{"id":22434,"date":"2025-05-12T11:56:44","date_gmt":"2025-05-12T14:56:44","guid":{"rendered":"https:\/\/www.ethicalhacker.com.br\/site\/?p=22434"},"modified":"2025-05-12T11:56:45","modified_gmt":"2025-05-12T14:56:45","slug":"malwares-terrastealerv2-e-terralogger","status":"publish","type":"post","link":"https:\/\/www.ethicalhacker.com.br\/site\/2025\/05\/basico\/malwares-terrastealerv2-e-terralogger\/","title":{"rendered":"Malwares TerraStealerV2 e TerraLogger"},"content":{"rendered":"\n<p data-start=\"134\" data-end=\"202\"><strong>Golden Chickens retorna com os malwares TerraStealerV2 e TerraLogger<\/strong><\/p>\n<p class=\"\" style=\"text-align: justify;\" data-start=\"204\" data-end=\"593\">O grupo cibercriminoso <strong data-start=\"227\" data-end=\"246\">Golden Chickens<\/strong>, tamb\u00e9m conhecido como <strong data-start=\"270\" data-end=\"286\">Venom Spider<\/strong>, ressurgiu com novos instrumentos perigosos no seu arsenal de <em data-start=\"349\" data-end=\"371\">Malware as a Service<\/em> (MaaS). As ferramentas mais recentes\u00a0 <strong data-start=\"411\" data-end=\"429\">TerraStealerV2<\/strong> e <strong data-start=\"432\" data-end=\"447\">TerraLogger<\/strong> foram projetadas para roubar informa\u00e7\u00f5es sens\u00edveis, desde credenciais de login at\u00e9 dados de carteiras de criptomoedas e extens\u00f5es de navegador.<\/p>\n<p data-start=\"204\" data-end=\"593\">\u00a0<\/p>\n<p data-start=\"595\" data-end=\"636\"><strong>Quem s\u00e3o os Golden Chickens?<\/strong><\/p>\n<p class=\"\" style=\"text-align: justify;\" data-start=\"638\" data-end=\"1015\">Historicamente associados ao malware <strong data-start=\"675\" data-end=\"688\">More_eggs<\/strong>, os Golden Chickens s\u00e3o conhecidos por fornecer ferramentas cibern\u00e9ticas sob demanda, permitindo que cibercriminosos menos sofisticados conduzam campanhas avan\u00e7adas de infec\u00e7\u00e3o e exfiltra\u00e7\u00e3o de dados. Com o lan\u00e7amento de TerraStealerV2 e TerraLogger, o grupo demonstra uma evolu\u00e7\u00e3o clara na modularidade e foco em furtividade.<\/p>\n<p data-start=\"638\" data-end=\"1015\">\u00a0<\/p>\n<p data-start=\"1017\" data-end=\"1063\"><strong>TerraStealerV2 \u00e9 um ladr\u00e3o de dados completo<\/strong><\/p>\n<p class=\"\" data-start=\"1065\" data-end=\"1172\">Ele \u00e9 um malware de coleta de dados projetado para varrer sistemas infectados em busca de:<\/p>\n<ul data-start=\"1174\" data-end=\"1326\">\n<li class=\"\" data-start=\"1174\" data-end=\"1214\">\n<p class=\"\" data-start=\"1176\" data-end=\"1214\">Credenciais armazenadas em navegadores<\/p>\n<\/li>\n<li class=\"\" data-start=\"1215\" data-end=\"1251\">\n<p class=\"\" data-start=\"1217\" data-end=\"1251\">Dados de carteiras de criptomoedas<\/p>\n<\/li>\n<li class=\"\" data-start=\"1252\" data-end=\"1291\">\n<p class=\"\" data-start=\"1254\" data-end=\"1291\">Informa\u00e7\u00f5es de extens\u00f5es de navegador<\/p>\n<\/li>\n<li class=\"\" data-start=\"1292\" data-end=\"1326\">\n<p class=\"\" data-start=\"1294\" data-end=\"1326\">Cookies e hist\u00f3rico de navega\u00e7\u00e3o<\/p>\n<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<p style=\"text-align: justify;\">Diferente do TerraStealer, o <strong data-start=\"2688\" data-end=\"2703\">TerraLogger<\/strong> \u00e9 um <strong data-start=\"2709\" data-end=\"2722\">keylogger<\/strong>, um tipo de malware projetado para capturar pressionamentos de tecla da v\u00edtima. Embora pare\u00e7a menos sofisticado, ele pode ser parte de um m\u00f3dulo maior, onde os dados capturados s\u00e3o enviados por outros mecanismos do conjunto de ferramentas.