{"id":2548,"date":"2026-02-16T14:59:26","date_gmt":"2026-02-16T17:59:26","guid":{"rendered":"https:\/\/hackerrangers.siteup.dev\/?p=2548"},"modified":"2026-02-16T15:07:47","modified_gmt":"2026-02-16T18:07:47","slug":"o-que-e-um-ataque-de-negacao-de-servico-distribuido","status":"publish","type":"post","link":"https:\/\/hackerrangers.siteup.dev\/pt\/cybersecurity\/o-que-e-um-ataque-de-negacao-de-servico-distribuido\/","title":{"rendered":"O que \u00e9 um ataque de nega\u00e7\u00e3o de servi\u00e7o distribu\u00eddo (DDoS)?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">\"O sistema caiu\". Esta frase, que talvez voc\u00ea j\u00e1 tenha ouvido, se refere a um cen\u00e1rio em que uma aplica\u00e7\u00e3o ou servi\u00e7o digital encontra-se indispon\u00edvel ou inoperante. Com o sistema parado, tarefas importantes podem ficar prejudicadas, atrapalhando a emiss\u00e3o de bilhetes em um aeroporto ou a interna\u00e7\u00e3o de pacientes em um hospital.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Quando essas quedas imprevistas s\u00e3o o resultado de uma a\u00e7\u00e3o proposital \u2013 quando criminosos fizeram algo para provoc\u00e1-la \u2013, a situa\u00e7\u00e3o \u00e9 considerada um ataque cibern\u00e9tico de nega\u00e7\u00e3o de servi\u00e7o. O nome desse ataque vem do fato de que o objetivo \u00e9 fazer com que o alvo \"negue servi\u00e7o\", ou seja, pare de funcionar.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">O ataque de nega\u00e7\u00e3o de servi\u00e7o decorre de uma comunica\u00e7\u00e3o ou transmiss\u00e3o de dados maliciosa que interfere no desempenho do sistema, podendo fazer com que as conex\u00f5es sejam totalmente bloqueadas. Por\u00e9m, sistemas podem ser refor\u00e7ados contra esse ataque.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Infelizmente, \u00e9 por isso que os criminosos recorrem ao ataque distribu\u00eddo de nega\u00e7\u00e3o de servi\u00e7o, tamb\u00e9m conhecido pela sigla em ingl\u00eas DDoS (distributed denial of service). Nessa modalidade, as comunica\u00e7\u00f5es ou transmiss\u00f5es de dados maliciosas partem de at\u00e9 milhares de computadores ao mesmo tempo.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Em uma compara\u00e7\u00e3o com o mundo real, \u00e9 como se o atacante conseguisse lotar uma loja com pessoas que n\u00e3o s\u00e3o clientes para obstruir o atendimento aos verdadeiros clientes, obrigando a loja a \"negar servi\u00e7o\".<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Em alguns casos, a escala do ataque distribu\u00eddo sobrecarrega totalmente o sistema. \u00c9 poss\u00edvel at\u00e9 exaurir a conex\u00e3o com a internet do servi\u00e7o, o que deixa o alvo sem meios para resistir sozinho.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">De quem s\u00e3o os computadores <\/span><span style=\"font-weight: 400;\">nesse <\/span><span style=\"font-weight: 400;\">ataque?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Os criminosos quase sempre usam dispositivos de outras pessoas para efetuar o DDoS, como computadores e at\u00e9 aparelhos da Internet das Coisas \u2013 c\u00e2meras de seguran\u00e7a, TVs, gravadores de v\u00eddeo \u2013 que foram contaminados com um malware de acesso remoto.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A praga digital passa a controlar o dispositivo \u2013 preferencialmente sem alertar o usu\u00e1rio \u2013 e forma uma <\/span><b>rede-zumbi (botnet)<\/b><span style=\"font-weight: 400;\"> com os demais sistemas infectados.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Tendo o controle desse \"ex\u00e9rcito\", o criminoso envia um comando para que a rede inteira abra conex\u00f5es com o alvo desejado, concretizando o ataque.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Existe ainda uma modalidade chamada de \"<\/span><b>ataque distribu\u00eddo refletido de nega\u00e7\u00e3o de servi\u00e7o<\/b><span style=\"font-weight: 400;\"> \". \u00c9 um cen\u00e1rio mais complexo em que os criminosos se aproveitam de caracter\u00edsticas espec\u00edficas de alguns protocolos de rede para \"desviar\" (ou \"rebater\") conex\u00f5es para o alvo do ataque.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Para que serve um ataque que derruba sistemas?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Um ataque de nega\u00e7\u00e3o de servi\u00e7o pode ser realizado para diversos fins. Alguns exemplos:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Extors\u00e3o:<\/b><span style=\"font-weight: 400;\"> ap\u00f3s derrubar um sistema cr\u00edtico de uma empresa, o criminoso entra em contato para exigir um pagamento pelo fim do ataque;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Distra\u00e7\u00e3o:<\/b><span style=\"font-weight: 400;\"> o ataque de nega\u00e7\u00e3o de servi\u00e7o pode servir como isca para encobrir um outro ataque discreto e de maior valor que est\u00e1 ocorrendo ao mesmo tempo;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Cortar o acesso \u00e0 seguran\u00e7a:<\/b><span style=\"font-weight: 400;\"> um atacante pode derrubar um subsistema de seguran\u00e7a, evitando que eles interfiram em outras fraudes;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Ativismo online:<\/b><span style=\"font-weight: 400;\"> o DDoS j\u00e1 foi usado em muitos casos de \"ativismo\" ou protesto online. Nesse caso, os usu\u00e1rios se juntaram ao ataque voluntariamente.