{"id":2250,"date":"2022-05-10T07:35:53","date_gmt":"2022-05-10T07:35:53","guid":{"rendered":"https:\/\/www.all4sec.es\/blog\/?p=2250"},"modified":"2022-05-10T07:35:55","modified_gmt":"2022-05-10T07:35:55","slug":"lpe-local-privilege-escalation","status":"publish","type":"post","link":"https:\/\/all4sec.es\/blog\/index.php\/2022\/05\/10\/lpe-local-privilege-escalation\/","title":{"rendered":"LPE \u2014Local Privilege Escalation"},"content":{"rendered":"\n<h3 class=\"has-text-align-center wp-block-heading\"><strong>C\u00f3mo un &#8220;rat\u00f3n&#8221; puede crear un problema del tama\u00f1o un &#8220;elefante&#8221;<\/strong><\/h3>\n\n\n\n<p>Seguro que todos ustedes han instalado dispositivos perif\u00e9ricos en sus equipos personales. Seguro que todos han seguido escrupulosamente su procedimiento de configuraci\u00f3n. En muchos casos, sin saber muy bien por qu\u00e9, y aceptando el paso siguiente de la instalaci\u00f3n casi de forma aut\u00f3mata.<\/p>\n\n\n\n<p>Pues bien, algunos de esos dispositivos \u2014o incluso aplicaciones\u2014 y sus procesos de instalaci\u00f3n presentan vulnerabilidades que permiten acceder con privilegios de administrador a los equipos a los que van destinados. Es lo que se conoce como vulnerabilidades <strong>LPE \u2014Local Privilege Escalation<\/strong>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>LPE<\/strong><\/h3>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignleft size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/05\/LPE-6-HiveNMare.jpg\" alt=\"\" class=\"wp-image-2255\" width=\"155\" height=\"139\" srcset=\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/05\/LPE-6-HiveNMare.jpg 811w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/05\/LPE-6-HiveNMare-300x267.jpg 300w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/05\/LPE-6-HiveNMare-768x685.jpg 768w\" sizes=\"(max-width: 155px) 100vw, 155px\" \/><\/figure><\/div>\n\n\n\n<p>Si no han o\u00eddo hablar de <strong>LPE<\/strong> quiz\u00e1s este sea un buen momento. Se trata de un problema m\u00e1s habitual de lo que parece.<\/p>\n\n\n\n<p>El a\u00f1o pasado se descubri\u00f3 que Windows 10 presentaba una vulnerabilidad conocida como <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-36934\"><strong>HiveNightMare<\/strong><\/a> (<strong>SeriousSAM<\/strong>) que permit\u00eda acceder con privilegios de administrador a los servicios de un equipo. Esta vulnerabilidad se un\u00eda a otras, tanto o m\u00e1s relevantes, identificadas durante los meses de verano de 2021 y que afectaban, por ejemplo, a la <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-1675\">gesti\u00f3n de las colas de impresi\u00f3n<\/a> que se utilizan en Windows. En aquellos d\u00edas, los problemas fueron parcheados no sin cierta pol\u00e9mica por la soluci\u00f3n planteada.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>El \u201crat\u00f3n\u201d tiene la culpa<\/strong><\/h3>\n\n\n\n<p>Para algunos es posible que el tema carezca de inter\u00e9s real. Que Microsoft publique peri\u00f3dicamente parches que corrigen problemas como estos ha hecho que nos acostumbremos a pasar por alto las razones de su presencia en nuestros equipos. Sin embargo, conviene prestarles atenci\u00f3n.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/05\/LPE-9-SteelSeries.jpg\" alt=\"\" class=\"wp-image-2261\" width=\"270\" height=\"186\" srcset=\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/05\/LPE-9-SteelSeries.jpg 599w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/05\/LPE-9-SteelSeries-300x206.jpg 300w\" sizes=\"(max-width: 270px) 100vw, 270px\" \/><\/figure><\/div>\n\n\n\n<p>Apenas unos d\u00edas despu\u00e9s de la aparici\u00f3n de <strong><em>HiveNightMare<\/em><\/strong>, un profesional de la ciberseguridad descubri\u00f3 que pod\u00eda interrumpir <strong>la instalaci\u00f3n de perif\u00e9ricos tales como ratones inal\u00e1mbricos, teclados, micr\u00f3fonos, etc. en equipos personales y acceder a privilegios de administraci\u00f3n (LPE)<\/strong> <strong>con un simple navegador<\/strong>.<\/p>\n\n\n\n<p>El proceso de explotaci\u00f3n de <strong>LPE<\/strong> era tan simple que su descubridor, <a href=\"https:\/\/twitter.com\/zux0x3a\">Lawrence Hamer<\/a>, <strong>public\u00f3 un video<\/strong> en el que mostraba, a trav\u00e9s de unos <a href=\"https:\/\/twitter.com\/zux0x3a\/status\/1429841541036527616?cxt=HHwWgMCiqcrT6NcnAAAA\">sencillos pasos<\/a>, c\u00f3mo la instalaci\u00f3n de dispositivos del fabricante <strong><em>SteelSeries<\/em> <\/strong>pod\u00eda ser interrumpida <strong>durante la aceptaci\u00f3n de los habituales \u201cT\u00e9rminos y Condiciones\u201d del producto<\/strong> <strong>y abrir un navegador<\/strong> cuyos privilegios llevar\u00edan a un delincuente a convertirse en administrador del sistema.