobile pentru a crea The location asks, \u0219i pentru a G\u0103si sta\u021bia de baz\u0103 prin propria individualitate utiliz\u00e2nd<\/p>\n<p>Stealthy SS7 attack O serie de instrumente online accesibile publicului. Adev\u0103rul acestei detec\u021bii a loca\u021biei se bazeaz\u0103 pe loca\u021bia politicii sta\u021biei de baz\u0103. De fapt, c\u0103 r\u0103uf\u0103c\u0103torul decide locul sta\u021biei de baz\u0103 care Func\u021bioneaz\u0103 abonatul \u00een minutul. Analizele noastre Dezv\u0103luie C\u0103 intru\u0219ii au descoperit s\u0103 Afle c\u0103 loca\u021bia abonatului cu o precizie \u00eembun\u0103t\u0103\u021bit\u0103. Un aparat mobil prime\u0219te de obicei semnale \u00een mai multe sta\u021bii de baz\u0103.<\/p>\n<p>\u00cen cazul \u00een care r\u0103uf\u0103c\u0103torul decide coordonatele a trei sau dou\u0103 sta\u021bii de baz\u0103 cele mai apropiate de abonat, loca\u021bia abonatului poate fi restr\u00e2ns\u0103. \u00cen mod normal, un aparat mobil selecteaz\u0103 o sta\u021bie de baz\u0103 cu toate st\u0103rile radio optime\/optime pe parcursul unei tranzac\u021bii. Prin urmare, aparatul mobil trebuie s\u0103 interschimbe indicii \u00eempreun\u0103 utiliz\u00e2nd aceast\u0103 re\u021bea. Chiar \u0219i r\u0103uf\u0103c\u0103torul poate utiliza un SMS pentru a \u00eencepe un schimb ascuns cu to\u021bi abona\u021bii m\u0103rcii. Informa\u021biile referitoare la aceste mesaje pot fi oferite din considera\u021bia abonatului. O metod\u0103 mult mai eficient\u0103 de a ascunde comer\u021bul este de a utiliza notific\u0103ri USSD silen\u021bioase. De\u0219i<\/p>\n<p>Aceste tranzac\u021bii nu sunt \u00eenscrise \u00een procedura de \u00eenc\u0103rcare \u0219i \u00eencep s\u0103 semneze Trade-in \u00eentre sistemul mobil \u0219i re\u021bea. Chiar \u0219i r\u0103uf\u0103c\u0103torul poate spori precizia localiz\u0103rii manipul\u00e2nd identific\u0103rile sta\u021biilor de baz\u0103 \u0219i notific\u0103rile USSD silen\u021bioase. Intrusul cere ca identificatorul acestei sta\u021bii de baz\u0103 actuale ). Ulterior, intrusul transmite o notificare USSD silen\u021bioas\u0103 astfel \u00eenc\u00e2t s\u0103 induc\u0103 echipamentul abonatului s\u0103 efectueze o tranzac\u021bie prin intermediul portului radio. \u00cen cazul \u00een care r\u0103uf\u0103c\u0103torul are<\/p>\n<p>Plasarea cre\u0219terii. Binecuv\u00e2ntat, c\u0103 re\u021beaua ar putea alege o sta\u021bie de baz\u0103 nou-nou\u021b pentru a ob\u021bine acest comer\u021b special, \u00eempreun\u0103 cu c\u0103 baza de date VLR (Visitor Location Register) actualizeaz\u0103 loca\u021bia abonatului.<\/p>\n<p>Apoi, intrusul solicit\u0103 \u00eenc\u0103 o dat\u0103 loca\u021bia exact\u0103 a abonatului \u0219i ob\u021bine identificatorul celei mai noi sta\u021bii de baz\u0103. Astfel, intrusul ar putea restr\u00e2nge locul \u00een care abonatul poate fi g\u0103sit \u00een<\/p>\n<p>Minute.<\/p>\n<p>&nbsp;<\/p>\n<h2>Interceptarea invizibil\u0103 a mesajelor scurte<\/h2>\n<p>Interceptarea conceptului limitat este doar una dintre cele mai periculoase lovituri asupra re\u021belelor SS7. O mul\u021bime de servicii utilizeaz\u0103 SMS ca fiind o sta\u021bie. De exemplu, institu\u021biile bancare utilizeaz\u0103 SMS pentru a ob\u021bine livrarea OTP (One Time Password) \u0219i re\u021belele societale pentru recuperarea parolei, mesagerii pentru a ob\u021bine acces \u00een aceast\u0103 aplica\u021bie. Ca modalitate de a induce un SMS primit, intrusul ar trebui s\u0103 \u00eenscrie un abonat \u00eentr-o re\u021bea \"fals\u0103\" utiliz\u00e2nd dispozitivele esen\u021biale.<\/p>\n<p>Atacul simuleaz\u0103 un abonat aflat \u00een deriv\u0103 \u00eentr-o re\u021bea social\u0103. HLR a ob\u021binut O list\u0103 a noii loca\u021bii a acestui abonat la care au fost trimise apeluri de terminare \u0219i mesaje SMS. \u00cen cazul unei previziuni, efortul e\u0219ueaz\u0103<\/p>\n<p>Re\u021beaua \u00eenscrie abonatul \u00eenapoi \u00een propria re\u021bea de domiciliu. Infractorul vede c\u0103 poate replica lovitura pentru a c\u00e2\u0219tiga neglijarea celui de-al doilea efort de apel. \u00cen plus, \u00een cazul \u00een care atacatorii comand\u0103 componenta de re\u021bea, care poate fi semnalat\u0103 ca fiind un MSC nou-nou\u021b, ace\u0219tia ar putea intercepta mesajele SMS \u0219i ar putea deturna apelurile telefonice de voce Terminating.