{"id":15676,"date":"2026-01-23T08:26:27","date_gmt":"2026-01-23T07:26:27","guid":{"rendered":"https:\/\/www.palentino.es\/blog\/?p=15676"},"modified":"2026-01-23T08:31:20","modified_gmt":"2026-01-23T07:31:20","slug":"%f0%9f%91%bb-ghost-analizando-procesos-y-memoria-en-windows-con-rust","status":"publish","type":"post","link":"https:\/\/www.palentino.es\/blog\/%f0%9f%91%bb-ghost-analizando-procesos-y-memoria-en-windows-con-rust\/","title":{"rendered":"&#x1f47b; Ghost: analizando procesos y memoria en Windows con Rust"},"content":{"rendered":"<p data-start=\"255\" data-end=\"482\">En los \u00faltimos a\u00f1os, muchas amenazas han dejado de \u201cinstalarse\u201d en disco.<br data-start=\"328\" data-end=\"331\" \/>Hoy el malware <strong data-start=\"346\" data-end=\"365\">vive en memoria<\/strong>, se inyecta en procesos leg\u00edtimos y desaparece al reiniciar. Esto hace que antivirus cl\u00e1sicos <strong data-start=\"460\" data-end=\"481\">no vean nada raro<\/strong>.<\/p>\n<p data-start=\"484\" data-end=\"686\">Para este nuevo escenario nace <strong data-start=\"515\" data-end=\"524\">Ghost<\/strong>, una herramienta open-source escrita en <strong data-start=\"565\" data-end=\"573\">Rust<\/strong> cuyo objetivo no es limpiar ni bloquear, sino <strong data-start=\"620\" data-end=\"685\">mostrar lo que ocurre realmente en la memoria de los procesos<\/strong>.<\/p>\n<p data-start=\"484\" data-end=\"686\"><a href=\"https:\/\/www.palentino.es\/blog\/wp-content\/uploads\/2026\/01\/Ghost-palentino.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-15678\" src=\"https:\/\/www.palentino.es\/blog\/wp-content\/uploads\/2026\/01\/Ghost-palentino.jpg\" alt=\"\" width=\"1045\" height=\"698\" srcset=\"https:\/\/www.palentino.es\/blog\/wp-content\/uploads\/2026\/01\/Ghost-palentino.jpg 1045w, https:\/\/www.palentino.es\/blog\/wp-content\/uploads\/2026\/01\/Ghost-palentino-300x200.jpg 300w, https:\/\/www.palentino.es\/blog\/wp-content\/uploads\/2026\/01\/Ghost-palentino-1024x684.jpg 1024w\" sizes=\"auto, (max-width: 1045px) 100vw, 1045px\" \/><\/a><\/p>\n<p data-start=\"484\" data-end=\"686\"><!--more--><\/p>\n<h2 data-start=\"735\" data-end=\"767\">&#x1f50d; \u00bfQu\u00e9 es exactamente Ghost?<\/h2>\n<p data-start=\"769\" data-end=\"946\"><strong data-start=\"769\" data-end=\"778\">Ghost<\/strong> es una herramienta de <strong data-start=\"801\" data-end=\"825\">detecci\u00f3n y an\u00e1lisis<\/strong> que inspecciona los procesos en ejecuci\u00f3n en Windows buscando <strong data-start=\"888\" data-end=\"939\">indicadores t\u00e9cnicos de manipulaci\u00f3n de memoria<\/strong>, como:<\/p>\n<ul>\n<li data-start=\"950\" data-end=\"1002\">Regiones de memoria <strong data-start=\"970\" data-end=\"977\">RWX<\/strong> (Read \/ Write \/ Execute)<\/li>\n<li data-start=\"1005\" data-end=\"1043\">C\u00f3digo inyectado en procesos leg\u00edtimos<\/li>\n<li data-start=\"1046\" data-end=\"1079\">T\u00e9cnicas como <em data-start=\"1060\" data-end=\"1079\">process hollowing<\/em><\/li>\n<li data-start=\"1082\" data-end=\"1112\">Shellcode residente en memoria<\/li>\n<li data-start=\"1115\" data-end=\"1170\">Comportamientos an\u00f3malos que no dejan archivos en disco<\/li>\n<\/ul>\n<p data-start=\"1172\" data-end=\"1304\">&#x26a0;&#xfe0f; Importante:<br data-start=\"1186\" data-end=\"1189\" \/>Ghost <strong data-start=\"1195\" data-end=\"1212\">NO es malware<\/strong>, <strong data-start=\"1214\" data-end=\"1233\">NO explota nada<\/strong> y <strong data-start=\"1236\" data-end=\"1257\">NO ataca procesos<\/strong>.