<\/p>\n\n\n\n<p>La vulnerabilidad, si bien pod\u00eda estar acotada a determinado tipo de productos, afectaba a una gran base de usuarios tanto profesionales como dom\u00e9sticos. Y aqu\u00ed la superficie de ataque empezaba a ampliarse.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Los errores de los perif\u00e9ricos<\/strong><\/h3>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignleft size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/05\/LPE-2-wireless-mouse-g8ccdddc8c_1920-1024x683.jpg\" alt=\"\" class=\"wp-image-2257\" width=\"236\" height=\"157\" srcset=\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/05\/LPE-2-wireless-mouse-g8ccdddc8c_1920-1024x683.jpg 1024w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/05\/LPE-2-wireless-mouse-g8ccdddc8c_1920-300x200.jpg 300w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/05\/LPE-2-wireless-mouse-g8ccdddc8c_1920-768x512.jpg 768w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/05\/LPE-2-wireless-mouse-g8ccdddc8c_1920-1536x1024.jpg 1536w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/05\/LPE-2-wireless-mouse-g8ccdddc8c_1920.jpg 1920w\" sizes=\"(max-width: 236px) 100vw, 236px\" \/><\/figure><\/div>\n\n\n\n<p>La presencia de errores en la instalaci\u00f3n perif\u00e9ricos no es una novedad en ciberseguridad. Errores similares al descrito han sido<a href=\"https:\/\/twitter.com\/Lechatquirit\/status\/1429374730860208128\"> localizados en dispositivos de <strong>Razer<\/strong><\/a>, incluso con ratones de la marca <strong>ASUS ROG<\/strong>. \u00a0Se trata de vulnerabilidades que no pasar\u00edan de ser anecd\u00f3ticas si no fuera porque somos muchos los usuarios que instalamos nuevos elementos HW que asociamos a nuestros equipos para mejorar prestaciones o para interactuar con aplicaciones de forma m\u00e1s amigable. Por eso, su impacto puede ser suficientemente serio, sobre todo si los ciberdelincuentes deciden utilizarlos como mecanismos alternativos para la <a href=\"https:\/\/all4sec.es\/blog\/index.php\/2021\/07\/29\/europol-nuevas-y-viejas-caras-del-cibercrimen-2020\/\">materializaci\u00f3n de sus amenazas<\/a>.<\/p>\n\n\n\n<p>Por ejemplo, a partir de estas vulnerabilidades se pueden a crear herramientas que emulan el comportamiento de un perif\u00e9rico vulnerable. De este modo, una <a href=\"https:\/\/github.com\/tothi\/usbgadget-tool\">peque\u00f1a aplicaci\u00f3n en Android<\/a> puede permitir el acceso a los privilegios de administrador de un equipo conectando el tel\u00e9fono al USB del equipo de la v\u00edctima . Pero no es la \u00fanica forma; las posibilidades son numerosas.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Una recomendaci\u00f3n<\/strong><\/h3>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignleft size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/05\/LPE-mouse-elefant.jpg\" alt=\"\" class=\"wp-image-2262\" width=\"169\" height=\"112\" srcset=\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/05\/LPE-mouse-elefant.jpg 611w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/05\/LPE-mouse-elefant-300x198.jpg 300w\" sizes=\"(max-width: 169px) 100vw, 169px\" \/><\/figure><\/div>\n\n\n\n<p>Sea cual sea el caso, lo cierto es que aquellos dispositivos que a\u00f1adimos a nuestros equipos, por insignificantes que parezcan, pueden suponer nuevas vulnerabilidades para cualquier sistema. Por eso, y aunque parezca anecd\u00f3tico, siempre ser\u00e1 conveniente comprobar las \u201cpuertas que abrimos\u201d a trav\u00e9s de la<strong> instalaci\u00f3n de estos perif\u00e9ricos<\/strong>; incluso aunque esas puertas sean del tama\u00f1o de un \u201crat\u00f3n\u201d. Sirva esto como aviso.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Si no han o\u00eddo hablar de LPE -Local Privilege Escalation- quiz\u00e1s este sea un buen momento. Se trata de un problema m\u00e1s habitual de lo que parece. Por ejemplo, la instalaci\u00f3n de un sencillo perif\u00e9rico puede dar lugar a situaciones de riesgo que concluyen en el acceso a privilegios de administrador dentro de un sistema inform\u00e1tico.