<\/p>\n<p>\u00a0<\/p>\n<p data-start=\"3555\" data-end=\"3603\"><strong>Com caracter\u00edsticas em comum, modularidade e MaaS<\/strong><\/p>\n<p class=\"\" style=\"text-align: justify;\" data-start=\"3605\" data-end=\"3842\">O fato de o <strong data-start=\"3617\" data-end=\"3632\">TerraLogger<\/strong> n\u00e3o possuir exfiltra\u00e7\u00e3o direta de dados refor\u00e7a a ideia de que ele \u00e9 usado como <strong data-start=\"3713\" data-end=\"3723\">m\u00f3dulo<\/strong> em um sistema mais amplo. Essa abordagem modular torna o malware mais flex\u00edvel e reutiliz\u00e1vel em diferentes campanhas.<\/p>\n<p class=\"\" style=\"text-align: justify;\" data-start=\"3844\" data-end=\"4039\">Al\u00e9m disso, como parte de um modelo de <strong data-start=\"3883\" data-end=\"3907\">Malware como Servi\u00e7o<\/strong>, esses componentes podem ser alugados ou vendidos separadamente, aumentando o alcance e o impacto das opera\u00e7\u00f5es do Golden Chickens.<\/p>\n<p data-start=\"3844\" data-end=\"4039\">\u00a0<\/p>\n<p data-start=\"4041\" data-end=\"4060\"><strong>Como se proteger<\/strong><\/p>\n<ul data-start=\"4062\" data-end=\"4381\">\n<li class=\"\" data-start=\"4062\" data-end=\"4124\">\n<p class=\"\" data-start=\"4064\" data-end=\"4124\">Mantenha o sistema operacional e navegadores atualizados<\/p>\n<\/li>\n<li class=\"\" data-start=\"4125\" data-end=\"4185\">\n<p class=\"\" data-start=\"4127\" data-end=\"4185\">Use antiv\u00edrus com detec\u00e7\u00e3o heur\u00edstica e comportamental<\/p>\n<\/li>\n<li class=\"\" data-start=\"4186\" data-end=\"4240\">\n<p class=\"\" data-start=\"4188\" data-end=\"4240\">Evite baixar anexos ou clicar em links suspeitos<\/p>\n<\/li>\n<li class=\"\" data-start=\"4241\" data-end=\"4303\">\n<p class=\"\" data-start=\"4243\" data-end=\"4303\">Utilize gerenciadores de senhas externos aos navegadores<\/p>\n<\/li>\n<li class=\"\" data-start=\"4304\" data-end=\"4381\">\n<p class=\"\" data-start=\"4306\" data-end=\"4381\">Monitore processos em segundo plano com ferramentas como Process Hacker<\/p>\n<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<p>A seguir, exploraremos tr\u00eas t\u00e9cnicas de mitiga\u00e7\u00e3o em Python\u00a0para ajudar a se proteger contra essas amea\u00e7as.<\/p>\n<p>\u00a0<\/p>\n<p><strong>1. Detec\u00e7\u00e3o de keyloggers com monitoramento de teclado<\/strong><\/p>\n<p class=\"ds-markdown-paragraph\" style=\"text-align: justify;\">O TerraLogger registra todas as teclas pressionadas, tornando essencial a detec\u00e7\u00e3o de processos suspeitos. Podemos usar Python para monitorar atividades de teclado e bloquear comportamentos maliciosos.<\/p>\n<p>\u00a0<\/p>\n<p><strong>Exemplo: Verifica\u00e7\u00e3o de processos suspeitos<\/strong><\/p>\n<pre><span class=\"token keyword\">import<\/span> psutil\n\n<span class=\"token keyword\">def<\/span> <span class=\"token function\">detect_keyloggers<\/span><span class=\"token punctuation\">(<\/span><span class=\"token punctuation\">)<\/span><span class=\"token punctuation\">:<\/span>\n    suspicious_processes <span class=\"token operator\">=<\/span> <span class=\"token punctuation\">[<\/span><span class=\"token string\">\"keylogger\"<\/span><span class=\"token punctuation\">,<\/span> <span class=\"token string\">\"terra\"<\/span><span class=\"token punctuation\">,<\/span> <span class=\"token string\">\"logger\"<\/span><span class=\"token punctuation\">,<\/span> <span class=\"token string\">\"stealer\"<\/span><span class=\"token punctuation\">]<\/span>\n    <span class=\"token keyword\">for<\/span> proc <span class=\"token keyword\">in<\/span> psutil<span class=\"token punctuation\">.