{"id":3194,"date":"2025-02-04T16:24:34","date_gmt":"2025-02-04T15:24:34","guid":{"rendered":"https:\/\/enthec.com\/?p=3194"},"modified":"2025-02-04T16:28:21","modified_gmt":"2025-02-04T15:28:21","slug":"drdos-main-features-and-operation","status":"publish","type":"post","link":"https:\/\/enthec.com\/en\/drdos-main-features-and-operation\/","title":{"rendered":"DrDoS: main features and operation"},"content":{"rendered":"<p>Distributed Denial of Service (DDoS) attacks are a constant threat in the digital world. The <strong>Distributed Reflection DDoS (DrDoS) attack<\/strong> is an exceptionally sophisticated variant.<\/p>\n<p>In this article, we will <strong>explain in detail a DrDoS attack, its main characteristics, and how it works<\/strong> since there are many occasions when an attacker exploits a system&#8217;s vulnerabilities and compromises some services. In addition, we will tell you how to protect yourself against these attacks through <a href=\"https:\/\/enthec.com\/en\/\">Enthec.<\/a><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/enthec.com\/en\/contact\/\"><img decoding=\"async\" class=\"alignnone size-full wp-image-3072\" src=\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/01\/ENG-Banner-WEB.jpg\" alt=\"\" width=\"1000\" height=\"200\" srcset=\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/01\/ENG-Banner-WEB.jpg 1000w, https:\/\/enthec.com\/wp-content\/uploads\/2025\/01\/ENG-Banner-WEB-300x60.jpg 300w, https:\/\/enthec.com\/wp-content\/uploads\/2025\/01\/ENG-Banner-WEB-768x154.jpg 768w, https:\/\/enthec.com\/wp-content\/uploads\/2025\/01\/ENG-Banner-WEB-350x70.jpg 350w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h2>What is a DrDoS attack?<\/h2>\n<p>A DrDoS attack is a form of DDoS attack that relies on<strong> mirroring and amplification. <\/strong>Instead of directly attacking the victim, the attacker sends requests to intermediary (mirror) servers, which, in turn, respond to the victim with amplified responses<\/p>\n<p>In this way, it is possible to <strong>overload the victim&#8217;s resources<\/strong>, causing interruptions in their services.<\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"size-full wp-image-3188 aligncenter\" src=\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/02\/ataque-drdos.jpg\" alt=\"DrDoS Attack\" width=\"602\" height=\"401\" srcset=\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/02\/ataque-drdos.jpg 602w, https:\/\/enthec.com\/wp-content\/uploads\/2025\/02\/ataque-drdos-300x200.jpg 300w, https:\/\/enthec.com\/wp-content\/uploads\/2025\/02\/ataque-drdos-350x233.jpg 350w\" sizes=\"(max-width: 602px) 100vw, 602px\" \/><\/p>\n<p>&nbsp;<\/p>\n<h2>Main characteristics of DrDoS attacks<\/h2>\n<p>Among the main characteristics of DrDos attacks, we highlight the following:<\/p>\n<ol>\n<li><strong>Reflection<\/strong>. The attacker sends requests to legitimate servers but spoofs the source IP address to make it look like they&#8217;re coming from the victim. Upon receiving the request, these servers send the response directly to the victim, unaware that they are participating in an attack.<\/li>\n<li><strong>Amplification.<\/strong> Attackers leverage protocols that generate more significant responses than the original requests. This means that a small request can trigger a much larger response, thus amplifying the volume of traffic directed at the victim.<\/li>\n<li><strong>Difficulty of tracing.<\/strong> Because the responses come from legitimate servers, it is more difficult for the victim to identify and block the actual source of the attack.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<h2>How a DrDoS attack works<\/h2>\n<p>The <strong>process of a DrDoS attack<\/strong> can be broken down into the following steps:<\/p>\n<ol>\n<li><strong>Selection of mirror servers. <\/strong>The attacker identifies servers that respond to requests from specific protocols that allow amplification. These servers act as unwitting intermediaries in the attack.<\/li>\n<li><strong>Spoofing the IP address.<\/strong> The attacker sends requests to these servers but spoofs the source IP address to make it look like they are coming from the victim. Servers used in DrDoS attacks can have their IP reputation compromised, which can lead to blacklisted blocks, affecting their legitimate communication on the internet.<\/li>\n<li><strong>Amplified request submission.<\/strong> Requests are designed to take advantage of the protocol&#8217;s amplification feature so that the server&#8217;s response is much larger than the original request<\/li>\n<li><strong>Saturation of the victim<\/strong>. Mirror servers send the amplified responses to the spoofed IP address (the victim), flooding their bandwidth and resources, which can lead to disruption of their services<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<h2>Protocols commonly used in DrDoS attacks<\/h2>\n<p>Attackers often leverage <strong>protocols that allow for high amplification.