{"id":2558,"date":"2023-10-16T10:33:22","date_gmt":"2023-10-16T10:33:22","guid":{"rendered":"https:\/\/b2btechknowledge.com\/?p=2558"},"modified":"2023-10-16T10:38:01","modified_gmt":"2023-10-16T10:38:01","slug":"largest-ddos-attacks-in-history-major-part-of-the-internet-is-exposed-to-http-2-rapid-reset","status":"publish","type":"post","link":"https:\/\/b2btechknowledge.net\/de\/latest-news\/news\/largest-ddos-attacks-in-history-major-part-of-the-internet-is-exposed-to-http-2-rapid-reset\/","title":{"rendered":"Largest DDoS Attacks in History: Major Part of the Internet is Exposed to HTTP\/2 Rapid Reset"},"content":{"rendered":"<p>&#8220;<em>Any enterprise or individual that is serving an HTTP-based workload to the Internet may be at risk from this attack<\/em>\u201d, warned Google.<\/p>\n<p>In the second week of October, Cloudflare, AWS and Google were hit by the largest distributed denial-of-service (DDoS) attacks in the history of internet. The ground-breaking attack was based on a novel technique called HTTP\/2 Rapid Reset Zero Day by an unknown threat actor. Interestingly, HTTP\/2 protocol is used by a large number of web servers\u201477% to be exact as per <a href=\"https:\/\/almanac.httparchive.org\/en\/2022\/http\">Web Almanac<\/a>. So, the severity of the attack was enormous.<\/p>\n<p>Back in August 2023, <a href=\"https:\/\/www.cloudflare.com\/learning\/ddos\/application-layer-ddos-attack\/\">Cloudflare<\/a> detected layer 7 attacks with susceptibility tracking as <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-44487\">CVE-2023-44487<\/a>. The CVSS score was 7.5 out of 10. Cloudflare recently experienced an HTTP\/2 Rapid Reset DDoS campaign that peaked at 201 million Requests Per Second (RPS)&#8211;three times higher than the 71 million RPS they encountered back in February this year.<\/p>\n<p>For Amazon <a href=\"https:\/\/aws.amazon.com\/blogs\/security\/how-aws-protects-customers-from-ddos-events\/?ref=thestack.technology\">AWS<\/a>, the largest peak was at 155 million RPS over the span of two days while for <a href=\"https:\/\/cloud.google.com\/blog\/products\/identity-security\/how-it-works-the-novel-http2-rapid-reset-ddos-attack?ref=thestack.technology\">Google<\/a> it was 398 million RPS in a single day.<\/p>\n<p>&nbsp;<\/p>\n<h2>How HTTP\/2 Rapid Reset Works<\/h2>\n<p>The attack vector abuses a zero-day flaw in the HTTP\/2 protocol termed \u2018stream cancellation\u2019 by recurrently sending a request and terminating it immediately. More elaborately, if a client decides to abort a request an \u2018<em>RST_STREAM frame\u2019 <\/em>is issued. The Rapid Reset capitalizes this command by sending and canceling requests in rapid succession.<\/p>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-2559 size-large\" src=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px-1024x768.png\" alt=\"\" width=\"1024\" height=\"768\" srcset=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px-1024x768.png 1024w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px-300x225.png 300w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px-768x576.png 768w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px-16x12.png 16w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px-500x375.png 500w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px-800x600.png 800w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>\n<p>Thus, the attack vector sidesteps the server\u2019s concurrent stream and overloads the server with a fake threshold. When this happens at scale, the threat actor can engulf any website and knock it offline. With a botnet of only 20,000 compromised devices, this largest attack shook the internet giants. This number is far less than normal regular attacks that usually comprise hundreds of thousands or even millions of machines.<\/p>\n<p><em>\u201cBy automating this trivial \u2018request, cancel, request, cancel\u2019 pattern at scale, threat actors are able to create a denial of service and take down any server or application running the standard implementation of HTTP\/2,\u201d <\/em>Cloudflare explained.<\/p>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-2560 size-large\" src=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px-1024x768.png\" alt=\"\" width=\"1024\" height=\"768\" srcset=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px-1024x768.png 1024w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px-300x225.png 300w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px-768x576.png 768w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px-16x12.png 16w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px-500x375.png 500w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px-800x600.png 800w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>\n<h2>What companies are saying?<\/h2>\n<p>After the initial DDoS attacks, Google observed multiple variants of the Rapid Reset. Although these variants are not as threatening as the initial version, they are still more efficient than standard HTTP\/2 DDoS attacks.<\/p>\n<p>All three companies said that their current security measures were able to handle HTTP\/2 with lesser damage. However, they have implemented additional steps for fending off such attack patterns. Subsequently, all web server software companies have started developing patches and implementing them across the servers to prevent exploitation.