{"id":1651,"date":"2016-01-05T18:00:00","date_gmt":"2016-01-05T18:00:00","guid":{"rendered":"http:\/\/staging.nsfocusglobal.com\/?p=1651"},"modified":"2016-01-05T18:00:00","modified_gmt":"2016-01-05T18:00:00","slug":"anatomy-of-an-attack-network-bandwidth-exhaustion","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/anatomy-of-an-attack-network-bandwidth-exhaustion\/","title":{"rendered":"Anatomy of an attack:  network bandwidth exhaustion"},"content":{"rendered":"<p><strong>Track:\u00a0 Technical<\/strong><\/p>\n<p><strong><em>Author: Vann Abernethy, Field\u00a0CTO, NSFOCUS<\/em><\/strong><\/p>\n<p><a href=\"http:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2016\/01\/notebook-1071777_1920.jpg\"><img fetchpriority=\"high\" decoding=\"async\" class=\"wp-image-1652 alignright\" src=\"http:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2016\/01\/notebook-1071777_1920-300x179.jpg\" alt=\"notebook-1071777_1920\" width=\"362\" height=\"216\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/01\/notebook-1071777_1920-300x179.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/01\/notebook-1071777_1920-1024x610.jpg 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/01\/notebook-1071777_1920-768x458.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/01\/notebook-1071777_1920-1536x915.jpg 1536w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/01\/notebook-1071777_1920.jpg 1920w\" sizes=\"(max-width: 362px) 100vw, 362px\" \/><\/a>DDoS attacks come in three basic flavors:\u00a0 network-layer, application-layer and a hybrid of the two.\u00a0 This is a somewhat simplistic view but when you look at the strategy for taking someone down via DDoS, the two primary vehicles are either exhaustion of available network bandwidth or the overwhelming of back-end processing power (which can be directed either at the server system itself or the applications residing on them).\u00a0 The most efficient approach to take down a target will depend on the target itself.\u00a0 This is why it is important for every company to consider all of the assets that could become targets when designing anti-DDoS protection.\u00a0<!--more--><\/p>\n<p>In a network-layer DDoS attack, the attacker sends a large amount of packets to saturate limited bandwidth or exhaust the network resources of a victim. \u00a0Network resources like routers, servers and firewalls have a finite capacity.\u00a0 When they are attacked and overloaded, end-users will not be able to get through because there is either no bandwidth left for them to use or the network infrastructure systems themselves are overwhelmed. \u00a0The most common traffic attack is flooding. \u00a0In this attack, a large amount of TCP, UDP, and ICMP packets that seem legitimate are sent to the target host (typically with spoofed IPs) from a large number of computers (bots).\u00a0 TCP-, SYN-, ACK-floods all fall into this category.\u00a0 For example, SYN-Flood attacks send a large number of TCP SYN request packets with forged source IP addresses. \u00a0The targeted server ends up with a very large list of half-open connections (the request to complete is left hanging open), which consumes up resources and makes it harder for normal users to connect to the end system.<\/p>\n<p>A typical DDoS attack headline reads&#8230; &#8220;Company X hit with a HUGE multi-gigabit attack&#8221;.\u00a0 This is also the type of attack you typically see from the &#8220;DDoS for Hire&#8221; groups looking to make money from the botnets they have built.\u00a0 It is fairly straight-forward to use these botnets and most likely will be the first type of DDoS attack a company will see used against it.<\/p>\n<p>Defending against these type attacks is pretty straight-forward as well&#8230;. if you have the right equipment (or your service provider does) and expertise. \u00a0The key here is being able to discern the difference between good (normal) and bad (attack) traffic and mitigate the bad before it hits your network so that, even though your systems are under load, they are not stressed and you are not knocked down.\u00a0 Typical networking and security systems are not designed to do this, however, purpose-built anti-DDoS systems can easily identify malicious traffic and ensure only legitimate traffic reaches your critical servers and application.<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><img decoding=\"async\" class=\"wp-image-1960 alignleft\" src=\"http:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2016\/01\/Vann-284x300.jpg\" alt=\"Vann\" width=\"150\" height=\"158\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/01\/Vann-284x300.jpg 284w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/01\/Vann-968x1024.jpg 968w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/01\/Vann-768x812.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/01\/Vann-1452x1536.jpg 1452w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/01\/Vann-1937x2048.jpg 1937w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><strong>Vann\u00a0Abernethy<\/strong> is the Field CTO for NSFOCUS. \u00a0He brings more than 20 years of Security and IT management experience working for a wide range of companies, from start-ups to the Fortune 500. Throughout his career, Abernethy has developed and deployed security, network and infrastructure management products and solutions; ranging from SMBs to government to some of the largest, industry-leading enterprises worldwide.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Track:\u00a0 Technical Author: Vann Abernethy, Field\u00a0CTO, NSFOCUS DDoS attacks come in three basic flavors:\u00a0 network-layer, application-layer and a hybrid of the two.\u00a0 This is a somewhat simplistic view but when you look at the strategy for taking someone down via DDoS, the two primary vehicles are either exhaustion of available network bandwidth or the overwhelming [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":35906,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3],"tags":[71,92,109,110,371,375,547,676],"class_list":["post-1651","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-anti-ddos-protection","tag-application-layer","tag-bandwidth","tag-bandwidth-consumption","tag-ddos","tag-ddos-attacks","tag-network-layer","tag-syn-flood-attacks"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Anatomy of an attack: network bandwidth exhaustion - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Anatomy of an attack: network bandwidth exhaustion - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Track:\u00a0 Technical Author: Vann Abernethy, Field\u00a0CTO, NSFOCUS DDoS attacks come in three basic flavors:\u00a0 network-layer, application-layer and a hybrid of\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/anatomy-of-an-attack-network-bandwidth-exhaustion\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2016-01-05T18:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/01\/notebook-1071777_1920-300x179-1.