<\/p>","protected":false},"excerpt":{"rendered":"<p>\u00cen principal atacuri SS7 3 tipuri: SMS Home Routing Bypass \u00cembun\u0103t\u0103\u021birea pozi\u021bion\u0103rii \u00een timpul urm\u0103ririi loca\u021biei Interceptarea invizibil\u0103 a mesajelor scurte SMS Household Routing By-pass Un r\u0103uf\u0103c\u0103tor poate s\u0103ri cu u\u0219urin\u021b\u0103 peste majoritatea procedurilor de protec\u021bie \u00een cazul \u00een care a configurat gre\u0219eli care nu sunt clare la prima vedere. Unii speciali\u0219ti simt c\u0103 \u00een cazul \u00een care au executat SMS Household Routing Alternative \u0219i configurat...<\/p>","protected":false},"author":1,"featured_media":1729,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[69,1],"tags":[],"class_list":["post-473","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sms-intercept","category-ss7-sms"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.7 (Yoast SEO v26.7) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Main type of SS7 Attacks<\/title>\n<meta name=\"description\" content=\"How to use SS7 attacks using our intercept software for calls, location and sms. Learn about different types of SS7 attacls.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sms-txt.net\/ro\/ss7-sms\/principalele-tipuri-de-atacuri-ss7\/\" \/>\n<meta property=\"og:locale\" content=\"ro_RO\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Main type of SS7 Attacks\" \/>\n<meta property=\"og:description\" content=\"How to use SS7 attacks using our intercept software for calls, location and sms. Learn about different types of SS7 attacls.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sms-txt.net\/ro\/ss7-sms\/principalele-tipuri-de-atacuri-ss7\/\" \/>\n<meta property=\"og:site_name\" content=\"SS7 Hacking\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-31T08:09:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-19T17:13:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Main-type-of-SS7-Attacks.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"506\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ss7\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ss7\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/\"},\"author\":{\"name\":\"ss7\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\"},\"headline\":\"Main type of SS7 Attacks\",\"datePublished\":\"2020-07-31T08:09:32+00:00\",\"dateModified\":\"2021-03-19T17:13:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/\"},\"wordCount\":778,\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Main-type-of-SS7-Attacks.jpg\",\"articleSection\":[\"SMS Intercept\",\"SS7\"],\"inLanguage\":\"ro-RO\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/\",\"url\":\"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/\",\"name\":\"Main type of SS7 Attacks\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Main-type-of-SS7-Attacks.jpg\",\"datePublished\":\"2020-07-31T08:09:32+00:00\",\"dateModified\":\"2021-03-19T17:13:24+00:00\",\"description\":\"How to use SS7 attacks using our intercept software for calls, location and sms. Learn about different types of SS7 attacls.\",\"breadcrumb\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/#breadcrumb\"},\"inLanguage\":\"ro-RO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/#primaryimage\",\"url\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Main-type-of-SS7-Attacks.jpg\",\"contentUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Main-type-of-SS7-Attacks.jpg\",\"width\":900,\"height\":506},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sms-txt.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Main type of SS7 Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sms-txt.net\/#website\",\"url\":\"https:\/\/sms-txt.net\/\",\"name\":\"SS7 Hacking\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sms-txt.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ro-RO\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sms-txt.net\/#organization\",\"name\":\"SS7\",\"url\":\"https:\/\/sms-txt.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"contentUrl\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"width\":866,\"height\":680,\"caption\":\"SS7\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\",\"name\":\"ss7\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Principalele tipuri de atacuri SS7","description":"Cum s\u0103 utiliza\u021bi atacurile SS7 folosind software-ul nostru de interceptare a apelurilor, loca\u021biei \u0219i sms-urilor. Afla\u021bi despre diferitele tipuri de atacuri SS7.