<br data-start=\"1258\" data-end=\"1261\" \/>Es una herramienta <strong data-start=\"1280\" data-end=\"1303\">defensiva \/ forense<\/strong>.<\/p>\n<hr data-start=\"1306\" data-end=\"1309\" \/>\n<h2 data-start=\"1311\" data-end=\"1342\">&#x1f3af; \u00bfPara qui\u00e9n est\u00e1 pensada?<\/h2>\n<ul>\n<li data-start=\"1346\" data-end=\"1383\">Administradores de sistemas Windows<\/li>\n<li data-start=\"1386\" data-end=\"1415\">Analistas de ciberseguridad<\/li>\n<li data-start=\"1418\" data-end=\"1459\">Estudiantes y laboratorios de seguridad<\/li>\n<li data-start=\"1462\" data-end=\"1492\">Entornos de an\u00e1lisis forense<\/li>\n<li data-start=\"1495\" data-end=\"1557\">Curiosos que quieren entender c\u00f3mo funciona el malware moderno<\/li>\n<\/ul>\n<p data-start=\"1559\" data-end=\"1607\">No sustituye a un antivirus: <strong data-start=\"1588\" data-end=\"1606\">lo complementa<\/strong>.<\/p>\n<hr data-start=\"1609\" data-end=\"1612\" \/>\n<h2 data-start=\"1614\" data-end=\"1638\">&#x2699;&#xfe0f; Requisitos previos<\/h2>\n<p data-start=\"1640\" data-end=\"1670\">Antes de usar Ghost necesitas:<\/p>\n<h3 data-start=\"1672\" data-end=\"1686\">&#x2714;&#xfe0f; Sistema<\/h3>\n<ul>\n<li data-start=\"1689\" data-end=\"1722\">Windows 10 \/ 11 (preferiblemente)<\/li>\n<li data-start=\"1725\" data-end=\"1800\">Ejecutar como <strong data-start=\"1739\" data-end=\"1756\">Administrador<\/strong> (imprescindible para inspeccionar procesos)<\/li>\n<\/ul>\n<h3 data-start=\"1802\" data-end=\"1821\">&#x2714;&#xfe0f; Herramientas<\/h3>\n<ul>\n<li data-start=\"1824\" data-end=\"1844\"><strong data-start=\"1824\" data-end=\"1832\">Rust<\/strong> instalado<\/li>\n<\/ul>\n<div class=\"contain-inline-size rounded-2xl corner-superellipse\/1.1 relative bg-token-sidebar-surface-primary\">\n<div class=\"sticky top-[calc(--spacing(9)+var(--header-height))] @w-xl\/main:top-9\">\n<div class=\"absolute end-0 bottom-0 flex h-9 items-center pe-2\">\n<div class=\"bg-token-bg-elevated-secondary text-token-text-secondary flex items-center gap-4 rounded-sm px-2 font-sans text-xs\"><\/div>\n<\/div>\n<\/div>\n<div class=\"overflow-y-auto p-4\" dir=\"ltr\">\n<div class=\"codecolorer-container text mac-classic whitespace-pre! language-bash\" style=\"overflow:auto;white-space:nowrap;width:635px;\"><table cellspacing=\"0\" cellpadding=\"0\"><tbody><tr><td class=\"line-numbers\"><div>1<br \/>2<br \/><\/div><\/td><td><div class=\"text codecolorer\">rustup install stable<br \/>\nrustup default stable<\/div><\/td><\/tr><\/tbody><\/table><\/div>\n<\/div>\n<\/div>\n<ul>\n<li data-start=\"1911\" data-end=\"1945\"><strong data-start=\"1911\" data-end=\"1918\">Git<\/strong> para clonar el repositorio<\/li>\n<\/ul>\n<hr data-start=\"1947\" data-end=\"1950\" \/>\n<h2 data-start=\"1952\" data-end=\"1981\">&#x1f4e5; Instalaci\u00f3n paso a