

{"id":4208,"date":"2023-06-08T16:59:21","date_gmt":"2023-06-08T13:59:21","guid":{"rendered":"https:\/\/csirt.lacnic.net\/?p=4208"},"modified":"2023-06-08T20:50:17","modified_gmt":"2023-06-08T17:50:17","slug":"vulnerabilidad-en-sistemas-linux-unix-permite-el-secuestro-de-conexiones-vpn-cifradas","status":"publish","type":"post","link":"https:\/\/csirt.lacnic.net\/pt-br\/arquivo-pt-br\/vulnerabilidad-en-sistemas-linux-unix-permite-el-secuestro-de-conexiones-vpn-cifradas","title":{"rendered":"Vulnerabilidad en sistemas Linux\/Unix permite el secuestro de conexiones VPN cifradas"},"content":{"rendered":"<p>Investigadores han detectado un fallo en sistemas de la familia Linux\/Unix, como por ejemplo FreeBSD, OpenBSD, macOS, iOS y Android, que podr\u00eda permitir a atacantes  espiar y manipular redes VPN encriptadas.<\/p>\n<p>La vulnerabilidad identificada como CVE-2019-14899, afecta a  muchos sistemas operativos y opera tanto bajo conexiones IPv4 como IPv6. Seg\u00fan afirman los investigadores, la vulnerabilidad no depende de la tecnolog\u00eda VPN utilizada, puesto que el ataque se puede producir contra protocolos VPN ampliamente utilizados, como por ejemplo, OpenVPN, WireGuard, IKEv2 \/ IPSec, etc.<\/p>\n<h2>C\u00f3mo puede ser explotada<\/h2>\n<p>Para explotar esta vulnerabilidad basta con enviar al dispositivo de la v\u00edctima una serie de paquetes de red no solicitados (sin importar que estos est\u00e9n encriptados) y observar las respuestas. Por lo que es posible realizarlo controlando un punto de acceso o desde la misma red de la v\u00edctima.<br \/>\nExisten diferencias entre los sistemas operativos afectados pero la vulnerabilidad permite en todos ellos introducir datos en el flujo TCP, secuestrar conexiones, obtener la direcci\u00f3n IP virtual de una v\u00edctima asignada por el servidor VPN, percibir la existencia de conexiones activas a un sitio web determinado y los n\u00fameros exactos de seq y ack contando los paquetes cifrados o analizando sus tama\u00f1os.<\/p>\n<p>Se ha confirmado que la vulnerabilidad puede ser explotada especialmente en aquellas distribuciones Linux que poseen la versi\u00f3n de systemd posterior al 28 de noviembre de 2018, versi\u00f3n en la que se desactiva el filtrado de ruta inversa. Estas distribuciones son:<\/p>\n<ul>\n<li>Ubuntu 19.10 (systemd)<\/li>\n<li>Fedora (systemd)<\/li>\n<li>Debian 10.2 (systemd)<\/li>\n<li>Arco 2019.05 (systemd)<\/li>\n<li>Manjaro 18.1.1 (systemd)<\/li>\n<li>Devuan (sysV init)<\/li>\n<li>MX Linux 19 (Mepis + antiX)<\/li>\n<li>Linux vac\u00edo (runit)<\/li>\n<li>Slackware 14.2 (rc.d)<\/li>\n<li>Deepin (rc.d)<\/li>\n<li>FreeBSD (rc.d)<\/li>\n<li>OpenBSD (rc.d)<\/li>\n<\/ul>\n<h2>Se recomienda<\/h2>\n<ul>\n<li>Activar el filtrado de ruta inversa<\/li>\n<li>Implementar el filtrado de direcciones de IP falsas (bogons)<\/li>\n<li>Cifrar el tama\u00f1o y el tiempo del paquete<\/li>\n<\/ul>\n<h3>M\u00e1s informaci\u00f3n<\/h3>\n<p><a href=\"https:\/\/seclists.org\/oss-sec\/2019\/q4\/122\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/seclists.org\/oss-sec\/2019\/q4\/122<\/a><br \/>\n<a href=\"https:\/\/thehackernews.com\/2019\/12\/linux-vpn-hacking.html\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/thehackernews.com\/2019\/12\/linux-vpn-hacking.html<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Investigadores han detectado un fallo en sistemas de la familia Linux\/Unix, como por ejemplo FreeBSD, OpenBSD, macOS, iOS y Android, que podr\u00eda permitir a atacantes espiar y manipular redes VPN encriptadas. La vulnerabilidad identificada como