{"id":2145,"date":"2025-12-11T10:44:05","date_gmt":"2025-12-11T13:44:05","guid":{"rendered":"https:\/\/hackerrangers.siteup.dev\/?p=2145"},"modified":"2025-12-11T10:44:05","modified_gmt":"2025-12-11T13:44:05","slug":"elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information","status":"publish","type":"post","link":"https:\/\/hackerrangers.siteup.dev\/es\/awareness\/elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information\/","title":{"rendered":"Elicitaci\u00f3n: la t\u00e9cnica cordial para robar informaci\u00f3n sigilosa"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">De nada sirve mirar en el diccionario: el concepto de elicitaci\u00f3n en el contexto de la seguridad de la informaci\u00f3n es bastante desconocido aun, incluso en Am\u00e9rica Latina. Aunque el verbo \u201celicitar\u201d todav\u00eda no est\u00e9 oficialmente incorporado al vocabulario del idioma espa\u00f1ol, el Diccionario panhisp\u00e1nico de dudas de la RAE refiere que es una \u201cadaptaci\u00f3n innecesaria del verbo ingl\u00e9s elicit [...] que corresponde a los verbos espa\u00f1oles provocar, suscitar u obtener, seg\u00fan los casos\". As\u00ed, como el propio diccionario lo constata, se hace un poco dif\u00edcil comprender a qu\u00e9 se refiere el concepto de \u201celicitaci\u00f3n\u201d partiendo solo de esa definici\u00f3n.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Dentro del \u00e1rea de seguridad de la informaci\u00f3n, \u201celicitaci\u00f3n\u201d no es otra cosa que la t\u00e9cnica de extraer informaci\u00f3n sigilosa o privilegiada de alguien por medio de una conversaci\u00f3n que, a priori, parece ser solo una charla educada y cordial. Este di\u00e1logo se puede entablar en l\u00ednea o por tel\u00e9fono, pero un ingeniero social habilidoso siempre preferir\u00e1 un di\u00e1logo presencial, cara a cara, pues le dar\u00e1 la posibilidad de ser m\u00e1s incisivo.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">El ataque es tan preocupante que el Departamento Federal de Investigaci\u00f3n de Estados Unidos (FBI) elabor\u00f3 una cartilla para advertir a organizaciones, privadas o p\u00fablicas, con respecto a los riesgos implicados. A fin de cuentas, las t\u00e9cnicas de elicitaci\u00f3n se pueden usar incluso para violar secretos industriales y espiar planes o proyectos militares de una naci\u00f3n extranjera rival.<\/span><\/p>\n<h2><b>Una conversaci\u00f3n comprometedora<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Imagina que est\u00e1s en un coworking, por ejemplo y, de repente, una persona te aborda mostr\u00e1ndose ejemplarmente educada. Se presenta como un colaborador reci\u00e9n contratado que aun no conoce a los compa\u00f1eros de oficina. Entonces, te pide que lo ayudes a familiarizarse con el ambiente.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">El di\u00e1logo parece fluir tranquilamente y, cuando te das cuenta, est\u00e1s respondiendo una serie de preguntas aparentemente inocentes: \u00bfd\u00f3nde queda la sala de reuniones?; \u00bfcu\u00e1ntas personas componen el directorio?; \u00bftodos los ambientes est\u00e1n equipados con c\u00e1maras? Al proporcionar esa informaci\u00f3n, podr\u00edas, sin querer,<\/span> <span style=\"font-weight: 400;\">estar dando datos cruciales que se podr\u00edan usar para planear una estafa contra la empresa.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Y es exactamente as\u00ed que funciona la t\u00e9cnica de elicitaci\u00f3n: la v\u00edctima dif\u00edcilmente nota que est\u00e1 sufriendo una \u201cextracci\u00f3n de informaci\u00f3n\u201d y proporcionando inteligencia confidencial de manera voluntaria.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Esto sucede porque, en la elicitaci\u00f3n, la ingenier\u00eda social se aprovecha al m\u00e1ximo y la conversaci\u00f3n fluye tan naturalmente que algunas preguntas y comentarios aparentemente inofensivos pueden ser valiosos para el atacante. Este usar\u00e1 t\u00e9cnicas de persuasi\u00f3n y mantendr\u00e1 un di\u00e1logo envolvente, gan\u00e1ndose tu confianza siendo educado, sol\u00edcito y, adem\u00e1s, un buen oyente. El ingeniero te adular\u00e1, te pedir\u00e1 ayuda con algo, te pedir\u00e1 tu opini\u00f3n sobre alg\u00fan tema y discutir\u00e1 una cuesti\u00f3n solo para obtener tu versi\u00f3n de los hechos.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Seg\u00fan el FBI, existen varias t\u00e9cnicas que pueden usar los \u201cextractores\u201d de informaci\u00f3n durante una jugada de elicitaci\u00f3n. Aqu\u00ed te presentamos algunas de ellas:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Conocimiento asumido:<\/b><span style=\"font-weight: 400;\"> crear empat\u00eda fingiendo tener conocimientos en com\u00fan con el blanco.