{"id":2145,"date":"2025-12-11T10:44:05","date_gmt":"2025-12-11T13:44:05","guid":{"rendered":"https:\/\/hackerrangers.siteup.dev\/?p=2145"},"modified":"2025-12-11T10:44:05","modified_gmt":"2025-12-11T13:44:05","slug":"elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information","status":"publish","type":"post","link":"https:\/\/hackerrangers.siteup.dev\/pt\/awareness\/elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information\/","title":{"rendered":"Elicita\u00e7\u00e3o: a t\u00e9cnica cavalheiresca de roubar informa\u00e7\u00f5es sigilosas"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Nem adianta olhar no dicion\u00e1rio: o conceito de elicita\u00e7\u00e3o no contexto da seguran\u00e7a da informa\u00e7\u00e3o \u00e9 um tanto desconhecido, inclusive no Brasil. Qualquer dicion\u00e1rio define elicitar (ou eliciar) como \u201cextrair, fazer sair; obter; desencadear, provocar; deduzir; descobrir; esclarecer\u201d, mas, convenhamos, \u00e9 um pouco dif\u00edcil de compreender a que o conceito se refere apenas com essa defini\u00e7\u00e3o.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Dentro da \u00e1rea de seguran\u00e7a da informa\u00e7\u00e3o, elicita\u00e7\u00e3o nada mais \u00e9 do que a t\u00e9cnica de extrair informa\u00e7\u00f5es sigilosas ou privilegiadas de algu\u00e9m por meio de uma conversa que, a priori, parece ser apenas um bate-papo educado e cavalheiresco. Esse di\u00e1logo pode ser mantido online ou por telefone, mas um engenheiro social habilidoso sempre vai preferir um di\u00e1logo presencial, olho no olho, onde ele pode ser mais incisivo.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">O ataque \u00e9 t\u00e3o preocupante que o Departamento Federal de Investiga\u00e7\u00e3o dos Estados Unidos (FBI) desenvolveu uma cartilha para alertar organiza\u00e7\u00f5es, privadas ou p\u00fablicas, a respeito de tal risco. Afinal, as t\u00e9cnicas de elicita\u00e7\u00e3o podem ser usadas at\u00e9 mesmo para conseguir segredos industriais e espionar planos ou projetos militares de uma na\u00e7\u00e3o estrangeira rival.<\/span><\/p>\n<h2><b>Uma conversa comprometedora<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Imagine que voc\u00ea esteja em um coworking, por exemplo, e, de repente, uma pessoa lhe aborda com uma educa\u00e7\u00e3o exemplar. Ela se apresenta como um colaborador rec\u00e9m-contratado, que ainda n\u00e3o conhece os colegas de escrit\u00f3rio. Ent\u00e3o, pede que voc\u00ea a ajude a se familiarizar com o ambiente.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">O di\u00e1logo parece fluir tranquilamente e, quando voc\u00ea se d\u00e1 conta, est\u00e1 respondendo a uma s\u00e9rie de perguntas aparentemente inocentes: onde fica a sala de reuni\u00f5es?; quantas pessoas comp\u00f5em a diretoria?; todos os ambientes s\u00e3o equipados com c\u00e2meras?. Ao fornecer essas informa\u00e7\u00f5es, voc\u00ea pode<\/span> <span style=\"font-weight: 400;\">sem querer, estar concedendo dados cruciais que poderiam ser usados para planejar um golpe contra a empresa.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">E \u00e9 exatamente assim que a t\u00e9cnica de elicita\u00e7\u00e3o funciona: a v\u00edtima dificilmente nota que est\u00e1 sofrendo uma \u201cextra\u00e7\u00e3o de informa\u00e7\u00f5es\u201d e fornecendo intelig\u00eancia restrita de maneira volunt\u00e1ria.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Isso acontece porque, na elicita\u00e7\u00e3o, a engenharia social atinge seu \u00e1pice e a conversa flui t\u00e3o naturalmente que algumas perguntas e coment\u00e1rios aparentemente inofensivos podem ser valiosos para o atacante. Ele usar\u00e1 t\u00e9cnicas de persuas\u00e3o e manter\u00e1 um di\u00e1logo envolvente, conquistando sua confian\u00e7a ao ser educado, sol\u00edcito e, acima de tudo, um bom ouvinte. O engenheiro vai lhe adular, pedir ajuda com alguma coisa, pedir sua opini\u00e3o sobre algum t\u00f3pico e discutir uma quest\u00e3o apenas para obter a sua vers\u00e3o dos fatos.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Segundo o FBI, existem v\u00e1rias t\u00e9cnicas que podem ser usadas por extratores durante uma sess\u00e3o de elicita\u00e7\u00e3o. Conhe\u00e7a algumas delas:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Conhecimento assumido:<\/b><span style=\"font-weight: 400;\"> criar empatia fingindo ter conhecimentos em comum com o alvo.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Isca confidencial:<\/b><span style=\"font-weight: 400;\"> fingir que est\u00e1 compartilhando uma informa\u00e7\u00e3o secreta na esperan\u00e7a de receber outra informa\u00e7\u00e3o secreta em retorno.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Nega\u00e7\u00e3o do \u00f3bvio:<\/b><span style=\"font-weight: 400;\"> propositalmente dizer algo errado para que a v\u00edtima lhe corrija com uma informa\u00e7\u00e3o verdadeira sigilosa.