{"id":466,"date":"2024-08-29T08:05:47","date_gmt":"2024-08-29T05:05:47","guid":{"rendered":"https:\/\/sms-txt.net\/?p=466"},"modified":"2024-09-05T12:47:59","modified_gmt":"2024-09-05T09:47:59","slug":"ss7-saldirisi-icin-bilgi-sizintisi-nasil","status":"publish","type":"post","link":"https:\/\/sms-txt.net\/tr\/ss7-sms\/ss7-saldirisi-icin-bilgi-sizintisi-nasil\/","title":{"rendered":"SS7 sald\u0131r\u0131s\u0131 i\u00e7in bilgi s\u0131z\u0131nt\u0131s\u0131 nas\u0131l"},"content":{"rendered":"<h1>Bilgi s\u0131z\u0131nt\u0131s\u0131<\/h1>\n<p>Sald\u0131r\u0131lar\u0131n hemen hemen tamam\u0131, operat\u00f6r\u00fcn \u015febekesi ile birlikte aboneye ili\u015fkin bilgilerin g\u00f6r\u00fcnt\u00fclenmesini hedeflemi\u015ftir. Doland\u0131r\u0131c\u0131l\u0131k, abone trafi\u011fine m\u00fcdahale ve ayr\u0131ca aboneler i\u00e7in hizmet eri\u015filebilirli\u011finin bozulmas\u0131 y\u00fczde ikiden \u00f6nemli \u00f6l\u00e7\u00fcde daha azd\u0131r.<\/p>\n<p>&nbsp;<\/p>\n<p>Tedarik, bir sald\u0131rgan\u0131n sahibinin a\u011f\u0131n\u0131n abone tan\u0131mlay\u0131c\u0131lar\u0131na ve sunucu adreslerine nas\u0131l ula\u015fmas\u0131 gerekti\u011finin bir sonucudur. Daha fazla sald\u0131r\u0131, gerekli olan bilgileri elde etmenin merhametindedir. Veri madencili\u011fi, aboneye belirli bir sald\u0131r\u0131 oldu\u011funu g\u00f6stermez. Karma\u015f\u0131k sald\u0131r\u0131lar yapmak yerine, ek s\u0131n\u0131flarla ilgili bilgileri satmaya \u00e7al\u0131\u015farak tekrar kazanmak i\u00e7in daha az zor bir yakla\u015f\u0131m var. Hacim sorgular\u0131, sald\u0131rganlar\u0131n art\u0131k telefon numaralar\u0131n\u0131n ki\u015fi tan\u0131mlay\u0131c\u0131lar\u0131yla kar\u015f\u0131la\u015ft\u0131r\u0131ld\u0131\u011f\u0131 abone bilgi tabanlar\u0131n\u0131 olu\u015fturdu\u011funu ve sekt\u00f6rde bilgi sat\u0131n almak i\u00e7in sahibinin verilerini toplad\u0131\u011f\u0131n\u0131 g\u00f6sterebilir.<\/p>\n<p>&nbsp;<\/p>\n<p>Kendinize bir ki\u015fi IMSI almay\u0131 hedefleyen her sald\u0131r\u0131, ayr\u0131ca a\u011f kurulumunu g\u00f6stermeyi hedefleyen her sald\u0131r\u0131, sald\u0131rganlar\u0131n arad\u0131klar\u0131 bilgileri elde etmelerine hizmet etti. Bilgi edinmek i\u00e7in ba\u015fl\u0131ca iki strateji kullan\u0131lm\u0131\u015ft\u0131r: AnyTimeInterrogation ve ayr\u0131ca SendRoutingInfo. Her ikisi de a\u011f bilgilerinin if\u015fa edilmesine izin verir ve ayr\u0131ca SendRoutingInfo sadece bir abone IMSI'si verir; buna ek olarak, bu mesajlar abonenin konumunun ke\u015ffedilmesini m\u00fcmk\u00fcn k\u0131lar. Sonu\u00e7lar\u0131m\u0131z\u0131n ortaya koydu\u011fu gibi, bu t\u00fcr sipari\u015flere verilen a\u011f yan\u0131tlar\u0131n\u0131n y\u00fczde 17,5'inde bir abonenin konumuna ili\u015fkin veriler i\u00e7eriyordu.<\/p>\n<p>&nbsp;<\/p>\n<p>A\u011f kaynaklar\u0131ndaki (STP, HLR) filtreleme tercihleri veya hedeflenen ziyaret\u00e7ileri i\u015faretlemek i\u00e7in uygun \u015fekilde yap\u0131land\u0131r\u0131lm\u0131\u015f baz\u0131 filtreleme programlar\u0131, bu mesajlar\u0131 kullanarak sald\u0131r\u0131 olas\u0131l\u0131\u011f\u0131n\u0131 tamamen ortadan kald\u0131racak ve bu nedenle farkl\u0131 tehlikelerin olas\u0131l\u0131\u011f\u0131n\u0131 azaltacakt\u0131r. Bununla birlikte, ileti\u015fim filtreleme alternatifleri genellikle bazen uygulanmaz. \u00d6rne\u011fin, t\u00fcketici konumunu ke\u015ffetmeyi hedefleyen taleplere verilen yan\u0131tlar\u0131n oran\u0131, di\u011fer a\u011flara k\u0131yasla sinyalizasyon ziyaret\u00e7ilerini engelleme yakla\u015f\u0131m\u0131 ile korunan a\u011flarla doludur.