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Cebo confidencial:<\/b><span style=\"font-weight: 400;\"> fingir que est\u00e1 compartiendo una informaci\u00f3n secreta con la esperanza de recibir otra informaci\u00f3n secreta a cambio.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Negaci\u00f3n de lo obvio:<\/b><span style=\"font-weight: 400;\"> decir algo equivocado, a prop\u00f3sito, para que la v\u00edctima lo corrija con una informaci\u00f3n verdadera y sigilosa.<\/span><\/li>\n<\/ul>\n<h2><b>\u00a1Hasta t\u00fa seguramente las hayas usado alguna vez!<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Aunque esos escenarios puedan parecer locuras que solo pasan en las pel\u00edculas de Hollywood, es muy probable que ya hayas usado t\u00e9cnicas de elicitaci\u00f3n, \u00a1aunque fuera por un buen motivo!\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cuando, por ejemplo, estamos preparando una fiesta sorpresa para alguien, es com\u00fan que apliquemos las estrategias de elicitaci\u00f3n para sacarle informaci\u00f3n al agasajado. T\u00fa haces preguntas aparentemente inocentes y mantienes charlas aleatorias para descubrir qu\u00e9 le gusta comer a la persona, qu\u00e9 regalos le encantar\u00eda que le dieran y c\u00f3mo est\u00e1 su agenda de horarios para la celebraci\u00f3n.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Desviarse de intentos de extracci\u00f3n de informaci\u00f3n por elicitaci\u00f3n puede ser una tarea dif\u00edcil, pero intenta entrenar tu pensamiento cr\u00edtico para no responder cualquier pregunta sin antes pensar en las consecuencias. Si crees que est\u00e1s siendo una v\u00edctima de ese tipo de estafa, desalienta al atacante ignorando cuestionamientos incisivos, respondiendo una pregunta con otra pregunta, ofreciendo respuestas gen\u00e9ricas o simplemente diciendo que no sabes o que no puedes discutir el tema de que se trate.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>It&#8217;s no use looking in the dictionary: the concept of elicitation in the context of information security is still relatively new, even in Brazil. Any dictionary defines elicit as &#8220;to extract, to bring out; to obtain; to trigger, to provoke; to deduce; to discover; to clarify&#8221;, but, let&#8217;s face it, it is a little hard [&hellip;]<\/p>\n","protected":false},"author":4009,"featured_media":2146,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[46],"tags":[120,113,119,121],"class_list":["post-2145","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-awareness","tag-elicitation","tag-information-security","tag-security","tag-social-engineering"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Elicitation: the polite technique of stealing sensitive information | Hacker Rangers<\/title>\n<meta name=\"description\" content=\"Elicitation in information security: how attackers extract sensitive data through casual conversations and how you can recognize it\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Elicitation: the polite technique of stealing sensitive information | Hacker Rangers\" \/>\n<meta property=\"og:description\" content=\"Elicitation in information security: how attackers extract sensitive data through casual conversations and how you can recognize it\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hackerrangers.siteup.dev\/es\/awareness\/elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information\/\" \/>\n<meta property=\"og:site_name\" content=\"Hacker Rangers\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-11T13:44:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/elicitation.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Hacker Rangers\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hacker Rangers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information\/\"},\"author\":{\"name\":\"Hacker Rangers\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\"},\"headline\":\"Elicitation: the polite and courteous technique of stealing sensitive information\",\"datePublished\":\"2025-12-11T13:44:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information\/\"},\"wordCount\":622,\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/elicitation.png\",\"keywords\":[\"elicitation\",\"information security\",\"security\",\"social engineering\"],\"articleSection\":[\"Awareness\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information\/\",\"name\":\"Elicitation: the polite technique of stealing sensitive information | Hacker Rangers\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/elicitation.png\",\"datePublished\":\"2025-12-11T13:44:05+00:00\",\"description\":\"Elicitation in information security: how attackers extract sensitive data through casual conversations and how you can recognize