<\/p>\n<p>F5, an independent advisory, urged their customers to update the current NGINX configuration as the attack impacted the NGINX HTTP\/2 module. Updating the configuration will limit the number of simultaneous streams to a default of 128 and stick with HTTP connections for up to one thousand requests.<\/p>\n<p><em>\u201cTo protect your systems from this attack, we\u2019re recommending an immediate update to your NGINX configuration,\u201d<\/em> F5 wrote.<\/p>","protected":false},"excerpt":{"rendered":"<p>&#8220;Any enterprise or individual that is serving an HTTP-based workload to the Internet may be at risk from this attack\u201d,&#8230;<\/p>","protected":false},"author":26,"featured_media":2561,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[36],"tags":[],"class_list":["post-2558","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Largest DDoS Attacks in History: Major Part of the Internet is Exposed to HTTP\/2 Rapid Reset - Techknowledge<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/b2btechknowledge.net\/de\/latest-news\/news\/largest-ddos-attacks-in-history-major-part-of-the-internet-is-exposed-to-http-2-rapid-reset\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Largest DDoS Attacks in History: Major Part of the Internet is Exposed to HTTP\/2 Rapid Reset - Techknowledge\" \/>\n<meta property=\"og:description\" content=\"&#8220;Any enterprise or individual that is serving an HTTP-based workload to the Internet may be at risk from this attack\u201d,...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/b2btechknowledge.net\/de\/latest-news\/news\/largest-ddos-attacks-in-history-major-part-of-the-internet-is-exposed-to-http-2-rapid-reset\/\" \/>\n<meta property=\"og:site_name\" content=\"Techknowledge\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-16T10:33:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-16T10:38:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"John Gallacher\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"John Gallacher\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/b2btechknowledge.net\/latest-news\/news\/largest-ddos-attacks-in-history-major-part-of-the-internet-is-exposed-to-http-2-rapid-reset\/\",\"url\":\"https:\/\/b2btechknowledge.net\/latest-news\/news\/largest-ddos-attacks-in-history-major-part-of-the-internet-is-exposed-to-http-2-rapid-reset\/\",\"name\":\"Largest DDoS Attacks in History: Major Part of the Internet is Exposed to HTTP\/2 Rapid Reset - Techknowledge\",\"isPartOf\":{\"@id\":\"https:\/\/b2btechknowledge.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/b2btechknowledge.net\/latest-news\/news\/largest-ddos-attacks-in-history-major-part-of-the-internet-is-exposed-to-http-2-rapid-reset\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/b2btechknowledge.net\/latest-news\/news\/largest-ddos-attacks-in-history-major-part-of-the-internet-is-exposed-to-http-2-rapid-reset\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px.png\",\"datePublished\":\"2023-10-16T10:33:22+00:00\",\"dateModified\":\"2023-10-16T10:38:01+00:00\",\"author\":{\"@id\":\"https:\/\/b2btechknowledge.net\/#\/schema\/person\/795e55f73078d141f89edbfb53001f46\"},\"breadcrumb\":{\"@id\":\"https:\/\/b2btechknowledge.net\/latest-news\/news\/largest-ddos-attacks-in-history-major-part-of-the-internet-is-exposed-to-http-2-rapid-reset\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/b2btechknowledge.net\/latest-news\/news\/largest-ddos-attacks-in-history-major-part-of-the-internet-is-exposed-to-http-2-rapid-reset\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/b2btechknowledge.net\/latest-news\/news\/largest-ddos-attacks-in-history-major-part-of-the-internet-is-exposed-to-http-2-rapid-reset\/#primaryimage\",\"url\":\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px.png\",\"contentUrl\":\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px.png\",\"width\":1200,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/b2btechknowledge.net\/latest-news\/news\/largest-ddos-attacks-in-history-major-part-of-the-internet-is-exposed-to-http-2-rapid-reset\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/b2btechknowledge.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Latest news\",\"item\":\"https:\/\/b2btechknowledge.net\/topics\/latest-news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"News\",\"item\":\"https:\/\/b2btechknowledge.net\/topics\/latest-news\/news\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Largest DDoS Attacks in History: Major Part of the Internet is Exposed to HTTP\/2 Rapid Reset\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/b2btechknowledge.net\/#website\",\"url\":\"https:\/\/b2btechknowledge.net\/\",\"name\":\"Techknowledge\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/b2btechknowledge.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/b2btechknowledge.net\/#\/schema\/person\/795e55f73078d141f89edbfb53001f46\",\"name\":\"John Gallacher\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/b2btechknowledge.