paso<\/h2>\n<h3 data-start=\"1983\" data-end=\"2012\">1&#xfe0f;&#x20e3; Clonar el repositorio<\/h3>\n<div class=\"contain-inline-size rounded-2xl corner-superellipse\/1.1 relative bg-token-sidebar-surface-primary\">\n<div class=\"sticky top-[calc(--spacing(9)+var(--header-height))] @w-xl\/main:top-9\">\n<div class=\"absolute end-0 bottom-0 flex h-9 items-center pe-2\">\n<div class=\"bg-token-bg-elevated-secondary text-token-text-secondary flex items-center gap-4 rounded-sm px-2 font-sans text-xs\"><strong>git clone https:\/\/github.com\/pandaadir05\/ghost.git<\/strong><\/div>\n<div><strong>cd ghost<\/strong><\/div>\n<div><\/div>\n<div>2&#xfe0f;&#x20e3; Compilar el proyecto (opci\u00f3n recomendada)<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p data-start=\"2141\" data-end=\"2195\">Antes de ejecutar nada, lo ideal es <strong data-start=\"2177\" data-end=\"2194\">solo compilar<\/strong>:<\/p>\n<p data-start=\"2141\" data-end=\"2195\"><strong>cargo build &#8211;release<\/strong><\/p>\n<p data-start=\"2141\" data-end=\"2195\">Esto genera el binario en:<\/p>\n<div class=\"contain-inline-size rounded-2xl corner-superellipse\/1.1 relative bg-token-sidebar-surface-primary\">\n<div class=\"overflow-y-auto p-4\" dir=\"ltr\">\n<div class=\"codecolorer-container text mac-classic whitespace-pre!\" style=\"overflow:auto;white-space:nowrap;width:635px;\"><table cellspacing=\"0\" cellpadding=\"0\"><tbody><tr><td class=\"line-numbers\"><div>1<br \/><\/div><\/td><td><div class=\"text codecolorer\">target\/release\/ghost-cli.exe<\/div><\/td><\/tr><\/tbody><\/table><\/div>\n<\/div>\n<\/div>\n<p data-start=\"2298\" data-end=\"2385\">&#x1f449; Compilar <strong data-start=\"2310\" data-end=\"2324\">no ejecuta<\/strong> el programa y te permite revisar el c\u00f3digo con tranquilidad.<\/p>\n<hr data-start=\"2387\" data-end=\"2390\" \/>\n<h3 data-start=\"2392\" data-end=\"2414\">3&#xfe0f;&#x20e3; Ejecutar Ghost<\/h3>\n<p data-start=\"2416\" data-end=\"2431\">Opci\u00f3n directa:<\/p>\n<div class=\"contain-inline-size rounded-2xl corner-superellipse\/1.1 relative bg-token-sidebar-surface-primary\">\n<div class=\"overflow-y-auto p-4\" dir=\"ltr\">\n<div class=\"codecolorer-container text mac-classic whitespace-pre! language-bash\" style=\"overflow:auto;white-space:nowrap;width:635px;\"><table cellspacing=\"0\" cellpadding=\"0\"><tbody><tr><td class=\"line-numbers\"><div>1<br \/><\/div><\/td><td><div class=\"text codecolorer\">target\/release\/ghost-cli.exe<\/div><\/td><\/tr><\/tbody><\/table><\/div>\n<\/div>\n<\/div>\n<p data-start=\"2474\" data-end=\"2509\">O compilando y ejecutando a la vez:<\/p>\n<div class=\"contain-inline-size rounded-2xl corner-superellipse\/1.1 relative bg-token-sidebar-surface-primary\">\n<div class=\"sticky top-[calc(--spacing(9)+var(--header-height))] @w-xl\/main:top-9\">\n<div class=\"absolute end-0 bottom-0 flex h-9 items-center pe-2\">\n<div class=\"bg-token-bg-elevated-secondary text-token-text-secondary flex items-center gap-4 rounded-sm px-2 font-sans text-xs\"><\/div>\n<\/div>\n<\/div>\n<div class=\"overflow-y-auto p-4\" dir=\"ltr\">\n<div class=\"codecolorer-container text mac-classic