<\/span>process_iter<span class=\"token punctuation\">(<\/span><span class=\"token punctuation\">[<\/span><span class=\"token string\">'name'<\/span><span class=\"token punctuation\">]<\/span><span class=\"token punctuation\">)<\/span><span class=\"token punctuation\">:<\/span>\n        <span class=\"token keyword\">if<\/span> <span class=\"token builtin\">any<\/span><span class=\"token punctuation\">(<\/span>susp_keyword <span class=\"token keyword\">in<\/span> proc<span class=\"token punctuation\">.<\/span>info<span class=\"token punctuation\">[<\/span><span class=\"token string\">'name'<\/span><span class=\"token punctuation\">]<\/span><span class=\"token punctuation\">.<\/span>lower<span class=\"token punctuation\">(<\/span><span class=\"token punctuation\">)<\/span> <span class=\"token keyword\">for<\/span> susp_keyword <span class=\"token keyword\">in<\/span> <br \/>suspicious_processes<span class=\"token punctuation\">)<\/span><span class=\"token punctuation\">:<\/span>\n            <span class=\"token keyword\">print<\/span><span class=\"token punctuation\">(<\/span><span class=\"token string-interpolation\"><span class=\"token string\">f\"[!] Processo suspeito encontrado: <\/span><span class=\"token interpolation\"><span class=\"token punctuation\">{<\/span>proc<span class=\"token punctuation\">.<\/span>info<span class=\"token punctuation\">[<\/span><span class=\"token string\">'name'<\/span><span class=\"token punctuation\">]<\/span><span class=\"token punctuation\">}<\/span><\/span><span class=\"token string\">\"<\/span><\/span><span class=\"token punctuation\">)<\/span>\n            proc<span class=\"token punctuation\">.<\/span>kill<span class=\"token punctuation\">(<\/span><span class=\"token punctuation\">)<\/span>  <span class=\"token comment\"># Encerra o processo malicioso<\/span>\n\ndetect_keyloggers<span class=\"token punctuation\">(<\/span><span class=\"token punctuation\">)<br \/><br \/><\/span><\/pre>\n<p class=\"ds-markdown-paragraph\"><strong>Como funciona?<\/strong><\/p>\n<ul>\n<li>\n<p class=\"ds-markdown-paragraph\">Usa a biblioteca\u00a0<code>psutil<\/code>\u00a0para listar processos em execu\u00e7\u00e3o.<\/p>\n<\/li>\n<li>\n<p class=\"ds-markdown-paragraph\">Verifica se h\u00e1 nomes suspeitos (como &#8220;terra&#8221; ou &#8220;logger&#8221;).<\/p>\n<\/li>\n<li>\n<p class=\"ds-markdown-paragraph\">Se detectado, encerra o processo automaticamente.<\/p>\n<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<p><strong>2. An\u00e1lise de tr\u00e1fego de rede para detectar exfiltra\u00e7\u00e3o de dados<\/strong><\/p>\n<p class=\"ds-markdown-paragraph\" style=\"text-align: justify;\">O TerraStealerV2 envia dados roubados para servidores C2 (<em>Command and Control<\/em>). Podemos usar Python para monitorar conex\u00f5es suspeitas.