{"id":5443,"date":"2012-10-25T21:04:34","date_gmt":"2012-10-26T00:04:34","guid":{"rendered":"http:\/\/www.ethicalhacker.com.br\/site\/?p=5443"},"modified":"2019-07-16T14:40:11","modified_gmt":"2019-07-16T17:40:11","slug":"varredura-em-pabx-voip-asterisk","status":"publish","type":"post","link":"https:\/\/www.ethicalhacker.com.br\/site\/2012\/10\/exploits\/varredura-em-pabx-voip-asterisk\/","title":{"rendered":"Varredura em PABX-VOIP &#8211; Asterisk"},"content":{"rendered":"<p style=\"text-align: justify;\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\">Ol\u00e1 pessoal !!! Bem vindo ao site BackTrack Brasil !!!<\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\">Neste pequeno artigo estarei demonstrando varreduras em um PABX-VOIP rodando na nuvem, pela qual \u00a0levantaremos algumas informa\u00e7\u00f5es. O servidor VOIP foi criado exclusivamente para testes e \u00a0est\u00e1 rodando nativamente o Asterisk.<\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\">O motivo da apresenta\u00e7\u00e3o \u00e9 informar os riscos, de forma que possamos buscar alternativas melhores para prote\u00e7\u00e3o do nosso ambiente.<\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\">Montei a estrutura do Asterisk em uma VPS de teste com ip fixo e criei alguns ramais para comunica\u00e7\u00e3o.<\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\">Estaremos utilizando o BackTrack 5 R3 para as devidas varreduras. Vamos l\u00e1 !!!<\/span><\/span><\/p>\n<p style=\"text-align: justify;\">Utilizando o SMAP para algumas varreduras<\/p>\n<p><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/15.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-5445 aligncenter\" title=\"1\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/15-300x187.png\"  alt=\"\" width=\"300\" height=\"187\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/15-300x187.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/15-1024x640.png 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/15.png 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center;\">\u00a0Fig1.<\/p>\n<p style=\"text-align: justify;\">Varredura em um \u00fanico host.<\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\">Note que atrav\u00e9s do comando .\/smap 184.82.107.156 verificamos que existe o protocolo SIP habilitado caracterizando um provedor VOIP.<\/span><\/span><\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/26.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-5449\" title=\"2\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/26-300x187.png\"  alt=\"\" width=\"300\" height=\"187\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/26-300x187.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/26-1024x640.png 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/26.png 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center;\">\u00a0Fig2.<\/p>\n<p style=\"text-align: justify;\">Varredura em v\u00e1rios hosts. Note que os dois primeiros IPs correspondem ao nosso alvo com o protocolo SIP habilitado.<\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/2.1.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-5453\" title=\"2.1\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/2.1-300x187.png\"  alt=\"\" width=\"300\" height=\"187\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/2.1-300x187.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/2.1-1024x640.png 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/2.1.png 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center;\">Fig3.<\/p>\n<p style=\"text-align: justify;\">No final da varredura verificamos as m\u00e1quinas que foram varridas e a quantidade de SIP encontrados.<\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/2.1.1.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-5457\" title=\"2.1.1\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/2.1.1-300x187.png\"  alt=\"\" width=\"300\" height=\"187\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/2.1.1-300x187.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/2.1.1-1024x640.png 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/2.1.1.png 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center;\">\u00a0Fig4.<\/p>\n<p style=\"text-align: justify;\">Com o comando .\/smap -l 184.82.107.156 conseguimos a vers\u00e3o exata do Asterisk que est\u00e1 rodando. D\u00e1i a import\u00e2ncia de utilizarmos sempre sistemas atualizados e com os patches de seguran\u00e7a em dia aliados a uma estrutura de seguran\u00e7a, como VPNs, IPS, IDS e Firewalls bem configurados.<\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/33.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-5459\" title=\"3\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/33-300x187.png\"  alt=\"\" width=\"300\" height=\"187\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/33-300x187.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/33-1024x640.png 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/33.png 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center;\">\u00a0Fig5.<\/p>\n<p style=\"text-align: justify;\">Aplicando o comando .\/smap -d 184.82.107.156 obtemos mais informa\u00e7\u00f5es.<\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/44.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-5461\" title=\"4\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/44-300x187.png\"  alt=\"\" width=\"300\" height=\"187\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/44-300x187.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/44-1024x640.png 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/44.png 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center;\">\u00a0Fig6.<\/p>\n<p style=\"text-align: justify;\">Observamos que o par\u00e2metro -d contribui com informa\u00e7\u00f5es relevantes.<\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/54.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-5462\" title=\"5\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/54-300x187.png\"  alt=\"\" width=\"300\" height=\"187\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/54-300x187.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/54-1024x640.png 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/54.png 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center;\">\u00a0Fig7.<\/p>\n<p style=\"text-align: justify;\">Finalizando com o par\u00e2metro -O e -l<\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/63.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-5464\" title=\"6\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/63-300x187.png\"  alt=\"\" width=\"300\" height=\"187\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/63-300x187.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/63-1024x640.png 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/63.png 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center;\">\u00a0Fig8.<\/p>\n<p style=\"text-align: justify;\">Agora vamos trabalhar com a ferramenta SIPSAK.<\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/76.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-5465\" title=\"7\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/76-300x187.png\"  alt=\"\" width=\"300\" height=\"187\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/76-300x187.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/76-1024x640.png 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/76.png 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center;\">\u00a0Fig9.<\/p>\n<p style=\"text-align: justify;\">Aplicando uma simples varredura.<\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/6.1.