whitespace-pre! language-bash\" style=\"overflow:auto;white-space:nowrap;width:635px;\"><table cellspacing=\"0\" cellpadding=\"0\"><tbody><tr><td class=\"line-numbers\"><div>1<br \/><\/div><\/td><td><div class=\"text codecolorer\">cargo run --bin ghost-cli --release<\/div><\/td><\/tr><\/tbody><\/table><\/div>\n<\/div>\n<\/div>\n<p data-start=\"2559\" data-end=\"2715\">&#x26a0;&#xfe0f; Nota de seguridad<br data-start=\"2579\" data-end=\"2582\" \/><\/p>\n<div class=\"codecolorer-container text mac-classic\" style=\"overflow:auto;white-space:nowrap;width:635px;\"><table cellspacing=\"0\" cellpadding=\"0\"><tbody><tr><td class=\"line-numbers\"><div>1<br \/><\/div><\/td><td><div class=\"text codecolorer\">cargo run<\/div><\/td><\/tr><\/tbody><\/table><\/div>\n<p><strong data-start=\"2594\" data-end=\"2619\">s\u00ed ejecuta el binario<\/strong>, por lo que debe hacerse solo tras revisar el c\u00f3digo o en un entorno controlado (VM \/ sandbox).<\/p>\n<hr data-start=\"2717\" data-end=\"2720\" \/>\n<h2 data-start=\"2722\" data-end=\"2747\">&#x1f9ed; \u00bfC\u00f3mo se usa Ghost?<\/h2>\n<p data-start=\"2749\" data-end=\"2770\">Al ejecutarlo, Ghost:<\/p>\n<ol>\n<li data-start=\"2775\" data-end=\"2807\">Enumera los <strong data-start=\"2787\" data-end=\"2807\">procesos activos<\/strong><\/li>\n<li data-start=\"2811\" data-end=\"2833\">Analiza su <strong data-start=\"2822\" data-end=\"2833\">memoria<\/strong><\/li>\n<li data-start=\"2837\" data-end=\"2867\">Busca <strong data-start=\"2843\" data-end=\"2867\">patrones sospechosos<\/strong><\/li>\n<li data-start=\"2871\" data-end=\"2895\">Muestra alertas t\u00e9cnicas<\/li>\n<\/ol>\n<h3 data-start=\"2897\" data-end=\"2935\">&#x1f50e; Qu\u00e9 tipos de alertas puedes ver<\/h3>\n<ul>\n<li data-start=\"2938\" data-end=\"3074\"><strong data-start=\"2938\" data-end=\"2959\">RWX Memory Region<\/strong><br data-start=\"2959\" data-end=\"2962\" \/>Zonas de memoria con permisos de lectura, escritura y ejecuci\u00f3n<br data-start=\"3027\" data-end=\"3030\" \/>\u2192 muy poco habituales en software leg\u00edtimo<\/li>\n<li data-start=\"3078\" data-end=\"3161\"><strong data-start=\"3078\" data-end=\"3095\">Injected Code<\/strong><br data-start=\"3095\" data-end=\"3098\" \/>C\u00f3digo que no corresponde con el binario original del proceso<\/li>\n<li data-start=\"3165\" data-end=\"3241\"><strong data-start=\"3165\" data-end=\"3185\">Hollowed Process<\/strong><br data-start=\"3185\" data-end=\"3188\" \/>Proceso leg\u00edtimo cuyo contenido ha sido reemplazado<\/li>\n<li data-start=\"3245\" data-end=\"3314\"><strong data-start=\"3245\" data-end=\"3268\">Shellcode Detection<\/strong><br data-start=\"3268\" data-end=\"3271\" \/>Secuencias t\u00edpicas de payloads en memoria<\/li>\n<\/ul>\n<p data-start=\"3316\" data-end=\"3388\">Ghost <strong data-start=\"3322\" data-end=\"3342\">no decide por ti<\/strong>: te da informaci\u00f3n t\u00e9cnica para que analices.<\/p>\n<hr data-start=\"3390\" data-end=\"3393\" \/>\n<h2 data-start=\"3395\" data-end=\"3434\">&#x1f9e0; \u00bfC\u00f3mo interpretar los resultados?