{"id":539,"date":"2018-06-11T14:00:14","date_gmt":"2018-06-11T14:00:14","guid":{"rendered":"https:\/\/ukr.host\/kb\/?p=539"},"modified":"2025-10-06T15:16:54","modified_gmt":"2025-10-06T15:16:54","slug":"kak-zachitit-site-ot-vzloma","status":"publish","type":"post","link":"https:\/\/ukr.host\/kb\/en\/hosting\/kak-zachitit-site-ot-vzloma\/","title":{"rendered":"The Most Common Hacker Attacks. How to Protect Your Site from Hacking"},"content":{"rendered":"<p>Many articles have already been written about how a much larger number of sites are subject to non-targeted hacker attacks than targeted attacks. According to statistics, only about 25% of website hacks are targeted in nature, while the rest &#8220;get caught&#8221; on the hook randomly.<br \/>\nThe most common mistake that makes it easier for hackers to hack a site is the vulnerability of CMS, plugins, or templates. Any, even the slightest, &#8220;crack&#8221; in the system significantly reduces the security level of the site. If you get caught, be prepared for the fact that your page will be used for unintended purposes, it can turn into a center for distributing advertising and spam.<br \/>\nIf you think this will pass you by, you are deeply mistaken. Finding sites with problem areas in CMS is quite simple. Even a non-professional, but novice hacker can do this. Google Hacking Database is a so-called registry of sites vulnerable by identical signs. How does it work? Indexed sites with certain vulnerabilities are found by hackers in search engines, thanks to which they get access to upload malicious code.<br \/>\nBased on this, it&#8217;s worth understanding that if there is even the slightest flaw in the CMS or installed plugins, hacking the site will not be difficult. The owner or webmaster must take care of a sufficient level of site protection.<\/p>\n<h2>How to Hack a Site Using Google&#8217;s Capabilities<\/h2>\n<p>To demonstrate to trusting or self-confident owners that hacking a site in a few minutes is possible simply by using Google&#8217;s functions, we decided to give a visual example of how successfully hackers use the mistakes you can make when creating a site.<br \/>\nSince September 2015, the Google Hacking Database has added the ability to search for pages with open directories where you can view all files, including access credentials and passwords. To do this, you simply need to:<br \/>\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/ukr.host\/kb\/wp-content\/uploads\/2018\/06\/wwwroot.jpg\" alt=\"Hack ot google\" width=\"949\" height=\"609\" class=\"aligncenter size-full wp-image-540\" srcset=\"https:\/\/ukr.host\/kb\/wp-content\/uploads\/2018\/06\/wwwroot.jpg 949w, https:\/\/ukr.host\/kb\/wp-content\/uploads\/2018\/06\/wwwroot-200x128.jpg 200w, https:\/\/ukr.host\/kb\/wp-content\/uploads\/2018\/06\/wwwroot-768x493.jpg 768w\" sizes=\"auto, (max-width: 949px) 100vw, 949px\" \/><br \/>\nSend the query <strong>intitle:&#8221;Index of&#8221; &#8220;wwwroot<\/strong> to the Google search engine, and we get a complete list of sites with open directories. Next, you need to select the site we need and follow the link.<br \/>\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/ukr.host\/kb\/wp-content\/uploads\/2018\/06\/wwwroot2.jpg\" alt=\"hack no index\" width=\"672\" height=\"327\" class=\"aligncenter size-full wp-image-541\" srcset=\"https:\/\/ukr.host\/kb\/wp-content\/uploads\/2018\/06\/wwwroot2.jpg 672w, https:\/\/ukr.host\/kb\/wp-content\/uploads\/2018\/06\/wwwroot2-200x97.jpg 200w\" sizes=\"auto, (max-width: 672px) 100vw, 672px\" \/><br \/>\nThis link will open the entire list of directories. You can browse through them and find the serverconfig.xml file \u2013 it contains all logins and passwords for databases. If the credentials also match SSH and FTP, then the hacker will have access to the server itself.<br \/>\nThe entire procedure takes no more than a few minutes (this is for a beginner). A hacker who knows their business can perform these actions automatically in just a few seconds.