<\/span><\/li>\n<\/ul>\n<h2><span style=\"font-weight: 400;\">Como n\u00e3o fazer parte de um DDoS?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Garantir a disponibilidade dos sistemas \u00e9 uma das miss\u00f5es dos profissionais em seguran\u00e7a cibern\u00e9tica. Por\u00e9m, voc\u00ea pode ajudar evitando que seus dispositivos sejam incorporados \u00e0s redes-zumbi:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Mantenha aplica\u00e7\u00f5es e sistemas atualizados, inclusive em dispositivos da \"Internet das Coisas\" (c\u00e2meras, TVs, gravadores, geladeiras);<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Personalize as senhas em dispositivos IoT<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Cuidado com links e anexos (que podem ter malware);<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Baixe apenas softwares de fontes conhecidas;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">N\u00e3o ignore os <strong><a href=\"https:\/\/hackerrangers.siteup.dev\/pt\/cybersecurity\/antivirus-how-it-works-and-how-important-it-is\/\">alertas do antiv\u00edrus<\/a><\/strong>.<\/span><\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>&#8220;The system is down&#8221;. This is something you may have heard before, referring to the unavailability or inoperability of a digital application or service. With the system down, important tasks may become jeopardized, disrupting ticketing at an airport or the admission of patients to a hospital. When these unforeseen outages are the result of deliberate [&hellip;]<\/p>\n","protected":false},"author":4009,"featured_media":2549,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[23],"tags":[66,151,90,150],"class_list":["post-2548","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-awareness","tag-cyberattacks","tag-cybercrime","tag-ddos"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is a Distributed Denial-of-Service (DDoS) attack? | Hacker Rangers<\/title>\n<meta name=\"description\" content=\"Learn how DDoS attacks disrupt systems, how botnets are used, and what steps you can take to prevent your devices .\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is a Distributed Denial-of-Service (DDoS) attack? | Hacker Rangers\" \/>\n<meta property=\"og:description\" content=\"Learn how DDoS attacks disrupt systems, how botnets are used, and what steps you can take to prevent your devices .\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hackerrangers.siteup.dev\/pt\/cybersecurity\/o-que-e-um-ataque-de-negacao-de-servico-distribuido\/\" \/>\n<meta property=\"og:site_name\" content=\"Hacker Rangers\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-16T17:59:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-16T18:07:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2026\/02\/DDoS.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Hacker Rangers\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hacker Rangers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-is-a-ddos-attack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-is-a-ddos-attack\/\"},\"author\":{\"name\":\"Hacker Rangers\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\"},\"headline\":\"What is a Distributed Denial-of-Service (DDoS) attack?\",\"datePublished\":\"2026-02-16T17:59:26+00:00\",\"dateModified\":\"2026-02-16T18:07:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-is-a-ddos-attack\/\"},\"wordCount\":537,\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-is-a-ddos-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2026\/02\/DDoS.png\",\"keywords\":[\"awareness\",\"cyberattacks\",\"cybercrime\",\"DDoS\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-is-a-ddos-attack\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-is-a-ddos-attack\/\",\"name\":\"What is a Distributed Denial-of-Service (DDoS) attack? | Hacker Rangers\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-is-a-ddos-attack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-is-a-ddos-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2026\/02\/DDoS.png\",\"datePublished\":\"2026-02-16T17:59:26+00:00\",\"dateModified\":\"2026-02-16T18:07:47+00:00\",\"description\":\"Learn how DDoS attacks disrupt systems, how botnets are used, and what steps you can take to prevent your devices .