{"id":8621,"date":"2016-03-05T17:11:04","date_gmt":"2016-03-05T20:11:04","guid":{"rendered":"http:\/\/www.ethicalhacker.com.br\/site\/?p=8621"},"modified":"2025-02-10T19:18:21","modified_gmt":"2025-02-10T22:18:21","slug":"malware-stuxnet","status":"publish","type":"post","link":"https:\/\/www.ethicalhacker.com.br\/site\/2016\/03\/diversos\/malware-stuxnet\/","title":{"rendered":"V\u00edrus  Stuxnet"},"content":{"rendered":"<p style=\"text-align: justify;\"><span id=\"result_box\" lang=\"pt\"><span title=\"This document summarizes the most comprehensive research on the Stuxnet malware so far: It combines \">Este documento resume uma pesquisa mais abrangente sobre o v\u00edrus Stuxnet. Combina <\/span><span title=\"results from reverse engineering the attack code with intelligence on the design of the attacked plant and \">resultados de engenharia reversa do c\u00f3digo de ataque baseado na intelig\u00eancia empregada.<\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span id=\"result_box\" lang=\"pt\"><span title=\"It looks at the attack vectors of the two \">F<\/span><span title=\"different payloads contained in the malware and especially provides an analysis of the bigger and much more \">ornece uma an\u00e1lise maior, do<\/span><span title=\"complex payload that was designed to damage centrifuge rotors by overpressure.\"> que foi projetado para danificar os rotores de centrifugadoras. <\/span><span title=\"With both attack vectors \">Com ambos os vectores de ataque <\/span><span title=\"viewed in context, conclusions are drawn about the reasoning behind a radical change of tactics between the \">visto no contexto, s\u00e3o tiradas conclus\u00f5es sobre o racioc\u00ednio por tr\u00e1s de uma mudan\u00e7a radical de t\u00e1tica entre o <\/span><span title=\"complex earlier attack and the comparatively simple later attack that tried to manipulate centrifuge rotor \">complexo ataque\u00a0 e mais tarde o ataque relativamente simples, que tentaram manipular os rotores das centr\u00edfugas, atrav\u00e9s de <\/span><span title=\"speeds.\">velocidades.\u00a0<\/span><\/span><\/p>\n<p style=\"text-align: justify;\">Link: <a href=\"https:\/\/www.langner.com\/wp-content\/uploads\/2017\/03\/to-kill-a-centrifuge.pdf\" target=\"_blank\" rel=\"noopener\">https:\/\/www.langner.com\/wp-content\/uploads\/2017\/03\/to-kill-a-centrifuge.pdf<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Este documento resume uma pesquisa mais abrangente sobre o v\u00edrus Stuxnet. Combina resultados de engenharia reversa do c\u00f3digo de ataque baseado na intelig\u00eancia empregada. Fornece uma an\u00e1lise maior, do que foi projetado para danificar os rotores de centrifugadoras. Com ambos os vectores de ataque visto no contexto, s\u00e3o tiradas conclus\u00f5es sobre o racioc\u00ednio por tr\u00e1s [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":8622,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[100,105],"tags":[],"class_list":["post-8621","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-diversos","category-noticias"],"_links":{"self":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/8621","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/comments?post=8621"}],"version-history":[{"count":7,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/8621\/revisions"}],"predecessor-version":[{"id":21869,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/8621\/revisions\/21869"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/media\/8622"}],"wp:attachment":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/media?parent=8621"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/categories?post=8621"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/tags?post=8621"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}