<\/p>\n<p>A\u011f kurulumunu ve abone tan\u0131mlay\u0131c\u0131lar\u0131n\u0131 g\u00f6r\u00fcnt\u00fclemeye y\u00f6nelik t\u00fcm sald\u0131r\u0131lar i\u00e7in yakla\u015f\u0131k olarak tam olarak kesin nihai sonu\u00e7lar elde edildi. T\u00fcm bunlar ger\u00e7ekten iyi i\u015faretler. Etkili olan g\u00fcvenlik ad\u0131mlar\u0131n\u0131 ortaya koyarlar. Kurulumun do\u011fru olmas\u0131 durumunda, g\u00fc\u00e7l\u00fc sald\u0131r\u0131lar\u0131n y\u00fczdesi s\u0131f\u0131ra indirilir. \u00c7o\u011fu a\u011f\u0131n, SendRoutingInfoForSM sistemine dayal\u0131 sald\u0131r\u0131lara kar\u015f\u0131 koymak i\u00e7in SMS ev Y\u00f6nlendirme program\u0131n\u0131 kullanmas\u0131 dikkat \u00e7ekicidir.<\/p>\n<p>&nbsp;<\/p>\n<p>SendRoutingInfoForSM ileti\u015fimi, SMS'i sa\u011flamak i\u00e7in gerekli bilgileri sorar: abone tan\u0131mlay\u0131c\u0131s\u0131n\u0131n yan\u0131 s\u0131ra ana bilgisayar\u0131n adresi. Tipik \u00e7al\u0131\u015fma modunda, bir SMS'in bu belirli bilgilere ba\u011fl\u0131 kalmas\u0131 gerekir, sorulan her dilek\u00e7enin, tan\u0131mlay\u0131c\u0131lar ve adresler veren SMS ev Y\u00f6nlendirme program\u0131n\u0131za teslim edilmesi gerekti\u011fi d\u00fc\u015f\u00fcn\u00fclmektedir. Hatal\u0131 a\u011f donan\u0131m\u0131 nedeniyle, bu kapsama tekni\u011finin, taleplerin SMS ev Y\u00f6nlendirmesini atlayabildi\u011fi vakalar\u0131n y\u00fczde 87'sinde verimli olmad\u0131\u011f\u0131 kan\u0131tlanm\u0131\u015ft\u0131r. Benzer etkiler taraf\u0131m\u0131zdan SS7 a\u011f g\u00fcvenli\u011fi de\u011ferlendirmesi plan\u0131nda da ke\u015ffedilmi\u015ftir.<\/p>","protected":false},"excerpt":{"rendered":"<p>Bilgi s\u0131z\u0131nt\u0131s\u0131 Sald\u0131r\u0131lar\u0131n hemen hemen tamam\u0131, operat\u00f6r\u00fcn \u015febekesi ile birlikte aboneye ili\u015fkin bilgilerin g\u00f6r\u00fcnt\u00fclenmesini hedeflemi\u015ftir. Doland\u0131r\u0131c\u0131l\u0131k, abone trafi\u011finin durdurulmas\u0131 ve ayr\u0131ca aboneler i\u00e7in hizmet eri\u015filebilirli\u011finin bozulmas\u0131 y\u00fczde ikiden \u00f6nemli \u00f6l\u00e7\u00fcde daha azd\u0131r.   Tedarik, bir sald\u0131rgan\u0131n abone tan\u0131mlay\u0131c\u0131lar\u0131na nas\u0131l ula\u015fmas\u0131 gerekti\u011finin bir sonucudur ve ...<\/p>","protected":false},"author":1,"featured_media":1731,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[69,1],"tags":[],"class_list":["post-466","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sms-intercept","category-ss7-sms"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.7 (Yoast SEO v26.7) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How Information leakage for SS7 attack<\/title>\n<meta name=\"description\" content=\"How SS7 Hacks and attacks are perform to leak information. Intercept the sms and call using our SS7 software hacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sms-txt.net\/tr\/ss7-sms\/ss7-saldirisi-icin-bilgi-sizintisi-nasil\/\" \/>\n<meta property=\"og:locale\" content=\"tr_TR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Information leakage for SS7 attack\" \/>\n<meta property=\"og:description\" content=\"How SS7 Hacks and attacks are perform to leak information. Intercept the sms and call using our SS7 software hacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sms-txt.net\/tr\/ss7-sms\/ss7-saldirisi-icin-bilgi-sizintisi-nasil\/\" \/>\n<meta property=\"og:site_name\" content=\"SS7 Hacking\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-29T05:05:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-05T09:47:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/How-Information-leakage-for-SS7-attack.