{"id":473,"date":"2020-07-31T08:09:32","date_gmt":"2020-07-31T08:09:32","guid":{"rendered":"https:\/\/sms-txt.net\/?p=473"},"modified":"2021-03-19T20:13:24","modified_gmt":"2021-03-19T17:13:24","slug":"glavne-vrste-napadov-ss7","status":"publish","type":"post","link":"https:\/\/sms-txt.net\/sl\/ss7-sms\/glavne-vrste-napadov-ss7\/","title":{"rendered":"Glavne vrste napadov SS7"},"content":{"rendered":"<h1>V glavnem SS7 napadi 3 vrste:<\/h1>\n<ol>\n<li>Obvoznica za usmerjanje SMS Domov<\/li>\n<li>Izbolj\u0161anje dolo\u010danja polo\u017eaja med sledenjem lokacije<\/li>\n<li>Nevidno prestrezanje kratkih sporo\u010dil<\/li>\n<\/ol>\n<h2>SMS Gospodinjstvo za usmerjanje po obvoznici<\/h2>\n<p>Zlonamerne\u017e lahko zlahka presko\u010di ve\u010dino za\u0161\u010ditnih postopkov, \u010de je nastavil napake, ki niso jasne na prvi pogled. Nekateri strokovnjaki menijo, da \u010de bi izvedli alternativno usmerjanje SMS za gospodinjstva in konfigurirali z uporabo centra za samodejno oviranje sporo\u010dil kategorije palec, vsiljivec ne bi mogel pridobiti IMSI (International Mobile Subscriber Id ) in izvesti nevarnih napadov iz va\u0161ega <a href=\"https:\/\/yellow-jaguar-454368.hostingersite.com\/hack\/ss7-services-1-sms-intercept-call-location-tracking\/\">SS7<\/a> omre\u017eje. SMS Household Routing je programska in strojna re\u0161itev, ki potrjuje proxy dejanja zasebnih identifikatorjev naro\u010dnikov in naslovov opreme.<\/p>\n<p>Pri pridobivanju besedil iz zunanjih odnosov. Kategorija palec obsega sporo\u010dila SS7, ki jih je treba na splo\u0161no pridobiti samo znotraj istega omre\u017eja in ne na medomre\u017enih povezavah iz drugih omre\u017eij, razen \u010de za to obstaja posebna ureditev. IMSI se \u0161teje za zaupno informacijo, ker se uporablja za obravnavo naro\u010dnikov pri ve\u010dini operacij. Napadalec lahko izvede bolj zapletene napade z uporabo obnovljenega IMSI.<\/p>\n<h2>Izbolj\u0161anje dolo\u010danja polo\u017eaja med sledenjem lokacije<\/h2>\n<p>Med absolutno najbolj znanimi udarci v omre\u017ejih SS7 je spremljanje lokacije. Tudi vpra\u0161anje za lokacijo naro\u010dnika se posreduje prek omre\u017eij SS7, odgovor pa vklju\u010duje tudi individualnost bazne postaje. Vsaka bazna postaja ima posebne koordinate In obdeluje zelo dolo\u010deno lokacijo. Posledica tega je, da se kraj politike na, gostote Metropolis giblje od tiso\u010dih tiso\u010dih do deset tiso\u010dih metrov. Oseba lahko te posebnosti mobilnega omre\u017eja uporabi za ustvarjanje lokacijskih vpra\u0161anj in iskanje bazne postaje po njeni individualnosti z uporabo<\/p>\n<p>Prikrit napad SS7 Nabor javno dostopnih spletnih orodij. Resnica o tej lokaciji Zaznavanje lokacije temelji na lokaciji politike bazne postaje. Dejstvo je, da se zlonamerne\u017e odlo\u010di za kraj bazne postaje, ki deluje za naro\u010dnika v minuti. Na\u0161e analize ka\u017eejo, da so vsiljivci odkrili, da lahko z ve\u010djo natan\u010dnostjo ugotovijo lokacijo naro\u010dnika. Mobilni aparat obi\u010dajno dobi znake na ve\u010d baznih postajah.<\/p>\n<p>\u010ce zlonamerne\u017e dolo\u010di koordinate treh ali dveh baznih postaj, ki sta najbli\u017eje naro\u010dniku, se lahko lokacija naro\u010dnika zo\u017ei. Obi\u010dajno mobilni aparat izbere bazno postajo z vsemi optimalnimi\/optimalnimi radijskimi stanji v celotnem trgovanju. Zato mora mobilni aparat s pomo\u010djo tega omre\u017eja izmenjevati indikatorje. Tudi zlonamerne\u017e lahko uporabi SMS, da za\u010dne prikrito trgovanje z vsemi naro\u010dniki znamke. Informacije v zvezi s temi sporo\u010dili se lahko ponudijo iz naro\u010dnikove obravnave. Veliko u\u010dinkovitej\u0161a metoda za prikrito trgovanje je uporaba tihih obvestil USSD. \u010ceprav<\/p>\n<p>Ti posli Niso vpisani v postopek polnjenja, ki ga za\u010dnejo podpisati Trade-in med va\u0161im mobilnim sistemom in omre\u017ejem. Tudi zlonamerne\u017e lahko izbolj\u0161a natan\u010dnost lokacije z manipulacijo identifikacij baznih postaj in tihih obvestil USSD. Vsiljivec zahteva, da identifikator te trenutne bazne postaje ). Nato va\u0161 vsiljivec po\u0161lje tiho obvestilo USSD, da bi naro\u010dnikovo opremo spodbudil k izvedbi trgovanja prek radijskih vrat. V primeru, da ima zlonamerni napadalec<\/p>\n<p>Postavitev pove\u010dave. Blagoslovljeno, da lahko omre\u017eje izbere povsem sve\u017eo bazno postajo, da bi dobilo to posebno trgovino, skupaj s tem, da podatkovna baza VLR (Register lokacij obiskovalcev) nadgradi lokacijo naro\u010dnika.