CVE-2019-14899, afecta a muchos sistemas operativos y opera tanto bajo conexiones IPv4 como IPv6. Seg\u00fan afirman los investigadores, la vulnerabilidad [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":4159,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[55],"tags":[],"class_list":["post-4208","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-arquivo-pt-br"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LACNIC CSIRT - Vulnerabilidad en sistemas Linux\/Unix permite el secuestro de conexiones VPN cifradas<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/csirt.lacnic.net\/pt-br\/arquivo-pt-br\/vulnerabilidad-en-sistemas-linux-unix-permite-el-secuestro-de-conexiones-vpn-cifradas\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LACNIC CSIRT - Vulnerabilidad en sistemas Linux\/Unix permite el secuestro de conexiones VPN cifradas\" \/>\n<meta property=\"og:description\" content=\"Investigadores han detectado un fallo en sistemas de la familia Linux\/Unix, como por ejemplo FreeBSD, OpenBSD, macOS, iOS y Android, que podr\u00eda permitir a atacantes espiar y manipular redes VPN encriptadas. La vulnerabilidad identificada como CVE-2019-14899, afecta a muchos sistemas operativos y opera tanto bajo conexiones IPv4 como IPv6. Seg\u00fan afirman los investigadores, la vulnerabilidad [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/csirt.lacnic.net\/pt-br\/arquivo-pt-br\/vulnerabilidad-en-sistemas-linux-unix-permite-el-secuestro-de-conexiones-vpn-cifradas\" \/>\n<meta property=\"og:site_name\" content=\"LACNIC CSIRT\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-08T13:59:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-08T17:50:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/csirt.lacnic.net\/wp-content\/uploads\/elegir-mejor-vpn.png\" \/>\n\t<meta property=\"og:image:width\" content=\"495\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Gianni Arena\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lacnic_csirt\" \/>\n<meta name=\"twitter:site\" content=\"@lacnic_csirt\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/pt-br\\\/arquivo-pt-br\\\/vulnerabilidad-en-sistemas-linux-unix-permite-el-secuestro-de-conexiones-vpn-cifradas#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/pt-br\\\/arquivo-pt-br\\\/vulnerabilidad-en-sistemas-linux-unix-permite-el-secuestro-de-conexiones-vpn-cifradas\"},\"author\":{\"name\":\"Gianni Arena\",\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/#\\\/schema\\\/person\\\/d5c65fde1dbe338128788dcc20e9f5d3\"},\"headline\":\"Vulnerabilidad en sistemas Linux\\\/Unix permite el secuestro de conexiones VPN cifradas\",\"datePublished\":\"2023-06-08T13:59:21+00:00\",\"dateModified\":\"2023-06-08T17:50:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/pt-br\\\/arquivo-pt-br\\\/vulnerabilidad-en-sistemas-linux-unix-permite-el-secuestro-de-conexiones-vpn-cifradas\"},\"wordCount\":336,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/pt-br\\\/arquivo-pt-br\\\/vulnerabilidad-en-sistemas-linux-unix-permite-el-secuestro-de-conexiones-vpn-cifradas#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/csirt.lacnic.net\\\/wp-content\\\/uploads\\\/elegir-mejor-vpn.png\",\"articleSection\":[\"Arquivo\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/csirt.lacnic.net\\\/pt-br\\\/arquivo-pt-br\\\/vulnerabilidad-en-sistemas-linux-unix-permite-el-secuestro-de-conexiones-vpn-cifradas#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/pt-br\\\/arquivo-pt-br\\\/vulnerabilidad-en-sistemas-linux-unix-permite-el-secuestro-de-conexiones-vpn-cifradas\",\"url\":\"https:\\\/\\\/csirt.lacnic.net\\\/pt-br\\\/arquivo-pt-br\\\/vulnerabilidad-en-sistemas-linux-unix-permite-el-secuestro-de-conexiones-vpn-cifradas\",\"name\":\"LACNIC