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"506\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ss7\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ss7\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/\"},\"author\":{\"name\":\"ss7\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\"},\"headline\":\"How Information leakage for SS7 attack\",\"datePublished\":\"2024-08-29T05:05:47+00:00\",\"dateModified\":\"2024-09-05T09:47:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/\"},\"wordCount\":498,\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/How-Information-leakage-for-SS7-attack.jpg\",\"articleSection\":[\"SMS Intercept\",\"SS7\"],\"inLanguage\":\"tr-TR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/\",\"url\":\"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/\",\"name\":\"How Information leakage for SS7 attack\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/How-Information-leakage-for-SS7-attack.jpg\",\"datePublished\":\"2024-08-29T05:05:47+00:00\",\"dateModified\":\"2024-09-05T09:47:59+00:00\",\"description\":\"How SS7 Hacks and attacks are perform to leak information. Intercept the sms and call using our SS7 software hacks.\",\"breadcrumb\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/#breadcrumb\"},\"inLanguage\":\"tr-TR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"tr-TR\",\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/#primaryimage\",\"url\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/How-Information-leakage-for-SS7-attack.jpg\",\"contentUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/How-Information-leakage-for-SS7-attack.jpg\",\"width\":900,\"height\":506},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sms-txt.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Information leakage for SS7 attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sms-txt.net\/#website\",\"url\":\"https:\/\/sms-txt.net\/\",\"name\":\"SS7 Hacking\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sms-txt.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"tr-TR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sms-txt.net\/#organization\",\"name\":\"SS7\",\"url\":\"https:\/\/sms-txt.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tr-TR\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"contentUrl\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"width\":866,\"height\":680,\"caption\":\"SS7\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\",\"name\":\"ss7\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SS7 sald\u0131r\u0131s\u0131 i\u00e7in bilgi s\u0131z\u0131nt\u0131s\u0131 nas\u0131l","description":"SS7 Hack'leri ve sald\u0131r\u0131lar\u0131 bilgi s\u0131zd\u0131rmak i\u00e7in nas\u0131l ger\u00e7ekle\u015ftirilir. SS7 yaz\u0131l\u0131m hack'lerimizi kullanarak sms ve aramay\u0131 engelleyin.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sms-txt.net\/tr\/ss7-sms\/ss7-saldirisi-icin-bilgi-sizintisi-nasil\/","og_locale":"tr_TR","og_type":"article","og_title":"How Information leakage for SS7 attack","og_description":"How SS7 Hacks and attacks are perform to leak information. Intercept the sms and call using our SS7 software hacks.","og_url":"https:\/\/sms-txt.net\/tr\/ss7-sms\/ss7-saldirisi-icin-bilgi-sizintisi-nasil\/","og_site_name":"SS7 Hacking","article_published_time":"2024-08-29T05:05:47+00:00","article_modified_time":"2024-09-05T09:47:59+00:00","og_image":[{"width":900,"height":506,"url":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/How-Information-leakage-for-SS7-attack.jpg","type":"image\/jpeg"}],"author":"ss7","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ss7","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/#article","isPartOf":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/"},"author":{"name":"ss7","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0"},"headline":"How