{"id":2548,"date":"2026-02-16T14:59:26","date_gmt":"2026-02-16T17:59:26","guid":{"rendered":"https:\/\/hackerrangers.siteup.dev\/?p=2548"},"modified":"2026-02-16T15:07:47","modified_gmt":"2026-02-16T18:07:47","slug":"que-es-un-ataque-de-denegacion-de-servicio-distribuido","status":"publish","type":"post","link":"https:\/\/hackerrangers.siteup.dev\/es\/cybersecurity\/que-es-un-ataque-de-denegacion-de-servicio-distribuido\/","title":{"rendered":"\u00bfQu\u00e9 es un ataque de denegaci\u00f3n de servicio distribuido (DDoS)?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">\"El sistema cay\u00f3\". Esta frase, que probablemente ya hayas escuchado alguna vez, se refiere a un escenario en el que una aplicaci\u00f3n o servicio digital se encuentra indisponible o inoperante. Esa interrupci\u00f3n del sistema puede perjudicar tareas importantes, como la expedici\u00f3n de boletos en un aeropuerto o la internaci\u00f3n de pacientes en un hospital.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cuando esas interrupciones imprevistas son ocasionadas por una acci\u00f3n intencional \u2014cuando delincuentes hicieron algo para provocarla\u2014, la situaci\u00f3n se considera un ataque cibern\u00e9tico de denegaci\u00f3n de servicio. El nombre del ataque deriva del hecho de que su objetivo es hacer que la empresa blanco del ataque \u201cniegue el servicio\u201d, o sea, deje de funcionar.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">El ataque de denegaci\u00f3n de servicio resulta de una comunicaci\u00f3n o transmisi\u00f3n de datos maliciosa que interfiere en el rendimiento del sistema, pudiendo hacer que las conexiones queden totalmente bloqueadas. Sin embargo, los sistemas se pueden reforzar contra ese ataque.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Desgraciadamente, es por eso que los delincuentes recurren al ataque distribuido de denegaci\u00f3n de servicio, tambi\u00e9n conocido por la sigla en ingl\u00e9s DDoS (distributed denial of service). En esta modalidad, las comunicaciones o transmisiones de datos maliciosas parten de hasta miles de computadoras al mismo tiempo.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">En una comparaci\u00f3n con el mundo real, es como si el atacante lograra llenar una tienda con personas que no son clientes para entorpecer la atenci\u00f3n a los verdaderos clientes, obligando a la tienda a \u201cnegar el servicio\u201d.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">En algunos casos, la escala del ataque distribuido sobrecarga totalmente el sistema. Es posible incluso saturar la conexi\u00f3n con internet del servicio, lo que deja al blanco sin medios para resistir por s\u00ed mismo.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">\u00bfDe qui\u00e9nes son las computadoras que participan <\/span><span style=\"font-weight: 400;\">en ese <\/span><span style=\"font-weight: 400;\">ataque?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Los delincuentes casi siempre usan dispositivos de otras personas para efectuar el DDoS, como computadoras y hasta aparatos de Internet de las Cosas \u2014c\u00e1maras de seguridad, TV, grabadoras de v\u00eddeo\u2014 que fueron contaminados con un malware de acceso remoto.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">La plaga digital pasa a controlar el dispositivo \u2014de preferencia, sin advertir al usuario\u2014 y forma una <\/span><b>red zombi (botnet)<\/b><span style=\"font-weight: 400;\"> con los dem\u00e1s sistemas infectados.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Teniendo el control de ese \u201cej\u00e9rcito\u201d, el delincuente env\u00eda un comando para que la red entera establezca conexiones con el blanco deseado, concretando, as\u00ed, el ataque.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Tambi\u00e9n existe una modalidad llamada \"<\/span><b>ataque distribuido reflejado de denegaci\u00f3n de servicio<\/b><span style=\"font-weight: 400;\"> \". Es un escenario m\u00e1s complejo en el que los delincuentes se aprovechan de caracter\u00edsticas espec\u00edficas de algunos protocolos de red para \"desviar\" (o hacer \"rebotar\") conexiones hacia el blanco del ataque.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">\u00bfPara qu\u00e9 sirve un ataque que derriba sistemas?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Los ataques de denegaci\u00f3n de servicio se pueden realizar con diferentes fines. Por ejemplo:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Extorsi\u00f3n:<\/b><span style=\"font-weight: 400;\"> despu\u00e9s de derribar un sistema cr\u00edtico de una empresa, el delincuente entra en contacto para exigir un pago para terminar con el ataque.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Distracci\u00f3n:<\/b><span style=\"font-weight: 400;\"> el ataque de denegaci\u00f3n de servicio puede servir como se\u00f1uelo para encubrir otro ataque discreto y de mayor valor que se est\u00e1 ejecutando al mismo tiempo.