{"id":1538,"date":"2015-12-14T11:18:18","date_gmt":"2015-12-14T11:18:18","guid":{"rendered":"http:\/\/staging.nsfocusglobal.com\/?p=1538"},"modified":"2015-12-14T11:18:18","modified_gmt":"2015-12-14T11:18:18","slug":"anatomy-of-an-attack-dns-amplification","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/anatomy-of-an-attack-dns-amplification\/","title":{"rendered":"Anatomy of an attack \u2013 DNS amplification"},"content":{"rendered":"<p><strong>Track:\u00a0 Technical<\/strong><\/p>\n<p><strong><em>Author: Vann Abernethy, Field\u00a0CTO, NSFOCUS<\/em><\/strong><\/p>\n<p><a href=\"http:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2015\/12\/binary-823342_1920.jpg\"><img fetchpriority=\"high\" decoding=\"async\" class=\"wp-image-1539 alignright\" src=\"http:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2015\/12\/binary-823342_1920-300x212.jpg\" alt=\"binary-823342_1920\" width=\"362\" height=\"256\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2015\/12\/binary-823342_1920-300x212.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2015\/12\/binary-823342_1920-1024x724.jpg 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2015\/12\/binary-823342_1920-768x543.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2015\/12\/binary-823342_1920-1536x1086.jpg 1536w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2015\/12\/binary-823342_1920.jpg 1920w\" sizes=\"(max-width: 362px) 100vw, 362px\" \/><\/a>DNS amplification attacks ramp up the power of a botnet when targeting a victim.\u00a0 The basic technique of a DNS amplification attack is to spoof the IP of the intended target and send a request for a large DNS zone file to any number of open recursive DNS servers.\u00a0 The DNS servers blindly respond to the request, sending the large DNS zone response to the attack target.\u00a0<!--more-->As an example, a recent Spamhouse attack saw request data of roughly 36 bytes in length, while the response data was around 3000 bytes, meaning the attackers effectively amplified the bandwidth used by a factor of 100.\u00a0 Additionally, because the responses exceeded the MTU, the packets were fragmented and the required reassembly further exasperated the problem.<\/p>\n<p>At its core, this style of attack is an IP spoofing attack.\u00a0 A good first step to protect yourself is to implement <a href=\"http:\/\/www.bcp38.info\/index.php\/Main_Page\">BCP38<\/a> (Best Common Practices) which helps cut down on IP spoofing.\u00a0 Additionally, recursive servers should be restricted to your enterprise (or at most, B2B customers), and authoritative servers should be configured to use DNS Response Rate Limiting.\u00a0 A final good step is to either to obtain a mitigation service or purchase equipment that provides purpose-built DDoS defense.\u00a0 Most commercial anti-DDoS services and equipment providers have advanced anti-spoofing technologies built in that act as a good catch-all for even the most sophisticated attacks.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"http:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2016\/01\/Vann.jpg\"><img decoding=\"async\" class=\"alignleft wp-image-1960\" src=\"http:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2016\/01\/Vann-284x300.jpg\" alt=\"Vann\" width=\"150\" height=\"158\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/01\/Vann-284x300.jpg 284w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/01\/Vann-968x1024.jpg 968w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/01\/Vann-768x812.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/01\/Vann-1452x1536.jpg 1452w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/01\/Vann-1937x2048.jpg 1937w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a><strong>Vann\u00a0Abernethy<\/strong> is the Field CTO for NSFOCUS. \u00a0He brings more than 20 years of Security and IT management experience working for a wide range of companies, from start-ups to the Fortune 500. Throughout his career, Abernethy has developed and deployed security, network and infrastructure management products and solutions; ranging from SMBs to government to some of the largest, industry-leading enterprises worldwide.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Track:\u00a0 Technical Author: Vann Abernethy, Field\u00a0CTO, NSFOCUS DNS amplification attacks ramp up the power of a botnet when targeting a victim.\u00a0 The basic technique of a DNS amplification attack is to spoof the IP of the intended target and send a request for a large DNS zone file to any number of open recursive DNS [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":35908,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3],"tags":[66,371,384,385],"class_list":["post-1538","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-amplification","tag-ddos","tag-dns","tag-dns-amplification"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Anatomy of an attack \u2013 DNS amplification - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Anatomy of an attack \u2013 DNS amplification - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Track:\u00a0 Technical Author: Vann Abernethy, Field\u00a0CTO, NSFOCUS DNS amplification attacks ramp up the power of a botnet when targeting a victim.\u00a0 The basic\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/anatomy-of-an-attack-dns-amplification\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2015-12-14T11:18:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2015\/12\/binary-823342_1920-300x212-1.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Anatomy of an attack \u2013 DNS amplification - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Track:\u00a0 Technical Author: Vann Abernethy, Field\u00a0CTO, NSFOCUS DNS amplification attacks ramp up the power of a botnet when targeting a victim.