<\/h2>\n<p data-start=\"3436\" data-end=\"3474\">No todo lo que Ghost marca es malware:<\/p>\n<p data-start=\"3476\" data-end=\"3578\">&#x2714;&#xfe0f; Software de seguridad<br data-start=\"3500\" data-end=\"3503\" \/>&#x2714;&#xfe0f; Depuradores<br data-start=\"3517\" data-end=\"3520\" \/>&#x2714;&#xfe0f; Herramientas de virtualizaci\u00f3n<br data-start=\"3553\" data-end=\"3556\" \/>&#x2714;&#xfe0f; Drivers avanzados<\/p>\n<p data-start=\"3580\" data-end=\"3597\">La clave est\u00e1 en:<\/p>\n<ul>\n<li data-start=\"3600\" data-end=\"3615\"><strong data-start=\"3600\" data-end=\"3615\">Qu\u00e9 proceso<\/strong><\/li>\n<li data-start=\"3618\" data-end=\"3634\"><strong data-start=\"3618\" data-end=\"3634\">Desde cu\u00e1ndo<\/strong><\/li>\n<li data-start=\"3637\" data-end=\"3656\"><strong data-start=\"3637\" data-end=\"3656\">En qu\u00e9 contexto<\/strong><\/li>\n<li data-start=\"3659\" data-end=\"3677\"><strong data-start=\"3659\" data-end=\"3677\">En qu\u00e9 sistema<\/strong><\/li>\n<\/ul>\n<p data-start=\"3679\" data-end=\"3709\">Ghost es una lupa, no un juez.<\/p>\n<hr data-start=\"3711\" data-end=\"3714\" \/>\n<h2 data-start=\"3716\" data-end=\"3760\">&#x1f19a; \u00bfEn qu\u00e9 se diferencia de un antivirus?<\/h2>\n<div class=\"TyagGW_tableContainer\">\n<div class=\"group TyagGW_tableWrapper flex flex-col-reverse w-fit\" tabindex=\"-1\">\n<table class=\"w-fit min-w-(--thread-content-width)\" data-start=\"3762\" data-end=\"3981\">\n<thead data-start=\"3762\" data-end=\"3791\">\n<tr data-start=\"3762\" data-end=\"3791\">\n<th data-start=\"3762\" data-end=\"3782\" data-col-size=\"sm\">Antivirus cl\u00e1sico<\/th>\n<th data-start=\"3782\" data-end=\"3791\" data-col-size=\"sm\">Ghost<\/th>\n<\/tr>\n<\/thead>\n<tbody data-start=\"3821\" data-end=\"3981\">\n<tr data-start=\"3821\" data-end=\"3868\">\n<td data-start=\"3821\" data-end=\"3840\" data-col-size=\"sm\">Basado en firmas<\/td>\n<td data-start=\"3840\" data-end=\"3868\" data-col-size=\"sm\">Basado en comportamiento<\/td>\n<\/tr>\n<tr data-start=\"3869\" data-end=\"3904\">\n<td data-start=\"3869\" data-end=\"3885\" data-col-size=\"sm\">Analiza disco<\/td>\n<td data-col-size=\"sm\" data-start=\"3885\" data-end=\"3904\">Analiza memoria<\/td>\n<\/tr>\n<tr data-start=\"3905\" data-end=\"3931\">\n<td data-start=\"3905\" data-end=\"3918\" data-col-size=\"sm\">Autom\u00e1tico<\/td>\n<td data-start=\"3918\" data-end=\"3931\" data-col-size=\"sm\">Anal\u00edtico<\/td>\n<\/tr>\n<tr data-start=\"3932\" data-end=\"3953\">\n<td data-start=\"3932\" data-end=\"3942\" data-col-size=\"sm\">Bloquea<\/td>\n<td data-col-size=\"sm\" data-start=\"3942\" data-end=\"3953\">Observa<\/td>\n<\/tr>\n<tr data-start=\"3954\" data-end=\"3981\">\n<td data-start=\"3954\" data-end=\"3970\" data-col-size=\"sm\">Usuario final<\/td>\n<td data-col-size=\"sm\" data-start=\"3970\" data-end=\"3981\">T\u00e9cnico<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div>\n<hr data-start=\"3983\" data-end=\"3986\" \/>\n<h2 data-start=\"3988\" data-end=\"4018\">&#x1f6e1;&#xfe0f; Buenas pr\u00e1cticas de uso<\/h2>\n<ul>\n<li data-start=\"4022\" data-end=\"4063\">Usar en <strong data-start=\"4030\" data-end=\"4052\">entornos de prueba<\/strong> o an\u00e1lisis<\/li>\n<li data-start=\"4066\" data-end=\"4105\">Ejecutar siempre como <strong data-start=\"4088\" data-end=\"4105\">Administrador<\/strong><\/li>\n<li data-start=\"4108\" data-end=\"4146\">No usar como \u00fanica medida de seguridad<\/li>\n<li data-start=\"4149\" data-end=\"4184\">Complementar con Sysmon, EDR o logs<\/li>\n<\/ul>\n<hr data-start=\"4186\" data-end=\"4189\" \/>\n<h2 data-start=\"4191\" data-end=\"4207\">&#x270d;&#xfe0f; Conclusi\u00f3n<\/h2>\n<p data-start=\"4209\" data-end=\"4335\">Ghost no es una herramienta para \u201celiminar virus\u201d.