<\/strong> Some of the most common include:<\/p>\n<ul>\n<li><strong>DNS (Domain Name System). <\/strong>Through specific queries, a small request can generate a much larger response. Not only are misconfigured DNS servers vulnerable to DrDoS attacks, but they can also facilitate phishing campaigns and malicious redirects.<\/li>\n<li><strong>NTP (Network Time Protocol).<\/strong> By sending a &#8220;monlist&#8221; request, a list of the last IP addresses connected to the server can be received, resulting in an amplified response.<\/li>\n<li><strong>Memcached.<\/strong> Although not a network protocol, exposed Memcached servers can amplify traffic, as a small request can generate a massive response.<\/li>\n<li><strong>SSDP (Simple Service Discovery Protocol).<\/strong> Used by IoT devices and routers, it allows attackers to send minimal requests and receive huge responses.<\/li>\n<li><strong>SNMP (Simple Network Management Protocol)<\/strong>. Often misconfigured, this protocol allows queries that return large volumes of information, amplifying traffic.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2>Impact of DrDoS attacks<\/h2>\n<p>The impact of a DrDoS attack can be <strong>devastating,<\/strong> both for the direct victim and for the unwitting mirroring servers:<\/p>\n<ul>\n<li><strong>Service disruption:<\/strong> Businesses, online services, and platforms may be inaccessible during the attack.<\/li>\n<li><strong>Economic losses<\/strong>: A prolonged attack can affect sales, advertising, and online transactions.<\/li>\n<li><strong>Reputational damage:<\/strong> customers and users can lose trust in an affected company or service.<\/li>\n<li><strong>Use of third-party resources: <\/strong>Mirror servers can suffer from performance issues and even be held liable for their vulnerable configuration.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2>Protective measures against DrDoS attacks<\/h2>\n<p>Protecting against DrDoS attacks requires a <strong>combination of best practices and technological solutions:<\/strong><\/p>\n<ol>\n<li><strong>Secure server configuration. <\/strong>Ensure that servers do not respond to requests from untrusted sources and limit responses to legitimate requests. In addition, it is essential to apply correct <a href=\"https:\/\/enthec.com\/en\/guidance-on-cyber-security-patch-management\/\">security patch management <\/a>and update vulnerable protocols regularly, since attackers can use outdated versions to perform amplification attacks.<\/li>\n<li><strong>Traffic filtering.<\/strong> Implement systems that detect and filter malicious traffic, especially from spoofed IP addresses.<\/li>\n<li><strong>Continuous monitoring<\/strong>. Constantly monitor network traffic for unusual patterns that may indicate an attack in progress.<\/li>\n<li><strong>Use of threat exposure management solutions. <\/strong>Specialized tools can help identify and mitigate threats before they cause harm.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<h2>Enthec Solutions for Continuous Threat Exposure Management<\/h2>\n<p><strong>Tools that allow for constant and proactive vigilance<\/strong> are essential in today&#8217;s cybersecurity landscape. Digital threats can be classified into categories based on their impact on the network, data, and business systems. From attacks on infrastructure, such as DrDoS, to data breaches and <a href=\"https:\/\/enthec.com\/en\/?p=3009\">IP reputation <\/a>threats, each type of risk requires a specific security approach.<\/p>\n<p>To address this challenge, Enthec offers <a href=\"https:\/\/enthec.com\/en\/kartos\/\">Kartos,<\/a> an advanced monitoring solution that classifies threats into distinct categories and enables companies <strong>to identify and mitigate risks proactively.<\/strong><\/p>\n<p>Designed for enterprises, it is an <strong>automated, non-intrusive, and continuous monitoring too<\/strong>l that provides data and alerts on open and exposed vulnerabilities in real-time by simply adding the company&#8217;s domain to be monitored.<\/p>\n<p>This solution falls under <strong>Continuous Threat Exposure Management (CTEM)<\/strong>, providing an additional layer of security by identifying and mitigating risks before they become real problems.<\/p>\n<p>DrDoS attacks pose a <strong>significant threat in today&#8217;s digital environment<\/strong>. Understanding how they work and feature is the first step to implementing effective protection measures.<\/p>\n<p>In addition, having specialized solutions such as the one offered by Enthec can <strong>make all the difference in proactively defending against these and other cyber threats.