<\/p>\n","protected":false},"author":3,"featured_media":2269,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2,14],"tags":[33,83],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>LPE \u2014Local Privilege Escalation - all4sec.es<\/title>\n<meta name=\"description\" content=\"C\u00f3mo un &quot;rat\u00f3n&quot; puede crear un problema del tama\u00f1o un &quot;elefante&quot;: Vulnerabilidades LPE \u2014Local Privilege Escalation.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/all4sec.es\/blog\/index.php\/2022\/05\/10\/lpe-local-privilege-escalation\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LPE \u2014Local Privilege Escalation - all4sec.es\" \/>\n<meta property=\"og:description\" content=\"C\u00f3mo un &quot;rat\u00f3n&quot; puede crear un problema del tama\u00f1o un &quot;elefante&quot;: Vulnerabilidades LPE \u2014Local Privilege Escalation.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/all4sec.es\/blog\/index.php\/2022\/05\/10\/lpe-local-privilege-escalation\/\" \/>\n<meta property=\"og:site_name\" content=\"all4sec.es\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-10T07:35:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-10T07:35:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/05\/LPE-1-antonio-manaligod-T_2UFB_xwzw-unsplash.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Juanjo Galan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Juanjo Galan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/all4sec.es\/blog\/index.php\/2022\/05\/10\/lpe-local-privilege-escalation\/\",\"url\":\"https:\/\/all4sec.es\/blog\/index.php\/2022\/05\/10\/lpe-local-privilege-escalation\/\",\"name\":\"LPE \u2014Local Privilege Escalation - all4sec.es\",\"isPartOf\":{\"@id\":\"https:\/\/all4sec.es\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/all4sec.es\/blog\/index.php\/2022\/05\/10\/lpe-local-privilege-escalation\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/all4sec.es\/blog\/index.php\/2022\/05\/10\/lpe-local-privilege-escalation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/05\/LPE-1-antonio-manaligod-T_2UFB_xwzw-unsplash.jpg\",\"datePublished\":\"2022-05-10T07:35:53+00:00\",\"dateModified\":\"2022-05-10T07:35:55+00:00\",\"author\":{\"@id\":\"https:\/\/all4sec.es\/blog\/#\/schema\/person\/d8839fb727b62b7c4e8598b89fdaafa9\"},\"description\":\"C\u00f3mo un \\\"rat\u00f3n\\\" puede crear un problema del tama\u00f1o un \\\"elefante\\\": Vulnerabilidades LPE \u2014Local Privilege Escalation.\",\"breadcrumb\":{\"@id\":\"https:\/\/all4sec.es\/blog\/index.php\/2022\/05\/10\/lpe-local-privilege-escalation\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/all4sec.es\/blog\/index.php\/2022\/05\/10\/lpe-local-privilege-escalation\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/all4sec.es\/blog\/index.php\/2022\/05\/10\/lpe-local-privilege-escalation\/#primaryimage\",\"url\":\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/05\/LPE-1-antonio-manaligod-T_2UFB_xwzw-unsplash.jpg\",\"contentUrl\":\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/05\/LPE-1-antonio-manaligod-T_2UFB_xwzw-unsplash.jpg\",\"width\":1920,\"height\":1280},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/all4sec.es\/blog\/index.php\/2022\/05\/10\/lpe-local-privilege-escalation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/all4sec.es\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"LPE \u2014Local Privilege Escalation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/all4sec.es\/blog\/#website\",\"url\":\"https:\/\/all4sec.es\/blog\/\",\"name\":\"all4sec.es\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/all4sec.es\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"es\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/all4sec.es\/blog\/#\/schema\/person\/d8839fb727b62b7c4e8598b89fdaafa9\",\"name\":\"Juanjo Galan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/all4sec.es\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a3f0814447c3b2bad83feb430187bee0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a3f0814447c3b2bad83feb430187bee0?s=96&d=mm&r=g\",\"caption\":\"Juanjo Galan\"},\"url\":\"https:\/\/all4sec.es\/blog\/index.php\/author\/juanjo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LPE \u2014Local Privilege Escalation - all4sec.es","description":"C\u00f3mo un \"rat\u00f3n\" puede crear un problema del tama\u00f1o un \"elefante\": Vulnerabilidades LPE \u2014Local Privilege Escalation.