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d97354f543c08de203997d94a70af1dbc898306b47f7c0f95d635e3e248f846c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d97354f543c08de203997d94a70af1dbc898306b47f7c0f95d635e3e248f846c?s=96&d=mm&r=g\",\"caption\":\"John Gallacher\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Largest DDoS Attacks in History: Major Part of the Internet is Exposed to HTTP\/2 Rapid Reset - Techknowledge","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/b2btechknowledge.net\/de\/latest-news\/news\/largest-ddos-attacks-in-history-major-part-of-the-internet-is-exposed-to-http-2-rapid-reset\/","og_locale":"de_DE","og_type":"article","og_title":"Largest DDoS Attacks in History: Major Part of the Internet is Exposed to HTTP\/2 Rapid Reset - Techknowledge","og_description":"&#8220;Any enterprise or individual that is serving an HTTP-based workload to the Internet may be at risk from this attack\u201d,...","og_url":"https:\/\/b2btechknowledge.net\/de\/latest-news\/news\/largest-ddos-attacks-in-history-major-part-of-the-internet-is-exposed-to-http-2-rapid-reset\/","og_site_name":"Techknowledge","article_published_time":"2023-10-16T10:33:22+00:00","article_modified_time":"2023-10-16T10:38:01+00:00","og_image":[{"width":1200,"height":900,"url":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px.png","type":"image\/png"}],"author":"John Gallacher","twitter_card":"summary_large_image","twitter_misc":{"Verfasst von":"John Gallacher","Gesch\u00e4tzte Lesezeit":"3 Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/b2btechknowledge.net\/latest-news\/news\/largest-ddos-attacks-in-history-major-part-of-the-internet-is-exposed-to-http-2-rapid-reset\/","url":"https:\/\/b2btechknowledge.net\/latest-news\/news\/largest-ddos-attacks-in-history-major-part-of-the-internet-is-exposed-to-http-2-rapid-reset\/","name":"Largest DDoS Attacks in History: Major Part of the Internet is Exposed to HTTP\/2 Rapid Reset - Techknowledge","isPartOf":{"@id":"https:\/\/b2btechknowledge.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/b2btechknowledge.net\/latest-news\/news\/largest-ddos-attacks-in-history-major-part-of-the-internet-is-exposed-to-http-2-rapid-reset\/#primaryimage"},"image":{"@id":"https:\/\/b2btechknowledge.net\/latest-news\/news\/largest-ddos-attacks-in-history-major-part-of-the-internet-is-exposed-to-http-2-rapid-reset\/#primaryimage"},"thumbnailUrl":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px.png","datePublished":"2023-10-16T10:33:22+00:00","dateModified":"2023-10-16T10:38:01+00:00","author":{"@id":"https:\/\/b2btechknowledge.net\/#\/schema\/person\/795e55f73078d141f89edbfb53001f46"},"breadcrumb":{"@id":"https:\/\/b2btechknowledge.net\/latest-news\/news\/largest-ddos-attacks-in-history-major-part-of-the-internet-is-exposed-to-http-2-rapid-reset\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/b2btechknowledge.net\/latest-news\/news\/largest-ddos-attacks-in-history-major-part-of-the-internet-is-exposed-to-http-2-rapid-reset\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/b2btechknowledge.net\/latest-news\/news\/largest-ddos-attacks-in-history-major-part-of-the-internet-is-exposed-to-http-2-rapid-reset\/#primaryimage","url":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px.png","contentUrl":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px.png","width":1200,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/b2btechknowledge.net\/latest-news\/news\/largest-ddos-attacks-in-history-major-part-of-the-internet-is-exposed-to-http-2-rapid-reset\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/b2btechknowledge.net\/"},{"@type":"ListItem","position":2,"name":"Latest news","item":"https:\/\/b2btechknowledge.net\/topics\/latest-news\/"},{"@type":"ListItem","position":3,"name":"News","item":"https:\/\/b2btechknowledge.net\/topics\/latest-news\/news\/"},{"@type":"ListItem","position":4,"name":"Largest DDoS Attacks in History: Major Part of the Internet is Exposed to HTTP\/2 Rapid Reset"}]},{"@type":"WebSite","@id":"https:\/\/b2btechknowledge.net\/#website","url":"https:\/\/b2btechknowledge.net\/","name":"Techknowledge","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/b2btechknowledge.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Person","@id":"https:\/\/b2btechknowledge.net\/#\/schema\/person\/795e55f73078d141f89edbfb53001f46","name":"John Gallacher","image":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/b2btechknowledge.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d97354f543c08de203997d94a70af1dbc898306b47f7c0f95d635e3e248f846c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d97354f543c08de203997d94a70af1dbc898306b47f7c0f95d635e3e248f846c?s=96&d=mm&r=g","caption":"John Gallacher"}}]}},"_links":{"self":[{"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/posts\/2558","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/users\/26"}],"replies":[{"embeddable":true,"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/comments?post=2558"}],"version-history":[{"count":0,"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/posts\/2558\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/media\/2561"}],"wp:attachment":[{"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/media?parent=2558"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/categories?post=2558"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/tags?post=2558"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}