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sms-txt.net\/ro\/ss7-sms\/principalele-tipuri-de-atacuri-ss7\/","og_locale":"ro_RO","og_type":"article","og_title":"Main type of SS7 Attacks","og_description":"How to use SS7 attacks using our intercept software for calls, location and sms. Learn about different types of SS7 attacls.","og_url":"https:\/\/sms-txt.net\/ro\/ss7-sms\/principalele-tipuri-de-atacuri-ss7\/","og_site_name":"SS7 Hacking","article_published_time":"2020-07-31T08:09:32+00:00","article_modified_time":"2021-03-19T17:13:24+00:00","og_image":[{"width":900,"height":506,"url":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Main-type-of-SS7-Attacks.jpg","type":"image\/jpeg"}],"author":"ss7","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ss7","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/#article","isPartOf":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/"},"author":{"name":"ss7","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0"},"headline":"Main type of SS7 Attacks","datePublished":"2020-07-31T08:09:32+00:00","dateModified":"2021-03-19T17:13:24+00:00","mainEntityOfPage":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/"},"wordCount":778,"publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"image":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Main-type-of-SS7-Attacks.jpg","articleSection":["SMS Intercept","SS7"],"inLanguage":"ro-RO"},{"@type":"WebPage","@id":"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/","url":"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/","name":"Principalele tipuri de atacuri SS7","isPartOf":{"@id":"https:\/\/sms-txt.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/#primaryimage"},"image":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Main-type-of-SS7-Attacks.jpg","datePublished":"2020-07-31T08:09:32+00:00","dateModified":"2021-03-19T17:13:24+00:00","description":"Cum s\u0103 utiliza\u021bi atacurile SS7 folosind software-ul nostru de interceptare a apelurilor, loca\u021biei \u0219i sms-urilor. Afla\u021bi despre diferitele tipuri de atacuri SS7.","breadcrumb":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/#breadcrumb"},"inLanguage":"ro-RO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/#primaryimage","url":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Main-type-of-SS7-Attacks.jpg","contentUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Main-type-of-SS7-Attacks.jpg","width":900,"height":506},{"@type":"BreadcrumbList","@id":"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sms-txt.net\/"},{"@type":"ListItem","position":2,"name":"Main type of SS7 Attacks"}]},{"@type":"WebSite","@id":"https:\/\/sms-txt.net\/#website","url":"https:\/\/sms-txt.net\/","name":"Hacking SS7","description":"","publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sms-txt.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ro-RO"},{"@type":"Organization","@id":"https:\/\/sms-txt.net\/#organization","name":"SS7","url":"https:\/\/sms-txt.net\/","logo":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/","url":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","contentUrl":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","width":866,"height":680,"caption":"SS7"},"image":{"@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0","name":"ss7"}]}},"_links":{"self":[{"href":"https:\/\/sms-txt.net\/ro\/wp-json\/wp\/v2\/posts\/473","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sms-txt.net\/ro\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sms-txt.net\/ro\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/ro\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/ro\/wp-json\/wp\/v2\/comments?post=473"}],"version-history":[{"count":0,"href":"https:\/\/sms-txt.net\/ro\/wp-json\/wp\/v2\/posts\/473\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/ro\/wp-json\/wp\/v2\/media\/1729"}],"wp:attachment":[{"href":"https:\/\/sms-txt.net\/ro\/wp-json\/wp\/v2\/media?parent=473"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sms-txt.net\/ro\/wp-json\/wp\/v2\/categories?post=473"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sms-txt.net\/ro\/wp-json\/wp\/v2\/tags?post=473"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}