<\/p>\n<h3>How to Prevent Website Hacking<\/h3>\n<p>Of course, no one wants to find themselves in such an unpleasant situation. It&#8217;s especially offensive when the system is hacked due to minor flaws that could have been eliminated initially, but over time brought many troubles. Therefore, immediately after creating a site, it&#8217;s better to seek help from professionals. Ukrhost company provides not only hosting placement and domain registration services, but also site maintenance during operation. A team of professionals will initially install modern protection from hacking and will monitor the security of your page 24 hours a day!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Many articles have already been written about how a much larger number of sites are subject to non-targeted hacker attacks than targeted attacks. According to statistics, only about 25% of website hacks are targeted in nature, while the rest &#8220;get&#8230;<br \/><a class=\"read-more-button\" href=\"https:\/\/ukr.host\/kb\/en\/hosting\/kak-zachitit-site-ot-vzloma\/\">\u041f\u043e\u0434\u0440\u043e\u0431\u043d\u0435\u0435<\/a><\/p>\n","protected":false},"author":1,"featured_media":544,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58,7],"tags":[30,17,54,55],"class_list":["post-539","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-vzlom-i-zachita-site","category-hosting","tag-hosting","tag-seo","tag-virus","tag-vzlom"],"translation":{"provider":"WPGlobus","version":"3.0.0","language":"en","enabled_languages":["ru","uk","en"],"languages":{"ru":{"title":true,"content":true,"excerpt":false},"uk":{"title":true,"content":true,"excerpt":false},"en":{"title":true,"content":true,"excerpt":false}}},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.5 (Yoast SEO v26.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Most Common Hacker Attacks. How to Protect Your Site from Hacking - Ukr.Host Knowledge Base<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ukr.host\/kb\/hosting\/kak-zachitit-site-ot-vzloma\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Most Common Hacker Attacks. How to Protect Your Site from Hacking - Ukr.Host Knowledge Base\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ukr.host\/kb\/hosting\/kak-zachitit-site-ot-vzloma\/\" \/>\n<meta property=\"og:site_name\" content=\"Ukr.Host Knowledge Base\" \/>\n<meta property=\"article:published_time\" content=\"2018-06-11T14:00:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-06T15:16:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ukr.host\/kb\/wp-content\/uploads\/2018\/06\/vzlom.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"339\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ruskam\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ruskam\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ukr.host\/kb\/hosting\/kak-zachitit-site-ot-vzloma\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ukr.host\/kb\/hosting\/kak-zachitit-site-ot-vzloma\/\"},\"author\":{\"name\":\"ruskam\",\"@id\":\"https:\/\/ukr.host\/kb\/uk\/#\/schema\/person\/3c7fa537caf04a967d331159cd128f65\"},\"headline\":\"The Most Common Hacker Attacks. How to Protect Your Site from Hacking\",\"datePublished\":\"2018-06-11T14:00:14+00:00\",\"dateModified\":\"2025-10-06T15:16:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ukr.host\/kb\/hosting\/kak-zachitit-site-ot-vzloma\/\"},\"wordCount\":1434,\"publisher\":{\"@id\":\"https:\/\/ukr.host\/kb\/uk\/#organization\"},\"image\":{\"@id\":\"https:\/\/ukr.host\/kb\/hosting\/kak-zachitit-site-ot-vzloma\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ukr.host\/kb\/wp-content\/uploads\/2018\/06\/vzlom.jpg\",\"keywords\":[\"hosting\",\"seo\",\"virus\",\"\u0432\u0437\u043b\u043e\u043c\"],\"articleSection\":[\"Website hacking and protection\",\"Hosting\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ukr.host\/kb\/hosting\/kak-zachitit-site-ot-vzloma\/\",\"url\":\"https:\/\/ukr.host\/kb\/hosting\/kak-zachitit-site-ot-vzloma\/\",\"name\":\"The Most Common Hacker Attacks. How to Protect Your Site from Hacking - Ukr.Host Knowledge