<\/p>\n<p>\u00a0<\/p>\n<p><strong>Exemplo: Monitoramento de conex\u00f5es ativas<\/strong><\/p>\n<pre><span class=\"token keyword\">import<\/span> socket\n<span class=\"token keyword\">from<\/span> datetime <span class=\"token keyword\">import<\/span> datetime\n\n<span class=\"token keyword\">def<\/span> <span class=\"token function\">monitor_network_connections<\/span><span class=\"token punctuation\">(<\/span><span class=\"token punctuation\">)<\/span><span class=\"token punctuation\">:<\/span>\n    suspicious_ips <span class=\"token operator\">=<\/span> <span class=\"token punctuation\">[<\/span><span class=\"token string\">\"185.143.223.\"<\/span><span class=\"token punctuation\">,<\/span> <span class=\"token string\">\"45.9.148.\"<\/span><span class=\"token punctuation\">]<\/span>  <span class=\"token comment\"># IPs conhecidos do Golden Chickens<\/span>\n    connections <span class=\"token operator\">=<\/span> psutil<span class=\"token punctuation\">.<\/span>net_connections<span class=\"token punctuation\">(<\/span><span class=\"token punctuation\">)<\/span>\n    \n    <span class=\"token keyword\">for<\/span> conn <span class=\"token keyword\">in<\/span> connections<span class=\"token punctuation\">:<\/span>\n        <span class=\"token keyword\">if<\/span> conn<span class=\"token punctuation\">.<\/span>raddr <span class=\"token keyword\">and<\/span> <span class=\"token builtin\">any<\/span><span class=\"token punctuation\">(<\/span>conn<span class=\"token punctuation\">.<\/span>raddr<span class=\"token punctuation\">.<\/span>ip<span class=\"token punctuation\">.<\/span>startswith<span class=\"token punctuation\">(<\/span>ip<span class=\"token punctuation\">)<\/span> <span class=\"token keyword\">for<\/span> ip <span class=\"token keyword\">in<\/span> suspicious_ips<span class=\"token punctuation\">)<\/span><span class=\"token punctuation\">:<\/span>\n            <span class=\"token keyword\">print<\/span><span class=\"token punctuation\">(<\/span><span class=\"token string-interpolation\"><span class=\"token string\">f\"[ALERTA] Conex\u00e3o suspeita para <\/span><span class=\"token interpolation\"><span class=\"token punctuation\">{<\/span>conn<span class=\"token punctuation\">.<\/span>raddr<span class=\"token punctuation\">.<\/span>ip<span class=\"token punctuation\">}<\/span><\/span><span class=\"token string\"> \u00e0s <\/span><span class=\"token interpolation\"><span class=\"token punctuation\">{<\/span>datetime<span class=\"token punctuation\">.<\/span>now<span class=\"token punctuation\">(<\/span><span class=\"token punctuation\">)<\/span><span class=\"token punctuation\">}<\/span><\/span><span class=\"token string\">\"<\/span><\/span><span class=\"token punctuation\">)<\/span>\n            <span class=\"token comment\"># Bloqueia a conex\u00e3o (pode ser integrado com firewall)<\/span>\n\nmonitor_network_connections<span class=\"token punctuation\">(<\/span><span class=\"token punctuation\">)<br \/><br \/><\/span><\/pre>\n<p class=\"ds-markdown-paragraph\"><strong>Como funciona?<\/strong><\/p>\n<ul>\n<li>\n<p class=\"ds-markdown-paragraph\">Analisa conex\u00f5es ativas em busca dDetectar e encerrar keyloggers<br \/>Bloquear conex\u00f5es suspeitas<br \/>Remover extens\u00f5es maliciosase IPs maliciosos conhecidos.<\/p>\n<\/li>\n<li>\n<p class=\"ds-markdown-paragraph\">Gera um alerta se detectar comunica\u00e7\u00e3o com servidores C2.<\/p>\n<\/li>\n<li>\n<p class=\"ds-markdown-paragraph\">Pode ser integrado com um firewall para bloquear automaticamente.