Information leakage for SS7 attack","datePublished":"2024-08-29T05:05:47+00:00","dateModified":"2024-09-05T09:47:59+00:00","mainEntityOfPage":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/"},"wordCount":498,"publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"image":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/How-Information-leakage-for-SS7-attack.jpg","articleSection":["SMS Intercept","SS7"],"inLanguage":"tr-TR"},{"@type":"WebPage","@id":"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/","url":"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/","name":"SS7 sald\u0131r\u0131s\u0131 i\u00e7in bilgi s\u0131z\u0131nt\u0131s\u0131 nas\u0131l","isPartOf":{"@id":"https:\/\/sms-txt.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/#primaryimage"},"image":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/How-Information-leakage-for-SS7-attack.jpg","datePublished":"2024-08-29T05:05:47+00:00","dateModified":"2024-09-05T09:47:59+00:00","description":"SS7 Hack'leri ve sald\u0131r\u0131lar\u0131 bilgi s\u0131zd\u0131rmak i\u00e7in nas\u0131l ger\u00e7ekle\u015ftirilir. SS7 yaz\u0131l\u0131m hack'lerimizi kullanarak sms ve aramay\u0131 engelleyin.","breadcrumb":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/#breadcrumb"},"inLanguage":"tr-TR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/"]}]},{"@type":"ImageObject","inLanguage":"tr-TR","@id":"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/#primaryimage","url":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/How-Information-leakage-for-SS7-attack.jpg","contentUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/How-Information-leakage-for-SS7-attack.jpg","width":900,"height":506},{"@type":"BreadcrumbList","@id":"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sms-txt.net\/"},{"@type":"ListItem","position":2,"name":"How Information leakage for SS7 attack"}]},{"@type":"WebSite","@id":"https:\/\/sms-txt.net\/#website","url":"https:\/\/sms-txt.net\/","name":"SS7 Hackleme","description":"","publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sms-txt.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"tr-TR"},{"@type":"Organization","@id":"https:\/\/sms-txt.net\/#organization","name":"SS7","url":"https:\/\/sms-txt.net\/","logo":{"@type":"ImageObject","inLanguage":"tr-TR","@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/","url":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","contentUrl":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","width":866,"height":680,"caption":"SS7"},"image":{"@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0","name":"ss7"}]}},"_links":{"self":[{"href":"https:\/\/sms-txt.net\/tr\/wp-json\/wp\/v2\/posts\/466","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sms-txt.net\/tr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sms-txt.net\/tr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/tr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/tr\/wp-json\/wp\/v2\/comments?post=466"}],"version-history":[{"count":0,"href":"https:\/\/sms-txt.net\/tr\/wp-json\/wp\/v2\/posts\/466\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/tr\/wp-json\/wp\/v2\/media\/1731"}],"wp:attachment":[{"href":"https:\/\/sms-txt.net\/tr\/wp-json\/wp\/v2\/media?parent=466"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sms-txt.net\/tr\/wp-json\/wp\/v2\/categories?post=466"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sms-txt.net\/tr\/wp-json\/wp\/v2\/tags?post=466"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}