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Cortar el acceso a la seguridad:<\/b><span style=\"font-weight: 400;\"> un atacante puede derribar un subsistema de seguridad para evitar que interfiera en otros fraudes.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Activismo en l\u00ednea:<\/b><span style=\"font-weight: 400;\"> el DDoS ya se ha utilizado en muchos casos de \"activismo\" o protestas en l\u00ednea. En este caso, los usuarios se unen al ataque voluntariamente.<\/span><\/li>\n<\/ul>\n<h2><span style=\"font-weight: 400;\">\u00bfC\u00f3mo no formar parte de un DDoS?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Garantizar la disponibilidad de los sistemas es una de las misiones de los profesionales de seguridad cibern\u00e9tica. Sin embargo, todos pueden ayudar evitando que sus dispositivos se incorporen a redes zombi. \u00bfC\u00f3mo?<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Manteniendo sus sistemas actualizados, incluso en dispositivos de \"Internet de las Cosas\" (c\u00e1meras, TV, grabadores, heladeras);<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Personalizando las contrase\u00f1as en dispositivos de IoT;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Teniendo cuidado con enlaces y adjuntos (que pueden contener malware);<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Bajando softwares solo de fuentes conocidas;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">No ignorando las <strong><a href=\"https:\/\/hackerrangers.siteup.dev\/es\/cybersecurity\/antivirus-how-it-works-and-how-important-it-is\/\">alertas del antivirus<\/a><\/strong>.<\/span><\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>&#8220;The system is down&#8221;. This is something you may have heard before, referring to the unavailability or inoperability of a digital application or service. With the system down, important tasks may become jeopardized, disrupting ticketing at an airport or the admission of patients to a hospital. When these unforeseen outages are the result of deliberate [&hellip;]<\/p>\n","protected":false},"author":4009,"featured_media":2549,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[23],"tags":[66,151,90,150],"class_list":["post-2548","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-awareness","tag-cyberattacks","tag-cybercrime","tag-ddos"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is a Distributed Denial-of-Service (DDoS) attack? | Hacker Rangers<\/title>\n<meta name=\"description\" content=\"Learn how DDoS attacks disrupt systems, how botnets are used, and what steps you can take to prevent your devices .\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is a Distributed Denial-of-Service (DDoS) attack? | Hacker Rangers\" \/>\n<meta property=\"og:description\" content=\"Learn how DDoS attacks disrupt systems, how botnets are used, and what steps you can take to prevent your devices .\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hackerrangers.siteup.dev\/es\/cybersecurity\/que-es-un-ataque-de-denegacion-de-servicio-distribuido\/\" \/>\n<meta property=\"og:site_name\" content=\"Hacker Rangers\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-16T17:59:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-16T18:07:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2026\/02\/DDoS.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Hacker Rangers\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hacker Rangers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-is-a-ddos-attack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-is-a-ddos-attack\/\"},\"author\":{\"name\":\"Hacker Rangers\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\"},\"headline\":\"What is a Distributed Denial-of-Service (DDoS) attack?\",\"datePublished\":\"2026-02-16T17:59:26+00:00\",\"dateModified\":\"2026-02-16T18:07:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-is-a-ddos-attack\/\"},\"wordCount\":537,\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-is-a-ddos-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2026\/02\/DDoS.png\",\"keywords\":[\"awareness\",\"cyberattacks\",\"cybercrime\",\"DDoS\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-is-a-ddos-attack\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-is-a-ddos-attack\/\",\"name\":\"What is a Distributed Denial-of-Service (DDoS) attack? | Hacker Rangers\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-is-a-ddos-attack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-is-a-ddos-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2026\/02\/DDoS.png\",\"datePublished\":\"2026-02-16T17:59:26+00:00\",\"dateModified\":\"2026-02-16T18:07:47+00:00\",\"description\":\"Learn how DDoS attacks disrupt systems, how botnets are used, and what steps you can take to prevent your devices .