Base\",\"isPartOf\":{\"@id\":\"https:\/\/ukr.host\/kb\/uk\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ukr.host\/kb\/hosting\/kak-zachitit-site-ot-vzloma\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ukr.host\/kb\/hosting\/kak-zachitit-site-ot-vzloma\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ukr.host\/kb\/wp-content\/uploads\/2018\/06\/vzlom.jpg\",\"datePublished\":\"2018-06-11T14:00:14+00:00\",\"dateModified\":\"2025-10-06T15:16:54+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/ukr.host\/kb\/hosting\/kak-zachitit-site-ot-vzloma\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ukr.host\/kb\/hosting\/kak-zachitit-site-ot-vzloma\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ukr.host\/kb\/hosting\/kak-zachitit-site-ot-vzloma\/#primaryimage\",\"url\":\"https:\/\/ukr.host\/kb\/wp-content\/uploads\/2018\/06\/vzlom.jpg\",\"contentUrl\":\"https:\/\/ukr.host\/kb\/wp-content\/uploads\/2018\/06\/vzlom.jpg\",\"width\":500,\"height\":339,\"caption\":\"\u0412\u0437\u043b\u043e\u043c \u0441\u0430\u0439\u0442\u0430\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ukr.host\/kb\/hosting\/kak-zachitit-site-ot-vzloma\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ukr.host\/kb\/uk\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u0421\u0430\u043c\u044b\u0435 \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u043d\u044b\u0435 \u0445\u0430\u043a\u0435\u0440\u0441\u043a\u0438\u0435 \u0430\u0442\u0430\u043a\u0438. \u041a\u0430\u043a \u0437\u0430\u0449\u0438\u0442\u0438\u0442\u044c \u0441\u0430\u0439\u0442 \u043e\u0442 \u0432\u0437\u043b\u043e\u043c\u0430\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ukr.host\/kb\/uk\/#website\",\"url\":\"https:\/\/ukr.host\/kb\/uk\/\",\"name\":\"\u0411\u0430\u0437\u0430 \u0437\u043d\u0430\u043d\u044c Ukr.Host\",\"description\":\"Useful articles about hosting, domains and servers.\",\"publisher\":{\"@id\":\"https:\/\/ukr.host\/kb\/uk\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ukr.host\/kb\/uk\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ukr.host\/kb\/uk\/#organization\",\"name\":\"UkrHost\",\"url\":\"https:\/\/ukr.host\/kb\/uk\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ukr.host\/kb\/uk\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ukr.host\/kb\/wp-content\/uploads\/2025\/12\/logo.jpg\",\"contentUrl\":\"https:\/\/ukr.host\/kb\/wp-content\/uploads\/2025\/12\/logo.jpg\",\"width\":648,\"height\":307,\"caption\":\"UkrHost\"},\"image\":{\"@id\":\"https:\/\/ukr.host\/kb\/uk\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/ukr.host\/kb\/uk\/#\/schema\/person\/3c7fa537caf04a967d331159cd128f65\",\"name\":\"ruskam\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ukr.host\/kb\/uk\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/219f09b013fa34010e8cf9182ca886a772d879221eee5f4da1ec75a87c9daef8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/219f09b013fa34010e8cf9182ca886a772d879221eee5f4da1ec75a87c9daef8?s=96&d=mm&r=g\",\"caption\":\"ruskam\"},\"url\":\"https:\/\/ukr.host\/kb\/en\/author\/ruskam\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Most Common Hacker Attacks. How to Protect Your Site from Hacking - Ukr.Host Knowledge Base","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ukr.host\/kb\/hosting\/kak-zachitit-site-ot-vzloma\/","og_locale":"en_US","og_type":"article","og_title":"The Most Common Hacker Attacks. How to Protect Your Site from Hacking - Ukr.Host Knowledge Base","og_url":"https:\/\/ukr.host\/kb\/hosting\/kak-zachitit-site-ot-vzloma\/","og_site_name":"Ukr.Host Knowledge Base","article_published_time":"2018-06-11T14:00:14+00:00","article_modified_time":"2025-10-06T15:16:54+00:00","og_image":[{"width":500,"height":339,"url":"https:\/\/ukr.host\/kb\/wp-content\/uploads\/2018\/06\/vzlom.jpg","type":"image\/jpeg"}],"author":"ruskam","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ruskam","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ukr.host\/kb\/hosting\/kak-zachitit-site-ot-vzloma\/#article","isPartOf":{"@id":"https:\/\/ukr.host\/kb\/hosting\/kak-zachitit-site-ot-vzloma\/"},"author":{"name":"ruskam","@id":"https:\/\/ukr.host\/kb\/uk\/#\/schema\/person\/3c7fa537caf04a967d331159cd128f65"},"headline":"The Most Common Hacker Attacks. How to Protect Your Site from Hacking","datePublished":"2018-06-11T14:00:14+00:00","dateModified":"2025-10-06T15:16:54+00:00","mainEntityOfPage":{"@id":"https:\/\/ukr.host\/kb\/hosting\/kak-zachitit-site-ot-vzloma\/"},"wordCount":1434,"publisher":{"@id":"https:\/\/ukr.host\/kb\/uk\/#organization"},"image":{"@id":"https:\/\/ukr.host\/kb\/hosting\/kak-zachitit-site-ot-vzloma\/#primaryimage"},"thumbnailUrl":"https:\/\/ukr.host\/kb\/wp-content\/uploads\/2018\/06\/vzlom.jpg","keywords":["hosting","seo","virus","\u0432\u0437\u043b\u043e\u043c"],"articleSection":["Website