<\/p>\n<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<p><strong>3. Verifica\u00e7\u00e3o de extens\u00f5es maliciosas no navegador<\/strong><\/p>\n<p class=\"ds-markdown-paragraph\" style=\"text-align: justify;\">O TerraStealerV2 rouba dados de extens\u00f5es de navegador (como MetaMask). Podemos usar Python para verificar extens\u00f5es instaladas.<\/p>\n<p>\u00a0<\/p>\n<p><strong>Exemplo: An\u00e1lise de extens\u00f5es do chrome<\/strong><\/p>\n<pre><span class=\"token keyword\">import<\/span> os\n<span class=\"token keyword\">import<\/span> json\n\n<span class=\"token keyword\">def<\/span> <span class=\"token function\">check_malicious_extensions<\/span><span class=\"token punctuation\">(<\/span><span class=\"token punctuation\">)<\/span><span class=\"token punctuation\">:<\/span>\n    chrome_path <span class=\"token operator\">=<\/span> os<span class=\"token punctuation\">.<\/span>path<span class=\"token punctuation\">.<\/span>expanduser<span class=\"token punctuation\">(<\/span><span class=\"token string\">\"~\"<\/span><span class=\"token punctuation\">)<\/span> <span class=\"token operator\">+<\/span> <span class=\"token string\">\"\/AppData\/Local\/Google\/Chrome\/User <br \/>Data\/Default\/Extensions\"<\/span>\n    malicious_extensions <span class=\"token operator\">=<\/span> <span class=\"token punctuation\">[<\/span><span class=\"token string\">\"abcdefghijklmnopqrstuvwxyz123456\"<\/span><span class=\"token punctuation\">]<\/span>  <span class=\"token comment\"># IDs de extens\u00f5es maliciosas<\/span>\n    \n    <span class=\"token keyword\">if<\/span> os<span class=\"token punctuation\">.<\/span>path<span class=\"token punctuation\">.<\/span>exists<span class=\"token punctuation\">(<\/span>chrome_path<span class=\"token punctuation\">)<\/span><span class=\"token punctuation\">:<\/span>\n        <span class=\"token keyword\">for<\/span> ext_id <span class=\"token keyword\">in<\/span> os<span class=\"token punctuation\">.<\/span>listdir<span class=\"token punctuation\">(<\/span>chrome_path<span class=\"token punctuation\">)<\/span><span class=\"token punctuation\">:<\/span>\n            <span class=\"token keyword\">if<\/span> ext_id <span class=\"token keyword\">in<\/span> malicious_extensions<span class=\"token punctuation\">:<\/span>\n                <span class=\"token keyword\">print<\/span><span class=\"token punctuation\">(<\/span><span class=\"token string-interpolation\"><span class=\"token string\">f\"[!] Extens\u00e3o maliciosa encontrada: <\/span><span class=\"token interpolation\"><span class=\"token punctuation\">{<\/span>ext_id<span class=\"token punctuation\">}<\/span><\/span><span class=\"token string\">\"<\/span><\/span><span class=\"token punctuation\">)<\/span>\n                <span class=\"token comment\"># Remove a extens\u00e3o automaticamente<\/span>\n                os<span class=\"token punctuation\">.<\/span>system<span class=\"token punctuation\">(<\/span><span class=\"token string-interpolation\"><span class=\"token string\">f\"rmdir \/s \/q \\\"<\/span><span class=\"token interpolation\"><span class=\"token punctuation\">{<\/span>chrome_path<span class=\"token punctuation\">}<\/span><\/span><span class=\"token string\">\\\\<\/span><span class=\"token interpolation\"><span class=\"token punctuation\">{<\/span>ext_id<span class=\"token punctuation\">}<\/span><\/span><span class=\"token string\">\\\"\"<\/span><\/span><span class=\"token punctuation\">)<\/span>\n\ncheck_malicious_extensions<span class=\"token punctuation\">(<\/span><span class=\"token punctuation\">)<br \/><br \/><\/span><\/pre>\n<p class=\"ds-markdown-paragraph\"><strong>Como funciona?