{"id":1652,"date":"2022-11-23T10:49:22","date_gmt":"2022-11-23T08:49:22","guid":{"rendered":"https:\/\/certitude.consulting\/blog\/?p=1652"},"modified":"2022-11-24T12:46:13","modified_gmt":"2022-11-24T10:46:13","slug":"web-application-firewalls-umgehen","status":"publish","type":"post","link":"https:\/\/certitude.consulting\/blog\/de\/web-application-firewalls-umgehen\/","title":{"rendered":"Web Application Firewalls umgehen"},"content":{"rendered":"\n<p>Web Application Firewalls (WAFs) sind beliebte Infrastrukturkomponenten, die verwendet werden, um Angriffe auf Webanwendungen zu erschweren. Was bieten WAFs wirklich? K\u00f6nnen sie auch nur theoretisch perfekt sein, um jede Art von Webangriff zu verhindern? Lassen Sie uns WAFs entmystifizieren!<\/p>\n\n\n\n<p>Dieser Artikel ist auf <a href=\"https:\/\/certitude.consulting\/blog\/en\/bypassing-web-application-firewalls\/\" data-type=\"post\" data-id=\"1523\">Englisch<\/a> verf\u00fcgbar.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Web Application Firewalls (WAFs) sind beliebte Infrastrukturkomponenten, die verwendet werden, um Angriffe auf Webanwendungen zu erschweren. Was bieten WAFs wirklich? K\u00f6nnen sie auch nur theoretisch perfekt sein, um jede Art von Webangriff zu verhindern? Lassen Sie uns WAFs entmystifizieren! Dieser Artikel ist auf Englisch verf\u00fcgbar.<\/p>\n","protected":false},"author":15,"featured_media":1654,"comment_status":"closed","ping_status":"open","sticky":true,"template":"","format":"standard","meta":{"footnotes":""},"categories":[63],"tags":[],"class_list":["post-1652","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technische-analyse"],"_links":{"self":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/1652","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/comments?post=1652"}],"version-history":[{"count":3,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/1652\/revisions"}],"predecessor-version":[{"id":1657,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/1652\/revisions\/1657"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/media\/1654"}],"wp:attachment":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/media?parent=1652"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/categories?post=1652"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/tags?post=1652"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}