hacking and protection","Hosting"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/ukr.host\/kb\/hosting\/kak-zachitit-site-ot-vzloma\/","url":"https:\/\/ukr.host\/kb\/hosting\/kak-zachitit-site-ot-vzloma\/","name":"The Most Common Hacker Attacks. How to Protect Your Site from Hacking - Ukr.Host Knowledge Base","isPartOf":{"@id":"https:\/\/ukr.host\/kb\/uk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ukr.host\/kb\/hosting\/kak-zachitit-site-ot-vzloma\/#primaryimage"},"image":{"@id":"https:\/\/ukr.host\/kb\/hosting\/kak-zachitit-site-ot-vzloma\/#primaryimage"},"thumbnailUrl":"https:\/\/ukr.host\/kb\/wp-content\/uploads\/2018\/06\/vzlom.jpg","datePublished":"2018-06-11T14:00:14+00:00","dateModified":"2025-10-06T15:16:54+00:00","breadcrumb":{"@id":"https:\/\/ukr.host\/kb\/hosting\/kak-zachitit-site-ot-vzloma\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ukr.host\/kb\/hosting\/kak-zachitit-site-ot-vzloma\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ukr.host\/kb\/hosting\/kak-zachitit-site-ot-vzloma\/#primaryimage","url":"https:\/\/ukr.host\/kb\/wp-content\/uploads\/2018\/06\/vzlom.jpg","contentUrl":"https:\/\/ukr.host\/kb\/wp-content\/uploads\/2018\/06\/vzlom.jpg","width":500,"height":339,"caption":"\u0412\u0437\u043b\u043e\u043c \u0441\u0430\u0439\u0442\u0430"},{"@type":"BreadcrumbList","@id":"https:\/\/ukr.host\/kb\/hosting\/kak-zachitit-site-ot-vzloma\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ukr.host\/kb\/uk\/"},{"@type":"ListItem","position":2,"name":"\u0421\u0430\u043c\u044b\u0435 \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u043d\u044b\u0435 \u0445\u0430\u043a\u0435\u0440\u0441\u043a\u0438\u0435 \u0430\u0442\u0430\u043a\u0438. \u041a\u0430\u043a \u0437\u0430\u0449\u0438\u0442\u0438\u0442\u044c \u0441\u0430\u0439\u0442 \u043e\u0442 \u0432\u0437\u043b\u043e\u043c\u0430"}]},{"@type":"WebSite","@id":"https:\/\/ukr.host\/kb\/uk\/#website","url":"https:\/\/ukr.host\/kb\/uk\/","name":"\u0411\u0430\u0437\u0430 \u0437\u043d\u0430\u043d\u044c Ukr.Host","description":"Useful articles about hosting, domains and servers.","publisher":{"@id":"https:\/\/ukr.host\/kb\/uk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ukr.host\/kb\/uk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ukr.host\/kb\/uk\/#organization","name":"UkrHost","url":"https:\/\/ukr.host\/kb\/uk\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ukr.host\/kb\/uk\/#\/schema\/logo\/image\/","url":"https:\/\/ukr.host\/kb\/wp-content\/uploads\/2025\/12\/logo.jpg","contentUrl":"https:\/\/ukr.host\/kb\/wp-content\/uploads\/2025\/12\/logo.jpg","width":648,"height":307,"caption":"UkrHost"},"image":{"@id":"https:\/\/ukr.host\/kb\/uk\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/ukr.host\/kb\/uk\/#\/schema\/person\/3c7fa537caf04a967d331159cd128f65","name":"ruskam","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ukr.host\/kb\/uk\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/219f09b013fa34010e8cf9182ca886a772d879221eee5f4da1ec75a87c9daef8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/219f09b013fa34010e8cf9182ca886a772d879221eee5f4da1ec75a87c9daef8?s=96&d=mm&r=g","caption":"ruskam"},"url":"https:\/\/ukr.host\/kb\/en\/author\/ruskam\/"}]}},"_links":{"self":[{"href":"https:\/\/ukr.host\/kb\/en\/wp-json\/wp\/v2\/posts\/539","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ukr.host\/kb\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ukr.host\/kb\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ukr.host\/kb\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ukr.host\/kb\/en\/wp-json\/wp\/v2\/comments?post=539"}],"version-history":[{"count":7,"href":"https:\/\/ukr.host\/kb\/en\/wp-json\/wp\/v2\/posts\/539\/revisions"}],"predecessor-version":[{"id":1077,"href":"https:\/\/ukr.host\/kb\/en\/wp-json\/wp\/v2\/posts\/539\/revisions\/1077"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ukr.host\/kb\/en\/wp-json\/wp\/v2\/media\/544"}],"wp:attachment":[{"href":"https:\/\/ukr.host\/kb\/en\/wp-json\/wp\/v2\/media?parent=539"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ukr.host\/kb\/en\/wp-json\/wp\/v2\/categories?post=539"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ukr.host\/kb\/en\/wp-json\/wp\/v2\/tags?post=539"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}