<\/strong><\/p>\n<ul>\n<li>\n<p class=\"ds-markdown-paragraph\">Verifica a pasta de extens\u00f5es do Chrome no Windows.<\/p>\n<\/li>\n<li>\n<p class=\"ds-markdown-paragraph\">Compara com uma lista de IDs de extens\u00f5es maliciosas.<\/p>\n<\/li>\n<li>\n<p class=\"ds-markdown-paragraph\">Remove automaticamente se detectada.<\/p>\n<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<p><strong>Conclus\u00e3o: Como se proteger?<\/strong><\/p>\n<p class=\"ds-markdown-paragraph\" style=\"text-align: justify;\">Os malwares\u00a0<strong>TerraStealerV2<\/strong>\u00a0e\u00a0<strong>TerraLogger<\/strong>\u00a0s\u00e3o amea\u00e7as persistentes, mas com t\u00e9cnicas de monitoramento em Python, podemos:<\/p>\n<ul>\n<li><strong>Detectar e encerrar keyloggers<\/strong><\/li>\n<li><strong>Bloquear conex\u00f5es suspeitas<\/strong><\/li>\n<li><strong>Remover extens\u00f5es maliciosas<\/strong><\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<p class=\"ds-markdown-paragraph\">A\u00a0automa\u00e7\u00e3o de defesa\u00a0\u00e9 essencial contra grupos como o\u00a0Golden Chickens, que est\u00e3o sempre evoluindo suas t\u00e1ticas.<\/p>\n<p class=\"ds-markdown-paragraph\"><strong>Dica extra:<\/strong>\u00a0Combine essas t\u00e9cnicas com um\u00a0antivirus comportamental\u00a0e\u00a0firewalls baseados em IA\u00a0para maior prote\u00e7\u00e3o.<\/p>\n<p>\u00a0<\/p>\n<p>Fonte e imagens: <a href=\"https:\/\/thehackernews.com\/2025\/05\/weekly-recap-zero-day-exploits.html\" target=\"_blank\" rel=\"noopener\">https:\/\/thehackernews.com\/2025\/05\/weekly-recap-zero-day-exploits.html<\/a><\/p>\n<pre>\u00a0<\/pre>\n<pre>\u00a0<\/pre>\n<pre>\u00a0<\/pre>\n\n\n\n\n","protected":false},"excerpt":{"rendered":"<p>Golden Chickens retorna com os malwares TerraStealerV2 e TerraLogger O grupo cibercriminoso Golden Chickens, tamb\u00e9m conhecido como Venom Spider, ressurgiu com novos instrumentos perigosos no seu arsenal de Malware as a Service (MaaS). As ferramentas mais recentes\u00a0 TerraStealerV2 e TerraLogger foram projetadas para roubar informa\u00e7\u00f5es sens\u00edveis, desde credenciais de login at\u00e9 dados de carteiras de [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":22437,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[89,100,105],"tags":[],"class_list":["post-22434","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-basico","category-diversos","category-noticias"],"_links":{"self":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/22434","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/comments?post=22434"}],"version-history":[{"count":8,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/22434\/revisions"}],"predecessor-version":[{"id":22443,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/22434\/revisions\/22443"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/media\/22437"}],"wp:attachment":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/media?parent=22434"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/categories?post=22434"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/tags?post=22434"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}