\",\"breadcrumb\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-is-a-ddos-attack\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-is-a-ddos-attack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-is-a-ddos-attack\/#primaryimage\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2026\/02\/DDoS.png\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2026\/02\/DDoS.png\",\"width\":1500,\"height\":1000,\"caption\":\"DDoS\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-is-a-ddos-attack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/hackerrangers.siteup.dev\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is a Distributed Denial-of-Service (DDoS) attack?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"name\":\"Hacker Rangers\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"width\":104,\"height\":50,\"caption\":\"Hacker Rangers\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/es\/author\/hackerrangers\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is a Distributed Denial-of-Service (DDoS) attack? | Hacker Rangers","description":"Learn how DDoS attacks disrupt systems, how botnets are used, and what steps you can take to prevent your devices .","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"es_ES","og_type":"article","og_title":"What is a Distributed Denial-of-Service (DDoS) attack? | Hacker Rangers","og_description":"Learn how DDoS attacks disrupt systems, how botnets are used, and what steps you can take to prevent your devices .","og_url":"https:\/\/hackerrangers.siteup.dev\/es\/cybersecurity\/que-es-un-ataque-de-denegacion-de-servicio-distribuido\/","og_site_name":"Hacker Rangers","article_published_time":"2026-02-16T17:59:26+00:00","article_modified_time":"2026-02-16T18:07:47+00:00","og_image":[{"width":1500,"height":1000,"url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2026\/02\/DDoS.png","type":"image\/png"}],"author":"Hacker Rangers","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Hacker Rangers","Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-is-a-ddos-attack\/#article","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-is-a-ddos-attack\/"},"author":{"name":"Hacker Rangers","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61"},"headline":"What is a Distributed Denial-of-Service (DDoS) attack?","datePublished":"2026-02-16T17:59:26+00:00","dateModified":"2026-02-16T18:07:47+00:00","mainEntityOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-is-a-ddos-attack\/"},"wordCount":537,"publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-is-a-ddos-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2026\/02\/DDoS.png","keywords":["awareness","cyberattacks","cybercrime","DDoS"],"articleSection":["Cybersecurity"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-is-a-ddos-attack\/","url":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-is-a-ddos-attack\/","name":"What is a Distributed Denial-of-Service (DDoS) attack? | Hacker Rangers","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-is-a-ddos-attack\/#primaryimage"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-is-a-ddos-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2026\/02\/DDoS.png","datePublished":"2026-02-16T17:59:26+00:00","dateModified":"2026-02-16T18:07:47+00:00","description":"Learn how DDoS attacks disrupt systems, how botnets are used, and what steps you can take to prevent your devices .","breadcrumb":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-is-a-ddos-attack\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-is-a-ddos-attack\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-is-a-ddos-attack\/#primaryimage","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2026\/02\/DDoS.png","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2026\/02\/DDoS.png","width":1500,"height":1000,"caption":"DDoS"},{"@type":"BreadcrumbList","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-is-a-ddos-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/hackerrangers.siteup.dev\/"},{"@type":"ListItem","position":2,"name":"What is a Distributed Denial-of-Service (DDoS) attack?"}]},{"@type":"WebSite","@id":"https:\/\/hackerrangers.siteup.dev\/#website","url":"https:\/\/hackerrangers.siteup.dev\/","name":"Hacker Rangers","description":"","publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/hackerrangers.siteup.dev\/#organization","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","width":104,"height":50,"caption":"Hacker Rangers"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/es\/author\/hackerrangers\/"}]}},"_links":{"self":[{"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/posts\/2548","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/users\/4009"}],"replies":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/comments?post=2548"}],"version-history":[{"count":0,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/posts\/2548\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/media\/2549"}],"wp:attachment":[{"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/media?parent=2548"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/categories?post=2548"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/tags?post=2548"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}