{"id":2320,"date":"2016-04-20T12:39:01","date_gmt":"2016-04-20T12:39:01","guid":{"rendered":"http:\/\/staging.nsfocusglobal.com\/?p=2320"},"modified":"2016-04-20T12:39:01","modified_gmt":"2016-04-20T12:39:01","slug":"ddos-attacks-closer-look","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/ddos-attacks-closer-look\/","title":{"rendered":"DDoS Attacks:  A Closer Look, Part 1"},"content":{"rendered":"<p><strong>Track:\u00a0 Technical<\/strong><\/p>\n<p><strong><em>Author: Martin Stone, Principal Sales Engineer, NSFOCUS<\/em><\/strong><\/p>\n<p><a href=\"http:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2016\/04\/AdobeStock_105957285.jpeg\" rel=\"attachment wp-att-2396\"><img fetchpriority=\"high\" decoding=\"async\" class=\" wp-image-2396 alignright\" src=\"http:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2016\/04\/AdobeStock_105957285-300x225.jpeg\" alt=\"DDoS Attacks\" width=\"359\" height=\"269\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/04\/AdobeStock_105957285-300x225.jpeg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/04\/AdobeStock_105957285-1024x768.jpeg 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/04\/AdobeStock_105957285-768x576.jpeg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/04\/AdobeStock_105957285-1536x1152.jpeg 1536w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/04\/AdobeStock_105957285.jpeg 2000w\" sizes=\"(max-width: 359px) 100vw, 359px\" \/><\/a><\/p>\n<p>If you&#8217;ve ever seen portrayals of DDoS attacks in TV and movies, they might seem like scary, mysterious attacks, launched by elite hackers, against which there is no protection. Nothing could be farther from the truth.\u00a0 DDoS is one of the simplest and easiest ways to attack an online system, within reach of almost anyone with a little information and a little money. Fortunately, these attacks are also easy to defend against if you&#8217;re prepared and have the right equipment in place. Here are a few of the most popular DDoS attacks that have evolved over time and are still in use today:<!--more--><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Simple floods: Fill the pipe<\/strong><\/p>\n<p>The oldest and simplest form of DDoS attack is a flood: Simply send enough packets to the victim to saturate their network connection, so that legitimate traffic can&#8217;t get through. The packets themselves can be ICMP, UDP, TCP or a mixture.<\/p>\n<p>In a simple flood, if the victim has 10 Gbit\/s capacity and the attacker wants to saturate their pipe, the attacker needs to have at least 10 Gbit\/s capacity as well in order to succeed. Therefore, a simple flood against a well-connected target would need to use a large collection of compromised systems (a botnet) in order to send enough packets to overwhelm the victim&#8217;s capacity. The more capacity the victim has, the more systems the attacker will need to execute the attack, and the more money the attacker will need to pay to the botnet operator. But, there&#8217;s a more efficient way.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Reflected\/Amplified Floods: Trick others into filling the pipe<\/strong><\/p>\n<p>Instead of directly sending packets to the victim, an attacker can send forged requests to a large number of computers, using IP address spoofing to make it look like the requests are coming from the victim. When these computers reply to the forged address, the replies will flood the victim. Many protocols can be used for this approach; the only requirement is that they send a large response to a relatively small request.<\/p>\n<p>The ratio of the size of the response to the size of the request is called the amplification factor. DNS, for example, can have an amplification factor of over 100, meaning that for every byte an attacker sends, a vulnerable DNS server could respond with a message over 100 bytes in length. With an amplification factor of 100, an attacker can overwhelm a 10 Gbit\/s network using only 100 Mbit\/s of their own network bandwidth &#8212; a big improvement in efficiency!<\/p>\n<p>In the end, though, a reflected\/amplified flood attack is still just a flood. The principle behind these attacks is to exhaust the victim&#8217;s resources. The resource that&#8217;s being exhausted in flood attacks is network capacity. But, there are other resources that are more limited and could more easily be exhausted.<\/p>\n<p>In part 2 of this post we will discuss some of the more subtle and clever ways in which attackers deny service to legitimate users.<\/p>\n<p>&nbsp;<\/p>\n<p><em><strong>Martin Stone<\/strong><\/em> is a principal engineer with NSFOCUS IBD. With over 20 years&#8217; experience in a wide range of technology disciplines from software development to network engineering. Martin has spent his career helping customers in every industry develop and deploy the right technology solutions for their needs.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Track:\u00a0 Technical Author: Martin Stone, Principal Sales Engineer, NSFOCUS If you&#8217;ve ever seen portrayals of DDoS attacks in TV and movies, they might seem like scary, mysterious attacks, launched by elite hackers, against which there is no protection. Nothing could be farther from the truth.