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Anatomy of an attack: network bandwidth exhaustion - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Track:\u00a0 Technical Author: Vann Abernethy, Field\u00a0CTO, NSFOCUS DDoS attacks come in three basic flavors:\u00a0 network-layer, application-layer and a hybrid of\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/01\/notebook-1071777_1920-300x179-1.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/anatomy-of-an-attack-network-bandwidth-exhaustion\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/anatomy-of-an-attack-network-bandwidth-exhaustion\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Anatomy of an attack: network bandwidth exhaustion\",\"datePublished\":\"2016-01-05T18:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/anatomy-of-an-attack-network-bandwidth-exhaustion\\\/\"},\"wordCount\":519,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/anatomy-of-an-attack-network-bandwidth-exhaustion\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2016\\\/01\\\/notebook-1071777_1920-300x179-1.jpg\",\"keywords\":[\"anti-DDoS protection\",\"application-layer\",\"bandwidth\",\"bandwidth consumption\",\"DDoS\",\"DDoS attacks\",\"network-layer\",\"SYN-Flood attacks\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/anatomy-of-an-attack-network-bandwidth-exhaustion\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/anatomy-of-an-attack-network-bandwidth-exhaustion\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/anatomy-of-an-attack-network-bandwidth-exhaustion\\\/\",\"name\":\"Anatomy of an attack: network bandwidth exhaustion - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/anatomy-of-an-attack-network-bandwidth-exhaustion\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/anatomy-of-an-attack-network-bandwidth-exhaustion\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2016\\\/01\\\/notebook-1071777_1920-300x179-1.jpg\",\"datePublished\":\"2016-01-05T18:00:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/anatomy-of-an-attack-network-bandwidth-exhaustion\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/anatomy-of-an-attack-network-bandwidth-exhaustion\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/anatomy-of-an-attack-network-bandwidth-exhaustion\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2016\\\/01\\\/notebook-1071777_1920-300x179-1.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2016\\\/01\\\/notebook-1071777_1920-300x179-1.jpg\",\"width\":300,\"height\":179,\"caption\":\"Laptop with binary code over cityscape background.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/anatomy-of-an-attack-network-bandwidth-exhaustion\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Anatomy of an attack: network bandwidth exhaustion\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Anatomy of an attack: network bandwidth exhaustion - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Anatomy of an attack: network bandwidth exhaustion - NSFOCUS","og_description":"Track:\u00a0 Technical Author: Vann Abernethy, Field\u00a0CTO, NSFOCUS DDoS attacks come in three basic flavors:\u00a0 network-layer, application-layer and a hybrid of","og_url":"https:\/\/nsfocusglobal.com\/anatomy-of-an-attack-network-bandwidth-exhaustion\/","og_site_name":"NSFOCUS","article_published_time":"2016-01-05T18:00:00+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/01\/notebook-1071777_1920-300x179-1.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"Anatomy of an attack: network bandwidth exhaustion - NSFOCUS","twitter_description":"Track:\u00a0 Technical Author: Vann Abernethy, Field\u00a0CTO, NSFOCUS DDoS attacks come in three basic flavors:\u00a0 network-layer, application-layer and a hybrid of","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/01\/notebook-1071777_1920-300x179-1.jpg","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/anatomy-of-an-attack-network-bandwidth-exhaustion\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/anatomy-of-an-attack-network-bandwidth-exhaustion\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Anatomy of an attack: network bandwidth exhaustion","datePublished":"2016-01-05T18:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/anatomy-of-an-attack-network-bandwidth-exhaustion\/"},"wordCount":519,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/anatomy-of-an-attack-network-bandwidth-exhaustion\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/01\/notebook-1071777_1920-300x179-1.jpg","keywords":["anti-DDoS protection","application-layer","bandwidth","bandwidth consumption","DDoS","DDoS attacks","network-layer","SYN-Flood attacks"],"articleSection":["Blog"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/anatomy-of-an-attack-network-bandwidth-exhaustion\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/anatomy-of-an-attack-network-bandwidth-exhaustion\/","url":"https:\/\/nsfocusglobal.com\/anatomy-of-an-attack-network-bandwidth-exhaustion\/","name":"Anatomy of an attack: network bandwidth exhaustion - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/anatomy-of-an-attack-network-bandwidth-exhaustion\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/anatomy-of-an-attack-network-bandwidth-exhaustion\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/01\/notebook-1071777_1920-300x179-1.jpg","datePublished":"2016-01-05T18:00:00+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/anatomy-of-an-attack-network-bandwidth-exhaustion\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/anatomy-of-an-attack-network-bandwidth-exhaustion\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/anatomy-of-an-attack-network-bandwidth-exhaustion\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/01\/notebook-1071777_1920-300x179-1.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/01\/notebook-1071777_1920-300x179-1.jpg","width":300,"height":179,"caption":"Laptop with binary code over cityscape background."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/anatomy-of-an-attack-network-bandwidth-exhaustion\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Anatomy of an attack: network bandwidth exhaustion"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/1651","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=1651"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/1651\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/35906"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=1651"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=1651"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=1651"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}