<\/span><\/li>\n<\/ul>\n<h2><b>At\u00e9 voc\u00ea provavelmente j\u00e1 usou!<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Embora esses cen\u00e1rios possam parecer loucuras que s\u00f3 acontecem em filmes de Hollywood, \u00e9 bem poss\u00edvel que voc\u00ea j\u00e1 tenha usado t\u00e9cnicas de elicita\u00e7\u00e3o \u2014 mesmo que seja por um bom motivo!\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Quando estamos preparando, por exemplo, uma festa surpresa para algu\u00e9m, \u00e9 comum que apliquemos as estrat\u00e9gias de elicita\u00e7\u00e3o para extrair algumas informa\u00e7\u00f5es do aniversariante. Voc\u00ea faz perguntas aparentemente inocentes e mant\u00e9m conversas aleat\u00f3rias para descobrir o que a pessoa gosta de comer, qual presente ela amaria receber e como est\u00e1 a sua agenda de hor\u00e1rios para a celebra\u00e7\u00e3o em si.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Desviar de tentativas de extra\u00e7\u00e3o de informa\u00e7\u00e3o por elicita\u00e7\u00e3o pode ser uma tarefa dif\u00edcil, mas tente treinar seu pensamento cr\u00edtico para n\u00e3o responder a qualquer pergunta sem antes imaginar as consequ\u00eancias. Se voc\u00ea acha que est\u00e1 sendo uma v\u00edtima desse tipo de golpe, desencoraje o atacante ignorando questionamentos incisivos, respondendo uma pergunta com outra pergunta, oferecendo respostas gen\u00e9ricas ou simplesmente dizendo que n\u00e3o sabe ou n\u00e3o pode discutir o t\u00f3pico em quest\u00e3o.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>It&#8217;s no use looking in the dictionary: the concept of elicitation in the context of information security is still relatively new, even in Brazil. Any dictionary defines elicit as &#8220;to extract, to bring out; to obtain; to trigger, to provoke; to deduce; to discover; to clarify&#8221;, but, let&#8217;s face it, it is a little hard [&hellip;]<\/p>\n","protected":false},"author":4009,"featured_media":2146,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[46],"tags":[120,113,119,121],"class_list":["post-2145","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-awareness","tag-elicitation","tag-information-security","tag-security","tag-social-engineering"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Elicitation: the polite technique of stealing sensitive information | Hacker Rangers<\/title>\n<meta name=\"description\" content=\"Elicitation in information security: how attackers extract sensitive data through casual conversations and how you can recognize it\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Elicitation: the polite technique of stealing sensitive information | Hacker Rangers\" \/>\n<meta property=\"og:description\" content=\"Elicitation in information security: how attackers extract sensitive data through casual conversations and how you can recognize it\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hackerrangers.siteup.dev\/pt\/awareness\/elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information\/\" \/>\n<meta property=\"og:site_name\" content=\"Hacker Rangers\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-11T13:44:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/elicitation.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Hacker Rangers\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hacker Rangers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information\/\"},\"author\":{\"name\":\"Hacker Rangers\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\"},\"headline\":\"Elicitation: the polite and courteous technique of stealing sensitive information\",\"datePublished\":\"2025-12-11T13:44:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information\/\"},\"wordCount\":622,\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/elicitation.png\",\"keywords\":[\"elicitation\",\"information security\",\"security\",\"social engineering\"],\"articleSection\":[\"Awareness\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information\/\",\"name\":\"Elicitation: the polite technique of stealing sensitive information | Hacker Rangers\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/elicitation.png\",\"datePublished\":\"2025-12-11T13:44:05+00:00\",\"description\":\"Elicitation in information security: how attackers extract sensitive data through casual conversations and how you can recognize it\",\"breadcrumb\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/hackerrangers.siteup.dev\/awareness\/elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information\/#primaryimage\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/elicitation.png\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/elicitation.png\",\"width\":1500,\"height\":1000,\"caption\":\"elicitation\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/hackerrangers.siteup.dev\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Elicitation: the polite and courteous technique of stealing sensitive information\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"name\":\"Hacker Rangers\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"width\":104,\"height\":50,\"caption\":\"Hacker Rangers\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/pt\/author\/hackerrangers\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Elicitation: the polite technique of stealing sensitive information | Hacker Rangers","description":"Elicitation in information security: how attackers extract sensitive data through casual conversations and how you can recognize it","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Elicitation: the polite technique of stealing sensitive information | Hacker Rangers","og_description":"Elicitation in information security: how attackers extract sensitive data through casual conversations and how you can recognize it","og_url":"https:\/\/hackerrangers.siteup.dev\/pt\/awareness\/elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information\/","og_site_name":"Hacker Rangers","article_published_time":"2025-12-11T13:44:05+00:00","og_image":[{"width":1500,"height":1000,"url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/elicitation.png","type":"image\/png"}],"author":"Hacker Rangers","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Hacker Rangers","Est. tempo de leitura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information\/#article","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information\/"},"author":{"name":"Hacker Rangers","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61"},"headline":"Elicitation: the polite and courteous technique of stealing sensitive information","datePublished":"2025-12-11T13:44:05+00:00","mainEntityOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information\/"},"wordCount":622,"publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/elicitation.png","keywords":["elicitation","information security","security","social engineering"],"articleSection":["Awareness"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information\/","url":"https:\/\/hackerrangers.siteup.dev\/awareness\/elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information\/","name":"Elicitation: the polite technique of stealing sensitive information | Hacker Rangers","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information\/#primaryimage"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/elicitation.png","datePublished":"2025-12-11T13:44:05+00:00","description":"Elicitation in information security: how attackers extract sensitive data through casual conversations and how you can recognize it","breadcrumb":{"@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hackerrangers.siteup.dev\/awareness\/elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information\/#primaryimage","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/elicitation.png","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/elicitation.png","width":1500,"height":1000,"caption":"elicitation"},{"@type":"BreadcrumbList","@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/elicitation-the-polite-and-courteous-technique-of-stealing-sensitive-information\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/hackerrangers.siteup.dev\/"},{"@type":"ListItem","position":2,"name":"Elicitation: the polite and courteous technique of stealing sensitive information"}]},{"@type":"WebSite","@id":"https:\/\/hackerrangers.siteup.dev\/#website","url":"https:\/\/hackerrangers.siteup.dev\/","name":"Hacker Rangers","description":"","publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/hackerrangers.siteup.dev\/#organization","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","width":104,"height":50,"caption":"Hacker Rangers"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/pt\/author\/hackerrangers\/"}]}},"_links":{"self":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/posts\/2145","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/users\/4009"}],"replies":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/comments?post=2145"}],"version-history":[{"count":0,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/posts\/2145\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/media\/2146"}],"wp:attachment":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/media?parent=2145"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/categories?post=2145"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/tags?post=2145"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}