<\/p>\n<p>Nato vsiljivec vpra\u0161a, da to\u010dno lokacijo naro\u010dnika \u0160e enkrat in dobi, da identifikator te najnovej\u0161e bazne postaje. Tako lahko vsiljivec zo\u017ei kraj, v katerem se naro\u010dnik nahaja v<\/p>\n<p>Zapisnik.<\/p>\n<p>&nbsp;<\/p>\n<h2>Nevidno prestrezanje kratkih sporo\u010dil<\/h2>\n<p>Omejeno prestrezanje koncepta je le eden od absolutno najnevarnej\u0161ih napadov na omre\u017eja SS7. Veliko storitev uporablja SMS kot postajo. Na primer, ban\u010dne ustanove uporabljajo SMS za dostavo OTP (enkratno geslo), dru\u017ebena omre\u017eja pa za pridobivanje gesel, sporo\u010dilniki pa za dostop do te aplikacije. Da bi povzro\u010dil dohodno sporo\u010dilo SMS, mora vsiljivec vpisati naro\u010dnika v \"la\u017eno\" omre\u017eje z uporabo bistvenih naprav.<\/p>\n<p>Napad simulira naro\u010dnika, ki se giblje v dru\u017ebenem omre\u017eju. HLR ima seznam nove lokacije tega naro\u010dnika, na kateri so bili poslani zaklju\u010dni klici in sporo\u010dila SMS. V primeru napovedi je prizadevanje neuspe\u0161no<\/p>\n<p>Omre\u017eje naro\u010dnika vpi\u0161e nazaj v njegovo doma\u010de omre\u017eje. Storilec vidi, da lahko ponovi udarec, da bi zaslu\u017eil za drugi klic, ki je bil zanemarjen. Poleg tega lahko v primeru, da napadalci poveljujejo omre\u017eni komponenti, ki je lahko signalizirana kot povsem nov MSC, prestre\u017eejo sporo\u010dila SMS in preusmerijo zaklju\u010devanje govornih telefonskih klicev.<\/p>","protected":false},"excerpt":{"rendered":"<p>V glavnem SS7 napadi 3 vrste: Zlonamerne\u017ei lahko zlahka presko\u010dijo ve\u010dino za\u0161\u010ditnih postopkov, \u010de imajo napake pri nastavitvah, ki niso jasne na prvi pogled. Nekateri strokovnjaki menijo, da \u010de bi izvedli alternativno usmerjanje SMS Household Routing Alternative in konfigurirali...<\/p>","protected":false},"author":1,"featured_media":1729,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[69,1],"tags":[],"class_list":["post-473","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sms-intercept","category-ss7-sms"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.7 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Main type of SS7 Attacks<\/title>\n<meta name=\"description\" content=\"How to use SS7 attacks using our intercept software for calls, location and sms. Learn about different types of SS7 attacls.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sms-txt.net\/sl\/ss7-sms\/glavne-vrste-napadov-ss7\/\" \/>\n<meta property=\"og:locale\" content=\"sl_SI\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Main type of SS7 Attacks\" \/>\n<meta property=\"og:description\" content=\"How to use SS7 attacks using our intercept software for calls, location and sms. Learn about different types of SS7 attacls.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sms-txt.net\/sl\/ss7-sms\/glavne-vrste-napadov-ss7\/\" \/>\n<meta property=\"og:site_name\" content=\"SS7 Hacking\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-31T08:09:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-19T17:13:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Main-type-of-SS7-Attacks.