<br data-start=\"4259\" data-end=\"4262\" \/>Es una herramienta para <strong data-start=\"4286\" data-end=\"4334\">entender lo que ocurre cuando nadie m\u00e1s mira<\/strong>.<\/p>\n<p data-start=\"4337\" data-end=\"4482\">En una \u00e9poca de malware sin archivos, <strong data-start=\"4375\" data-end=\"4413\">mirar la memoria es imprescindible<\/strong>, y Ghost lo hace de forma clara, moderna y auditable gracias a Rust.<\/p>\n<p data-start=\"4484\" data-end=\"4559\">Una joya para aprender, analizar y comprender la seguridad real en Windows.<\/p>\n<p data-start=\"4484\" data-end=\"4559\"><a href=\"https:\/\/www.palentino.es\/blog\/wp-content\/uploads\/2025\/05\/Contacto-oscar.gif\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-14716\" src=\"https:\/\/www.palentino.es\/blog\/wp-content\/uploads\/2025\/05\/Contacto-oscar.gif\" alt=\"\" width=\"556\" height=\"160\" \/><\/a><\/p>\n<p data-start=\"4484\" data-end=\"4559\">\n","protected":false},"excerpt":{"rendered":"<p>En los \u00faltimos a\u00f1os, muchas amenazas han dejado de \u201cinstalarse\u201d en disco.Hoy el malware vive en memoria, se inyecta en procesos leg\u00edtimos y desaparece al reiniciar. Esto hace que antivirus cl\u00e1sicos no vean nada raro. Para este nuevo escenario nace Ghost, una herramienta open-source escrita en Rust cuyo objetivo no es limpiar ni bloquear, sino mostrar lo que ocurre realmente en la memoria de los procesos.<\/p>\n","protected":false},"author":1,"featured_media":12506,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[50],"tags":[],"class_list":["post-15676","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-seguridad"],"_links":{"self":[{"href":"https:\/\/www.palentino.es\/blog\/wp-json\/wp\/v2\/posts\/15676","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palentino.es\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palentino.es\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palentino.es\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palentino.es\/blog\/wp-json\/wp\/v2\/comments?post=15676"}],"version-history":[{"count":7,"href":"https:\/\/www.palentino.es\/blog\/wp-json\/wp\/v2\/posts\/15676\/revisions"}],"predecessor-version":[{"id":15684,"href":"https:\/\/www.palentino.es\/blog\/wp-json\/wp\/v2\/posts\/15676\/revisions\/15684"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.palentino.es\/blog\/wp-json\/wp\/v2\/media\/12506"}],"wp:attachment":[{"href":"https:\/\/www.palentino.es\/blog\/wp-json\/wp\/v2\/media?parent=15676"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palentino.es\/blog\/wp-json\/wp\/v2\/categories?post=15676"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palentino.es\/blog\/wp-json\/wp\/v2\/tags?post=15676"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}