\u00a0 The basic\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2015\/12\/binary-823342_1920-300x212-1.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/anatomy-of-an-attack-dns-amplification\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/anatomy-of-an-attack-dns-amplification\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Anatomy of an attack \u2013 DNS amplification\",\"datePublished\":\"2015-12-14T11:18:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/anatomy-of-an-attack-dns-amplification\\\/\"},\"wordCount\":300,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/anatomy-of-an-attack-dns-amplification\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2015\\\/12\\\/binary-823342_1920-300x212-1.jpg\",\"keywords\":[\"amplification\",\"DDoS\",\"DNS\",\"DNS amplification\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/anatomy-of-an-attack-dns-amplification\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/anatomy-of-an-attack-dns-amplification\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/anatomy-of-an-attack-dns-amplification\\\/\",\"name\":\"Anatomy of an attack \u2013 DNS amplification - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/anatomy-of-an-attack-dns-amplification\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/anatomy-of-an-attack-dns-amplification\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2015\\\/12\\\/binary-823342_1920-300x212-1.jpg\",\"datePublished\":\"2015-12-14T11:18:18+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/anatomy-of-an-attack-dns-amplification\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/anatomy-of-an-attack-dns-amplification\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/anatomy-of-an-attack-dns-amplification\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2015\\\/12\\\/binary-823342_1920-300x212-1.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2015\\\/12\\\/binary-823342_1920-300x212-1.jpg\",\"width\":300,\"height\":212,\"caption\":\"Blue binary code spheres on green background.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/anatomy-of-an-attack-dns-amplification\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Anatomy of an attack \u2013 DNS amplification\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Anatomy of an attack \u2013 DNS amplification - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Anatomy of an attack \u2013 DNS amplification - NSFOCUS","og_description":"Track:\u00a0 Technical Author: Vann Abernethy, Field\u00a0CTO, NSFOCUS DNS amplification attacks ramp up the power of a botnet when targeting a victim.\u00a0 The basic","og_url":"https:\/\/nsfocusglobal.com\/anatomy-of-an-attack-dns-amplification\/","og_site_name":"NSFOCUS","article_published_time":"2015-12-14T11:18:18+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2015\/12\/binary-823342_1920-300x212-1.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"Anatomy of an attack \u2013 DNS amplification - NSFOCUS","twitter_description":"Track:\u00a0 Technical Author: Vann Abernethy, Field\u00a0CTO, NSFOCUS DNS amplification attacks ramp up the power of a botnet when targeting a victim.\u00a0 The basic","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2015\/12\/binary-823342_1920-300x212-1.jpg","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/anatomy-of-an-attack-dns-amplification\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/anatomy-of-an-attack-dns-amplification\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Anatomy of an attack \u2013 DNS amplification","datePublished":"2015-12-14T11:18:18+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/anatomy-of-an-attack-dns-amplification\/"},"wordCount":300,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/anatomy-of-an-attack-dns-amplification\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2015\/12\/binary-823342_1920-300x212-1.jpg","keywords":["amplification","DDoS","DNS","DNS amplification"],"articleSection":["Blog"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/anatomy-of-an-attack-dns-amplification\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/anatomy-of-an-attack-dns-amplification\/","url":"https:\/\/nsfocusglobal.com\/anatomy-of-an-attack-dns-amplification\/","name":"Anatomy of an attack \u2013 DNS amplification - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/anatomy-of-an-attack-dns-amplification\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/anatomy-of-an-attack-dns-amplification\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2015\/12\/binary-823342_1920-300x212-1.jpg","datePublished":"2015-12-14T11:18:18+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/anatomy-of-an-attack-dns-amplification\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/anatomy-of-an-attack-dns-amplification\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/anatomy-of-an-attack-dns-amplification\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2015\/12\/binary-823342_1920-300x212-1.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2015\/12\/binary-823342_1920-300x212-1.jpg","width":300,"height":212,"caption":"Blue binary code spheres on green background."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/anatomy-of-an-attack-dns-amplification\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Anatomy of an attack \u2013 DNS amplification"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/1538","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=1538"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/1538\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/35908"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=1538"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=1538"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=1538"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}