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"506\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ss7\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ss7\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sms-txt.net\\\/ss7-sms\\\/main-type-of-ss7-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sms-txt.net\\\/ss7-sms\\\/main-type-of-ss7-attacks\\\/\"},\"author\":{\"name\":\"ss7\",\"@id\":\"https:\\\/\\\/sms-txt.net\\\/#\\\/schema\\\/person\\\/fa482bf9132db58e46bb9c9df2d73be0\"},\"headline\":\"Main type of SS7 Attacks\",\"datePublished\":\"2020-07-31T08:09:32+00:00\",\"dateModified\":\"2021-03-19T17:13:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sms-txt.net\\\/ss7-sms\\\/main-type-of-ss7-attacks\\\/\"},\"wordCount\":778,\"publisher\":{\"@id\":\"https:\\\/\\\/sms-txt.net\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sms-txt.net\\\/ss7-sms\\\/main-type-of-ss7-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sms-txt.net\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/Main-type-of-SS7-Attacks.jpg\",\"articleSection\":[\"SMS Intercept\",\"SS7\"],\"inLanguage\":\"sl-SI\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sms-txt.net\\\/ss7-sms\\\/main-type-of-ss7-attacks\\\/\",\"url\":\"https:\\\/\\\/sms-txt.net\\\/ss7-sms\\\/main-type-of-ss7-attacks\\\/\",\"name\":\"Main type of SS7 Attacks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sms-txt.net\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sms-txt.net\\\/ss7-sms\\\/main-type-of-ss7-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sms-txt.net\\\/ss7-sms\\\/main-type-of-ss7-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sms-txt.net\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/Main-type-of-SS7-Attacks.jpg\",\"datePublished\":\"2020-07-31T08:09:32+00:00\",\"dateModified\":\"2021-03-19T17:13:24+00:00\",\"description\":\"How to use SS7 attacks using our intercept software for calls, location and sms. Learn about different types of SS7 attacls.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sms-txt.net\\\/ss7-sms\\\/main-type-of-ss7-attacks\\\/#breadcrumb\"},\"inLanguage\":\"sl-SI\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sms-txt.net\\\/ss7-sms\\\/main-type-of-ss7-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sl-SI\",\"@id\":\"https:\\\/\\\/sms-txt.net\\\/ss7-sms\\\/main-type-of-ss7-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sms-txt.net\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/Main-type-of-SS7-Attacks.jpg\",\"contentUrl\":\"https:\\\/\\\/sms-txt.net\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/Main-type-of-SS7-Attacks.jpg\",\"width\":900,\"height\":506},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sms-txt.net\\\/ss7-sms\\\/main-type-of-ss7-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sms-txt.net\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Main type of SS7 Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sms-txt.net\\\/#website\",\"url\":\"https:\\\/\\\/sms-txt.net\\\/\",\"name\":\"SS7 Hacking\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/sms-txt.net\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sms-txt.net\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sl-SI\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sms-txt.net\\\/#organization\",\"name\":\"SS7\",\"url\":\"https:\\\/\\\/sms-txt.net\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sl-SI\",\"@id\":\"https:\\\/\\\/sms-txt.net\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/yellow-jaguar-454368.hostingersite.com\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/logo.jpg\",\"contentUrl\":\"https:\\\/\\\/yellow-jaguar-454368.hostingersite.com\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/logo.jpg\",\"width\":866,\"height\":680,\"caption\":\"SS7\"},\"image\":{\"@id\":\"https:\\\/\\\/sms-txt.net\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sms-txt.net\\\/#\\\/schema\\\/person\\\/fa482bf9132db58e46bb9c9df2d73be0\",\"name\":\"ss7\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Glavne vrste napadov SS7","description":"Kako uporabljati napade SS7 z uporabo na\u0161e programske opreme za prestrezanje klicev, lokacije in SMS-sporo\u010dil. Spoznajte razli\u010dne vrste napadov SS7.