CSIRT - Vulnerabilidad en sistemas Linux\\\/Unix permite el secuestro de conexiones VPN cifradas\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/pt-br\\\/arquivo-pt-br\\\/vulnerabilidad-en-sistemas-linux-unix-permite-el-secuestro-de-conexiones-vpn-cifradas#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/pt-br\\\/arquivo-pt-br\\\/vulnerabilidad-en-sistemas-linux-unix-permite-el-secuestro-de-conexiones-vpn-cifradas#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/csirt.lacnic.net\\\/wp-content\\\/uploads\\\/elegir-mejor-vpn.png\",\"datePublished\":\"2023-06-08T13:59:21+00:00\",\"dateModified\":\"2023-06-08T17:50:17+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/pt-br\\\/arquivo-pt-br\\\/vulnerabilidad-en-sistemas-linux-unix-permite-el-secuestro-de-conexiones-vpn-cifradas#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/csirt.lacnic.net\\\/pt-br\\\/arquivo-pt-br\\\/vulnerabilidad-en-sistemas-linux-unix-permite-el-secuestro-de-conexiones-vpn-cifradas\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/pt-br\\\/arquivo-pt-br\\\/vulnerabilidad-en-sistemas-linux-unix-permite-el-secuestro-de-conexiones-vpn-cifradas#primaryimage\",\"url\":\"https:\\\/\\\/csirt.lacnic.net\\\/wp-content\\\/uploads\\\/elegir-mejor-vpn.png\",\"contentUrl\":\"https:\\\/\\\/csirt.lacnic.net\\\/wp-content\\\/uploads\\\/elegir-mejor-vpn.png\",\"width\":495,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/pt-br\\\/arquivo-pt-br\\\/vulnerabilidad-en-sistemas-linux-unix-permite-el-secuestro-de-conexiones-vpn-cifradas#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/csirt.lacnic.net\\\/pt-br\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vulnerabilidad en sistemas Linux\\\/Unix permite el secuestro de conexiones VPN cifradas\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/\",\"name\":\"LACNIC CSIRT\",\"description\":\"Centro de Respuestas de Incidentes - LACNIC CSIRT\",\"publisher\":{\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/#organization\",\"name\":\"LACNIC CSIRT\",\"url\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/csirt.lacnic.net\\\/wp-content\\\/uploads\\\/lacnic-csirt-2020.png\",\"contentUrl\":\"https:\\\/\\\/csirt.lacnic.net\\\/wp-content\\\/uploads\\\/lacnic-csirt-2020.png\",\"width\":680,\"height\":330,\"caption\":\"LACNIC CSIRT\"},\"image\":{\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/lacnic_csirt\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/#\\\/schema\\\/person\\\/d5c65fde1dbe338128788dcc20e9f5d3\",\"name\":\"Gianni Arena\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cc620878b92e4930abb5951af723f7e852088c31f8489beda9016e53725fb1f2?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cc620878b92e4930abb5951af723f7e852088c31f8489beda9016e53725fb1f2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cc620878b92e4930abb5951af723f7e852088c31f8489beda9016e53725fb1f2?s=96&d=mm&r=g\",\"caption\":\"Gianni Arena\"},\"url\":\"https:\\\/\\\/csirt.lacnic.net\\\/pt-br\\\/author\\\/gianni\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LACNIC CSIRT - Vulnerabilidad en sistemas Linux\/Unix permite el secuestro de conexiones VPN cifradas","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/csirt.lacnic.net\/pt-br\/arquivo-pt-br\/vulnerabilidad-en-sistemas-linux-unix-permite-el-secuestro-de-conexiones-vpn-cifradas","og_locale":"pt_BR","og_type":"article","og_title":"LACNIC CSIRT - Vulnerabilidad en sistemas Linux\/Unix permite el secuestro de conexiones VPN cifradas","og_description":"Investigadores han detectado un fallo en sistemas de la familia Linux\/Unix, como por ejemplo FreeBSD, OpenBSD, macOS, iOS y Android, que podr\u00eda permitir a atacantes espiar y manipular redes VPN encriptadas. La vulnerabilidad identificada como CVE-2019-14899, afecta a muchos sistemas operativos y opera tanto bajo conexiones IPv4 como IPv6. Seg\u00fan afirman los investigadores, la vulnerabilidad [&hellip;]","og_url":"https:\/\/csirt.lacnic.net\/pt-br\/arquivo-pt-br\/vulnerabilidad-en-sistemas-linux-unix-permite-el-secuestro-de-conexiones-vpn-cifradas","og_site_name":"LACNIC CSIRT","article_published_time":"2023-06-08T13:59:21+00:00","article_modified_time":"2023-06-08T17:50:17+00:00","og_image":[{"width":495,"height":300,"url":"https:\/\/csirt.lacnic.net\/wp-content\/uploads\/elegir-mejor-vpn.png","type":"image\/png"}],"author":"Gianni Arena","twitter_card":"summary_large_image","twitter_creator":"@lacnic_csirt","twitter_site":"@lacnic_csirt","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/csirt.lacnic.net\/pt-br\/arquivo-pt-br\/vulnerabilidad-en-sistemas-linux-unix-permite-el-secuestro-de-conexiones-vpn-cifradas#article","isPartOf":{"@id":"https:\/\/csirt.lacnic.net\/pt-br\/arquivo-pt-br\/vulnerabilidad-en-sistemas-linux-unix-permite-el-secuestro-de-conexiones-vpn-cifradas"},"author":{"name":"Gianni Arena","@id":"https:\/\/csirt.lacnic.net\/en\/#\/schema\/person\/d5c65fde1dbe338128788dcc20e9f5d3"},"headline":"Vulnerabilidad en sistemas Linux\/Unix permite el secuestro de conexiones VPN cifradas","datePublished":"2023-06-08T13:59:21+00:00","dateModified":"2023-06-08T17:50:17+00:00","mainEntityOfPage":{"@id":"https:\/\/csirt.lacnic.net\/pt-br\/arquivo-pt-br\/vulnerabilidad-en-sistemas-linux-unix-permite-el-secuestro-de-conexiones-vpn-cifradas"},"wordCount":336,"commentCount":0,"publisher":{"@id":"https:\/\/csirt.lacnic.net\/en\/#organization"},"image":{"@id":"https:\/\/csirt.lacnic.net\/pt-br\/arquivo-pt-br\/vulnerabilidad-en-sistemas-linux-unix-permite-el-secuestro-de-conexiones-vpn-cifradas#primaryimage"},"thumbnailUrl":"https:\/\/csirt.lacnic.net\/wp-content\/uploads\/elegir-mejor-vpn.png","articleSection":["Arquivo"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/csirt.lacnic.net\/pt-br\/arquivo-pt-br\/vulnerabilidad-en-sistemas-linux-unix-permite-el-secuestro-de-conexiones-vpn-cifradas#respond"]}]},{"@type":"WebPage","@id":"https:\/\/csirt.lacnic.net\/pt-br\/arquivo-pt-br\/vulnerabilidad-en-sistemas-linux-unix-permite-el-secuestro-de-conexiones-vpn-cifradas","url":"https:\/\/csirt.lacnic.net\/pt-br\/arquivo-pt-br\/vulnerabilidad-en-sistemas-linux-unix-permite-el-secuestro-de-conexiones-vpn-cifradas","name":"LACNIC CSIRT - Vulnerabilidad en sistemas Linux\/Unix permite el secuestro de conexiones VPN cifradas","isPartOf":{"@id":"https:\/\/csirt.lacnic.net\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/csirt.lacnic.net\/pt-br\/arquivo-pt-br\/vulnerabilidad-en-sistemas-linux-unix-permite-el-secuestro-de-conexiones-vpn-cifradas#primaryimage"},"image":{"@id":"https:\/\/csirt.lacnic.net\/pt-br\/arquivo-pt-br\/vulnerabilidad-en-sistemas-linux-unix-permite-el-secuestro-de-conexiones-vpn-cifradas#primaryimage"},"thumbnailUrl":"https:\/\/csirt.lacnic.net\/wp-content\/uploads\/elegir-mejor-vpn.png","datePublished":"2023-06-08T13:59:21+00:00","dateModified":"2023-06-08T17:50:17+00:00","breadcrumb":{"@id":"https:\/\/csirt.lacnic.net\/pt-br\/arquivo-pt-br\/vulnerabilidad-en-sistemas-linux-unix-permite-el-secuestro-