it\",\"breadcrumb\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/hackerrangers.siteup.dev\/awareness\/elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information\/#primaryimage\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/elicitation.png\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/elicitation.png\",\"width\":1500,\"height\":1000,\"caption\":\"elicitation\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/hackerrangers.siteup.dev\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Elicitation: the polite and courteous technique of stealing sensitive information\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"name\":\"Hacker Rangers\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"width\":104,\"height\":50,\"caption\":\"Hacker Rangers\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/es\/author\/hackerrangers\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Elicitation: the polite technique of stealing sensitive information | Hacker Rangers","description":"Elicitation in information security: how attackers extract sensitive data through casual conversations and how you can recognize it","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"es_ES","og_type":"article","og_title":"Elicitation: the polite technique of stealing sensitive information | Hacker Rangers","og_description":"Elicitation in information security: how attackers extract sensitive data through casual conversations and how you can recognize it","og_url":"https:\/\/hackerrangers.siteup.dev\/es\/awareness\/elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information\/","og_site_name":"Hacker Rangers","article_published_time":"2025-12-11T13:44:05+00:00","og_image":[{"width":1500,"height":1000,"url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/elicitation.png","type":"image\/png"}],"author":"Hacker Rangers","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Hacker Rangers","Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information\/#article","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information\/"},"author":{"name":"Hacker Rangers","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61"},"headline":"Elicitation: the polite and courteous technique of stealing sensitive information","datePublished":"2025-12-11T13:44:05+00:00","mainEntityOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information\/"},"wordCount":622,"publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/elicitation.png","keywords":["elicitation","information security","security","social engineering"],"articleSection":["Awareness"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information\/","url":"https:\/\/hackerrangers.siteup.dev\/awareness\/elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information\/","name":"Elicitation: the polite technique of stealing sensitive information | Hacker Rangers","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information\/#primaryimage"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/elicitation.png","datePublished":"2025-12-11T13:44:05+00:00","description":"Elicitation in information security: how attackers extract sensitive data through casual conversations and how you can recognize it","breadcrumb":{"@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hackerrangers.siteup.dev\/awareness\/elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information\/#primaryimage","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/elicitation.png","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/elicitation.png","width":1500,"height":1000,"caption":"elicitation"},{"@type":"BreadcrumbList","@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/hackerrangers.siteup.dev\/"},{"@type":"ListItem","position":2,"name":"Elicitation: the polite and courteous technique of stealing sensitive information"}]},{"@type":"WebSite","@id":"https:\/\/hackerrangers.siteup.dev\/#website","url":"https:\/\/hackerrangers.siteup.dev\/","name":"Hacker Rangers","description":"","publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/hackerrangers.siteup.dev\/#organization","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","width":104,"height":50,"caption":"Hacker Rangers"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/es\/author\/hackerrangers\/"}]}},"_links":{"self":[{"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/posts\/2145","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/users\/4009"}],"replies":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/comments?post=2145"}],"version-history":[{"count":0,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/posts\/2145\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/media\/2146"}],"wp:attachment":[{"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/media?parent=2145"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/categories?post=2145"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/tags?post=2145"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}