\",\"breadcrumb\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-is-a-ddos-attack\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-is-a-ddos-attack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-is-a-ddos-attack\/#primaryimage\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2026\/02\/DDoS.png\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2026\/02\/DDoS.png\",\"width\":1500,\"height\":1000,\"caption\":\"DDoS\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-is-a-ddos-attack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/hackerrangers.siteup.dev\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is a Distributed Denial-of-Service (DDoS) attack?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"name\":\"Hacker Rangers\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"width\":104,\"height\":50,\"caption\":\"Hacker Rangers\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/pt\/author\/hackerrangers\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is a Distributed Denial-of-Service (DDoS) attack? | Hacker Rangers","description":"Learn how DDoS attacks disrupt systems, how botnets are used, and what steps you can take to prevent your devices .","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"What is a Distributed Denial-of-Service (DDoS) attack? | Hacker Rangers","og_description":"Learn how DDoS attacks disrupt systems, how botnets are used, and what steps you can take to prevent your devices .","og_url":"https:\/\/hackerrangers.siteup.dev\/pt\/cybersecurity\/o-que-e-um-ataque-de-negacao-de-servico-distribuido\/","og_site_name":"Hacker Rangers","article_published_time":"2026-02-16T17:59:26+00:00","article_modified_time":"2026-02-16T18:07:47+00:00","og_image":[{"width":1500,"height":1000,"url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2026\/02\/DDoS.png","type":"image\/png"}],"author":"Hacker Rangers","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Hacker Rangers","Est. tempo de leitura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-is-a-ddos-attack\/#article","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-is-a-ddos-attack\/"},"author":{"name":"Hacker Rangers","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61"},"headline":"What is a Distributed Denial-of-Service (DDoS) attack?","datePublished":"2026-02-16T17:59:26+00:00","dateModified":"2026-02-16T18:07:47+00:00","mainEntityOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-is-a-ddos-attack\/"},"wordCount":537,"publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-is-a-ddos-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2026\/02\/DDoS.png","keywords":["awareness","cyberattacks","cybercrime","DDoS"],"articleSection":["Cybersecurity"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-is-a-ddos-attack\/","url":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-is-a-ddos-attack\/","name":"What is a Distributed Denial-of-Service (DDoS) attack? | Hacker Rangers","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-is-a-ddos-attack\/#primaryimage"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-is-a-ddos-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2026\/02\/DDoS.png","datePublished":"2026-02-16T17:59:26+00:00","dateModified":"2026-02-16T18:07:47+00:00","description":"Learn how DDoS attacks disrupt systems, how botnets are used, and what steps you can take to prevent your devices .","breadcrumb":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-is-a-ddos-attack\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-is-a-ddos-attack\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-is-a-ddos-attack\/#primaryimage","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2026\/02\/DDoS.png","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2026\/02\/DDoS.png","width":1500,"height":1000,"caption":"DDoS"},{"@type":"BreadcrumbList","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-is-a-ddos-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/hackerrangers.siteup.dev\/"},{"@type":"ListItem","position":2,"name":"What is a Distributed Denial-of-Service (DDoS) attack?"}]},{"@type":"WebSite","@id":"https:\/\/hackerrangers.siteup.dev\/#website","url":"https:\/\/hackerrangers.siteup.dev\/","name":"Hacker Rangers","description":"","publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/hackerrangers.siteup.dev\/#organization","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","width":104,"height":50,"caption":"Hacker Rangers"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/pt\/author\/hackerrangers\/"}]}},"_links":{"self":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/posts\/2548","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/users\/4009"}],"replies":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/comments?post=2548"}],"version-history":[{"count":0,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/posts\/2548\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/media\/2549"}],"wp:attachment":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/media?parent=2548"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/categories?post=2548"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/tags?post=2548"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}