\u00a0 DDoS is one of the simplest and easiest ways to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":35853,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3],"tags":[],"class_list":["post-2320","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DDoS Attacks: A Closer Look, Part 1 - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DDoS Attacks: A Closer Look, Part 1 - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Track:\u00a0 Technical Author: Martin Stone, Principal Sales Engineer, NSFOCUS If you&#039;ve ever seen portrayals of DDoS attacks in TV and movies, they might seem\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/ddos-attacks-closer-look\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2016-04-20T12:39:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/04\/AdobeStock_105957285-300x225-1.jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"DDoS Attacks: A Closer Look, Part 1 - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Track:\u00a0 Technical Author: Martin Stone, Principal Sales Engineer, NSFOCUS If you&#039;ve ever seen portrayals of DDoS attacks in TV and movies, they might seem\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/04\/AdobeStock_105957285-300x225-1.jpeg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ddos-attacks-closer-look\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ddos-attacks-closer-look\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"DDoS Attacks: A Closer Look, Part 1\",\"datePublished\":\"2016-04-20T12:39:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ddos-attacks-closer-look\\\/\"},\"wordCount\":559,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ddos-attacks-closer-look\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2016\\\/04\\\/AdobeStock_105957285-300x225-1.jpeg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/ddos-attacks-closer-look\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ddos-attacks-closer-look\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/ddos-attacks-closer-look\\\/\",\"name\":\"DDoS Attacks: A Closer Look, Part 1 - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ddos-attacks-closer-look\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ddos-attacks-closer-look\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2016\\\/04\\\/AdobeStock_105957285-300x225-1.jpeg\",\"datePublished\":\"2016-04-20T12:39:01+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ddos-attacks-closer-look\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/ddos-attacks-closer-look\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ddos-attacks-closer-look\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2016\\\/04\\\/AdobeStock_105957285-300x225-1.jpeg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2016\\\/04\\\/AdobeStock_105957285-300x225-1.jpeg\",\"width\":300,\"height\":225,\"caption\":\"DDOS Attack text on brick wall background.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ddos-attacks-closer-look\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DDoS Attacks: A Closer Look, Part 1\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DDoS Attacks: A Closer Look, Part 1 - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"DDoS Attacks: A Closer Look, Part 1 - NSFOCUS","og_description":"Track:\u00a0 Technical Author: Martin Stone, Principal Sales Engineer, NSFOCUS If you've ever seen portrayals of DDoS attacks in TV and movies, they might seem","og_url":"https:\/\/nsfocusglobal.com\/ddos-attacks-closer-look\/","og_site_name":"NSFOCUS","article_published_time":"2016-04-20T12:39:01+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/04\/AdobeStock_105957285-300x225-1.jpeg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"DDoS Attacks: A Closer Look, Part 1 - NSFOCUS","twitter_description":"Track:\u00a0 Technical Author: Martin Stone, Principal Sales Engineer, NSFOCUS If you've ever seen portrayals of DDoS attacks in TV and movies, they might seem","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/04\/AdobeStock_105957285-300x225-1.jpeg","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/ddos-attacks-closer-look\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/ddos-attacks-closer-look\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"DDoS Attacks: A Closer Look, Part 1","datePublished":"2016-04-20T12:39:01+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/ddos-attacks-closer-look\/"},"wordCount":559,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/ddos-attacks-closer-look\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/04\/AdobeStock_105957285-300x225-1.jpeg","articleSection":["Blog"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/ddos-attacks-closer-look\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/ddos-attacks-closer-look\/","url":"https:\/\/nsfocusglobal.com\/ddos-attacks-closer-look\/","name":"DDoS Attacks: A Closer Look, Part 1 - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/ddos-attacks-closer-look\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/ddos-attacks-closer-look\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/04\/AdobeStock_105957285-300x225-1.jpeg","datePublished":"2016-04-20T12:39:01+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/ddos-attacks-closer-look\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/ddos-attacks-closer-look\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/ddos-attacks-closer-look\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/04\/AdobeStock_105957285-300x225-1.jpeg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/04\/AdobeStock_105957285-300x225-1.jpeg","width":300,"height":225,"caption":"DDOS Attack text on brick wall background."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/ddos-attacks-closer-look\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"DDoS Attacks: A Closer Look, Part 1"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/2320","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=2320"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/2320\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/35853"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=2320"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=2320"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=2320"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}