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/all4sec.es\/blog\/index.php\/2022\/05\/10\/lpe-local-privilege-escalation\/","og_locale":"es_ES","og_type":"article","og_title":"LPE \u2014Local Privilege Escalation - all4sec.es","og_description":"C\u00f3mo un \"rat\u00f3n\" puede crear un problema del tama\u00f1o un \"elefante\": Vulnerabilidades LPE \u2014Local Privilege Escalation.","og_url":"https:\/\/all4sec.es\/blog\/index.php\/2022\/05\/10\/lpe-local-privilege-escalation\/","og_site_name":"all4sec.es","article_published_time":"2022-05-10T07:35:53+00:00","article_modified_time":"2022-05-10T07:35:55+00:00","og_image":[{"width":1920,"height":1280,"url":"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/05\/LPE-1-antonio-manaligod-T_2UFB_xwzw-unsplash.jpg","type":"image\/jpeg"}],"author":"Juanjo Galan","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Juanjo Galan","Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/all4sec.es\/blog\/index.php\/2022\/05\/10\/lpe-local-privilege-escalation\/","url":"https:\/\/all4sec.es\/blog\/index.php\/2022\/05\/10\/lpe-local-privilege-escalation\/","name":"LPE \u2014Local Privilege Escalation - all4sec.es","isPartOf":{"@id":"https:\/\/all4sec.es\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/all4sec.es\/blog\/index.php\/2022\/05\/10\/lpe-local-privilege-escalation\/#primaryimage"},"image":{"@id":"https:\/\/all4sec.es\/blog\/index.php\/2022\/05\/10\/lpe-local-privilege-escalation\/#primaryimage"},"thumbnailUrl":"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/05\/LPE-1-antonio-manaligod-T_2UFB_xwzw-unsplash.jpg","datePublished":"2022-05-10T07:35:53+00:00","dateModified":"2022-05-10T07:35:55+00:00","author":{"@id":"https:\/\/all4sec.es\/blog\/#\/schema\/person\/d8839fb727b62b7c4e8598b89fdaafa9"},"description":"C\u00f3mo un \"rat\u00f3n\" puede crear un problema del tama\u00f1o un \"elefante\": Vulnerabilidades LPE \u2014Local Privilege Escalation.","breadcrumb":{"@id":"https:\/\/all4sec.es\/blog\/index.php\/2022\/05\/10\/lpe-local-privilege-escalation\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/all4sec.es\/blog\/index.php\/2022\/05\/10\/lpe-local-privilege-escalation\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/all4sec.es\/blog\/index.php\/2022\/05\/10\/lpe-local-privilege-escalation\/#primaryimage","url":"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/05\/LPE-1-antonio-manaligod-T_2UFB_xwzw-unsplash.jpg","contentUrl":"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/05\/LPE-1-antonio-manaligod-T_2UFB_xwzw-unsplash.jpg","width":1920,"height":1280},{"@type":"BreadcrumbList","@id":"https:\/\/all4sec.es\/blog\/index.php\/2022\/05\/10\/lpe-local-privilege-escalation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/all4sec.es\/blog\/"},{"@type":"ListItem","position":2,"name":"LPE \u2014Local Privilege Escalation"}]},{"@type":"WebSite","@id":"https:\/\/all4sec.es\/blog\/#website","url":"https:\/\/all4sec.es\/blog\/","name":"all4sec.es","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/all4sec.es\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"es"},{"@type":"Person","@id":"https:\/\/all4sec.es\/blog\/#\/schema\/person\/d8839fb727b62b7c4e8598b89fdaafa9","name":"Juanjo Galan","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/all4sec.es\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a3f0814447c3b2bad83feb430187bee0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a3f0814447c3b2bad83feb430187bee0?s=96&d=mm&r=g","caption":"Juanjo Galan"},"url":"https:\/\/all4sec.es\/blog\/index.php\/author\/juanjo\/"}]}},"_links":{"self":[{"href":"https:\/\/all4sec.es\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2250"}],"collection":[{"href":"https:\/\/all4sec.es\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/all4sec.es\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/all4sec.es\/blog\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/all4sec.es\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2250"}],"version-history":[{"count":15,"href":"https:\/\/all4sec.es\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2250\/revisions"}],"predecessor-version":[{"id":2273,"href":"https:\/\/all4sec.es\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2250\/revisions\/2273"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/all4sec.es\/blog\/index.php\/wp-json\/wp\/v2\/media\/2269"}],"wp:attachment":[{"href":"https:\/\/all4sec.es\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2250"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/all4sec.es\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2250"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/all4sec.es\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2250"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}