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-5466\" title=\"6.1\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/6.1-300x187.png\"  alt=\"\" width=\"300\" height=\"187\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/6.1-300x187.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/6.1-1024x640.png 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/6.1.png 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center;\">\u00a0Fig10.<\/p>\n<p style=\"text-align: justify;\">Utilizando a ferramenta SVMAP para varrer v\u00e1rios hosts.<\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/83.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-5467\" title=\"8\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/83-300x187.png\"  alt=\"\" width=\"300\" height=\"187\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/83-300x187.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/83-1024x640.png 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/83.png 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center;\">\u00a0Fig11.<\/p>\n<p style=\"text-align: justify;\">Vamos atrav\u00e9s do comando aplicar FINGERPRINT em v\u00e1rios hosts.<\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/91.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-5470\" title=\"9\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/91-300x187.png\"  alt=\"\" width=\"300\" height=\"187\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/91-300x187.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/91-1024x640.png 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/91.png 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center;\">Fig12.<\/p>\n<p style=\"text-align: justify;\">O resultado apresenta um aglomerado de informa\u00e7\u00f5es.<\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/101.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-5471\" title=\"10\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/101-300x187.png\"  alt=\"\" width=\"300\" height=\"187\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/101-300x187.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/101-1024x640.png 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/101.png 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center;\">Fig13.<\/p>\n<p style=\"text-align: justify;\">Vamos utilizar a ferramenta SVWAR para ataque de enumera\u00e7\u00e3o. Note que com esse comando conseguimos identificar todos os ramais SIP criados.<\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/121.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-5473\" title=\"12\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/121-300x187.png\"  alt=\"\" width=\"300\" height=\"187\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/121-300x187.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/121-1024x640.png 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/121.png 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center;\">Fig14.<\/p>\n<p style=\"text-align: justify;\">Com alguns par\u00e2metros melhoramos a varredura.<\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/131.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-5474\" title=\"13\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/131-300x187.png\"  alt=\"\" width=\"300\" height=\"187\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/131-300x187.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/131-1024x640.png 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/131.png 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center;\">\u00a0Fig15.<\/p>\n<p style=\"text-align: justify;\">Apresentamos os ramais existentes informando que os mesmos necessitam de autentica\u00e7\u00e3o &#8220;senhas&#8221;.<\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/13.1.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-5476\" title=\"13.1\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/13.1-300x187.png\"  alt=\"\" width=\"300\" height=\"187\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/13.1-300x187.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/13.1-1024x640.png 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/13.1.png 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center;\">Fig16.<\/p>\n<p style=\"text-align: justify;\">Sendo assim, vamos utilizar a ferramenta ENUMIAX para quebrarmos a autentica\u00e7\u00e3o dos ramais.<\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/141.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-5477\" title=\"14\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/141-300x187.png\"  alt=\"\" width=\"300\" height=\"187\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/141-300x187.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/141-1024x640.png 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/141.png 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center;\">\u00a0Fig17.<\/p>\n<p style=\"text-align: justify;\">Um grande abra\u00e7o a todos e at\u00e9 a pr\u00f3xima.<\/p>\n<p style=\"text-align: justify;\">\r\n\t\t<div class='author-shortcodes'>\r\n\t\t\t<div class='author-inner'>\r\n\t\t\t\t<div class='author-image'>\r\n\t\t\t<img src='https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/2012-05-30-12.45.38-1143174_57x57.jpg' alt='' \/>\r\n\t\t\t<div class='author-overlay'><\/div>\r\n\t\t<\/div> <!-- .author-image --> \r\n\t\t<div class='author-info'>\r\n\t\t\t<p style=\"text-align: justify;\">By:\u00a0<strong>Gerson Raymond<\/strong><\/p>\n<p style=\"text-align: justify;\">T\u00e9cnico em Contabilidade, T\u00e9cnico em Eletr\u00f4nica, T\u00e9cnico em Telecomunica\u00e7\u00f5es, Bacharel em Ci\u00eancia da Computa\u00e7\u00e3o, Administrador de Redes Linux (CentOS, XEN, Zabbix, Asterisk\/Elastix) e P\u00f3s-Graduando em Seguran\u00e7a em Tecnologia da Informa\u00e7\u00e3o \u2013 UNIVERSIDADE MACKENZIE \u2013 SP.<\/p>\n<p style=\"text-align: justify;\">Homepage:\u00a0<a title=\"Grsecurity\" href=\"http:\/\/www.grsecurity.com.br\/\">http:\/\/www.grsecurity.com.br<\/a><\/p>\n<p style=\"text-align: justify;\"><em>\u00a0<\/em>\r\n\t\t<\/div> <!-- .author-info --><\/p>\n<p style=\"text-align: justify;\">\r\n\t\t\t<\/div> <!-- .author-inner -->\r\n\t\t<\/div> <!-- .author-shortcodes --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ol\u00e1 pessoal !!! Bem vindo ao site BackTrack Brasil !!! Neste pequeno artigo estarei demonstrando varreduras em um PABX-VOIP rodando na nuvem, pela qual \u00a0levantaremos algumas informa\u00e7\u00f5es. O servidor VOIP foi criado exclusivamente para testes e \u00a0est\u00e1 rodando nativamente o Asterisk. O motivo da apresenta\u00e7\u00e3o \u00e9 informar os riscos, de forma que possamos buscar alternativas [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":5482,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[100,21,101],"tags":[],"class_list":["post-5443","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-diversos","category-exploits","category-tutorial-backtrack"],"_links":{"self":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/5443","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/comments?post=5443"}],"version-history":[{"count":31,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/5443\/revisions"}],"predecessor-version":[{"id":10493,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/5443\/revisions\/10493"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/media\/5482"}],"wp:attachment":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/media?parent=5443"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/categories?post=5443"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/tags?post=5443"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}