de-conexiones-vpn-cifradas#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/csirt.lacnic.net\/pt-br\/arquivo-pt-br\/vulnerabilidad-en-sistemas-linux-unix-permite-el-secuestro-de-conexiones-vpn-cifradas"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/csirt.lacnic.net\/pt-br\/arquivo-pt-br\/vulnerabilidad-en-sistemas-linux-unix-permite-el-secuestro-de-conexiones-vpn-cifradas#primaryimage","url":"https:\/\/csirt.lacnic.net\/wp-content\/uploads\/elegir-mejor-vpn.png","contentUrl":"https:\/\/csirt.lacnic.net\/wp-content\/uploads\/elegir-mejor-vpn.png","width":495,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/csirt.lacnic.net\/pt-br\/arquivo-pt-br\/vulnerabilidad-en-sistemas-linux-unix-permite-el-secuestro-de-conexiones-vpn-cifradas#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/csirt.lacnic.net\/pt-br"},{"@type":"ListItem","position":2,"name":"Vulnerabilidad en sistemas Linux\/Unix permite el secuestro de conexiones VPN cifradas"}]},{"@type":"WebSite","@id":"https:\/\/csirt.lacnic.net\/en\/#website","url":"https:\/\/csirt.lacnic.net\/en\/","name":"LACNIC CSIRT","description":"Centro de Respuestas de Incidentes - LACNIC CSIRT","publisher":{"@id":"https:\/\/csirt.lacnic.net\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/csirt.lacnic.net\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/csirt.lacnic.net\/en\/#organization","name":"LACNIC CSIRT","url":"https:\/\/csirt.lacnic.net\/en\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/csirt.lacnic.net\/en\/#\/schema\/logo\/image\/","url":"https:\/\/csirt.lacnic.net\/wp-content\/uploads\/lacnic-csirt-2020.png","contentUrl":"https:\/\/csirt.lacnic.net\/wp-content\/uploads\/lacnic-csirt-2020.png","width":680,"height":330,"caption":"LACNIC CSIRT"},"image":{"@id":"https:\/\/csirt.lacnic.net\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/lacnic_csirt"]},{"@type":"Person","@id":"https:\/\/csirt.lacnic.net\/en\/#\/schema\/person\/d5c65fde1dbe338128788dcc20e9f5d3","name":"Gianni Arena","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/cc620878b92e4930abb5951af723f7e852088c31f8489beda9016e53725fb1f2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/cc620878b92e4930abb5951af723f7e852088c31f8489beda9016e53725fb1f2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cc620878b92e4930abb5951af723f7e852088c31f8489beda9016e53725fb1f2?s=96&d=mm&r=g","caption":"Gianni Arena"},"url":"https:\/\/csirt.lacnic.net\/pt-br\/author\/gianni"}]}},"jetpack_featured_media_url":"https:\/\/csirt.lacnic.net\/wp-content\/uploads\/elegir-mejor-vpn.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/csirt.lacnic.net\/pt-br\/wp-json\/wp\/v2\/posts\/4208","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/csirt.lacnic.net\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/csirt.lacnic.net\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/csirt.lacnic.net\/pt-br\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/csirt.lacnic.net\/pt-br\/wp-json\/wp\/v2\/comments?post=4208"}],"version-history":[{"count":0,"href":"https:\/\/csirt.lacnic.net\/pt-br\/wp-json\/wp\/v2\/posts\/4208\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/csirt.lacnic.net\/pt-br\/wp-json\/wp\/v2\/media\/4159"}],"wp:attachment":[{"href":"https:\/\/csirt.lacnic.net\/pt-br\/wp-json\/wp\/v2\/media?parent=4208"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/csirt.lacnic.net\/pt-br\/wp-json\/wp\/v2\/categories?post=4208"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/csirt.lacnic.net\/pt-br\/wp-json\/wp\/v2\/tags?post=4208"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}