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sms-txt.net\/sl\/ss7-sms\/glavne-vrste-napadov-ss7\/","og_locale":"sl_SI","og_type":"article","og_title":"Main type of SS7 Attacks","og_description":"How to use SS7 attacks using our intercept software for calls, location and sms. Learn about different types of SS7 attacls.","og_url":"https:\/\/sms-txt.net\/sl\/ss7-sms\/glavne-vrste-napadov-ss7\/","og_site_name":"SS7 Hacking","article_published_time":"2020-07-31T08:09:32+00:00","article_modified_time":"2021-03-19T17:13:24+00:00","og_image":[{"width":900,"height":506,"url":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Main-type-of-SS7-Attacks.jpg","type":"image\/jpeg"}],"author":"ss7","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ss7","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/#article","isPartOf":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/"},"author":{"name":"ss7","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0"},"headline":"Main type of SS7 Attacks","datePublished":"2020-07-31T08:09:32+00:00","dateModified":"2021-03-19T17:13:24+00:00","mainEntityOfPage":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/"},"wordCount":778,"publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"image":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Main-type-of-SS7-Attacks.jpg","articleSection":["SMS Intercept","SS7"],"inLanguage":"sl-SI"},{"@type":"WebPage","@id":"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/","url":"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/","name":"Glavne vrste napadov SS7","isPartOf":{"@id":"https:\/\/sms-txt.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/#primaryimage"},"image":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Main-type-of-SS7-Attacks.jpg","datePublished":"2020-07-31T08:09:32+00:00","dateModified":"2021-03-19T17:13:24+00:00","description":"Kako uporabljati napade SS7 z uporabo na\u0161e programske opreme za prestrezanje klicev, lokacije in SMS-sporo\u010dil. Spoznajte razli\u010dne vrste napadov SS7.","breadcrumb":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/#breadcrumb"},"inLanguage":"sl-SI","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"sl-SI","@id":"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/#primaryimage","url":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Main-type-of-SS7-Attacks.jpg","contentUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Main-type-of-SS7-Attacks.jpg","width":900,"height":506},{"@type":"BreadcrumbList","@id":"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sms-txt.net\/"},{"@type":"ListItem","position":2,"name":"Main type of SS7 Attacks"}]},{"@type":"WebSite","@id":"https:\/\/sms-txt.net\/#website","url":"https:\/\/sms-txt.net\/","name":"Vdiranje v SS7","description":"","publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sms-txt.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sl-SI"},{"@type":"Organization","@id":"https:\/\/sms-txt.net\/#organization","name":"SS7","url":"https:\/\/sms-txt.net\/","logo":{"@type":"ImageObject","inLanguage":"sl-SI","@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/","url":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","contentUrl":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","width":866,"height":680,"caption":"SS7"},"image":{"@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0","name":"ss7"}]}},"_links":{"self":[{"href":"https:\/\/sms-txt.net\/sl\/wp-json\/wp\/v2\/posts\/473","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sms-txt.net\/sl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sms-txt.net\/sl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/sl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/sl\/wp-json\/wp\/v2\/comments?post=473"}],"version-history":[{"count":0,"href":"https:\/\/sms-txt.net\/sl\/wp-json\/wp\/v2\/posts\/473\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/sl\/wp-json\/wp\/v2\/media\/1729"}],"wp:attachment":[{"href":"https:\/\/sms-txt.net\/sl\/wp-json\/wp\/v2\/media?parent=473"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sms-txt.net\/sl\/wp-json\/wp\/v2\/categories?post=473"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sms-txt.net\/sl\/wp-json\/wp\/v2\/tags?post=473"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}