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Distributed Denial of Service (DDoS) attacks are a constant threat in the digital world. The Distributed Reflection DDoS (DrDoS) attack [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":3191,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[44],"tags":[24,32,33],"class_list":["post-3194","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-en","tag-cybersecurity","tag-kartos-en","tag-risks"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u25b7 DrDoS: How to Avoid This Cyberattack | Enthec<\/title>\n<meta name=\"description\" content=\"DrDoS is a Reflex DDoS Attack That Can Bring Systems Down \u27a1\ufe0f Learn how it works and what measures to use to prevent it\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/enthec.com\/en\/drdos-main-features-and-operation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u25b7 DrDoS: How to Avoid This Cyberattack | Enthec\" \/>\n<meta property=\"og:description\" content=\"DrDoS is a Reflex DDoS Attack That Can Bring Systems Down \u27a1\ufe0f Learn how it works and what measures to use to prevent it\" \/>\n<meta property=\"og:url\" content=\"https:\/\/enthec.com\/en\/drdos-main-features-and-operation\/\" \/>\n<meta property=\"og:site_name\" content=\"ENTHEC \u00b7 Kartos \u00b7 Qondar\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-04T15:24:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-04T15:28:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/02\/drdos-ciberataque-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1738\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Enthec\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Enthec\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/enthec.com\/en\/drdos-main-features-and-operation\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/enthec.com\/en\/drdos-main-features-and-operation\/\"},\"author\":{\"name\":\"Enthec\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1\"},\"headline\":\"DrDoS: main features and operation\",\"datePublished\":\"2025-02-04T15:24:34+00:00\",\"dateModified\":\"2025-02-04T15:28:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/enthec.com\/en\/drdos-main-features-and-operation\/\"},\"wordCount\":974,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/enthec.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/en\/drdos-main-features-and-operation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/02\/drdos-ciberataque-scaled.jpg\",\"keywords\":[\"Cybersecurity\",\"Kartos\",\"Risks\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/enthec.com\/en\/drdos-main-features-and-operation\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/enthec.com\/en\/drdos-main-features-and-operation\/\",\"url\":\"https:\/\/enthec.com\/en\/drdos-main-features-and-operation\/\",\"name\":\"\u25b7 DrDoS: How to Avoid This Cyberattack | Enthec\",\"isPartOf\":{\"@id\":\"https:\/\/enthec.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/enthec.com\/en\/drdos-main-features-and-operation\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/en\/drdos-main-features-and-operation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/02\/drdos-ciberataque-scaled.jpg\",\"datePublished\":\"2025-02-04T15:24:34+00:00\",\"dateModified\":\"2025-02-04T15:28:21+00:00\",\"description\":\"DrDoS is a Reflex DDoS Attack That Can Bring Systems Down \u27a1\ufe0f Learn how it works and what measures to use to prevent it\",\"breadcrumb\":{\"@id\":\"https:\/\/enthec.com\/en\/drdos-main-features-and-operation\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/enthec.com\/en\/drdos-main-features-and-operation\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enthec.com\/en\/drdos-main-features-and-operation\/#primaryimage\",\"url\":\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/02\/drdos-ciberataque-scaled.jpg\",\"contentUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/02\/drdos-ciberataque-scaled.jpg\",\"width\":2560,\"height\":1738,\"caption\":\"Error Alert Failure Icon Problem Concept\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/enthec.com\/en\/drdos-main-features-and-operation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/enthec.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DrDoS: main features and operation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/enthec.com\/#website\",\"url\":\"https:\/\/enthec.com\/\",\"name\":\"ENTHEC\",\"description\":\"Advanced AI-driven Cyber-Surveillance Platform\",\"publisher\":{\"@id\":\"https:\/\/enthec.com\/#organization\"},\"alternateName\":\"ENTHEC \u00b7 Kartos \u00b7 Qondar\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/enthec.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/enthec.com\/#organization\",\"name\":\"ENTHEC\",\"alternateName\":\"ENTHEC \u00b7 Kartos \u00b7 Qondar\",\"url\":\"https:\/\/enthec.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png\",\"contentUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png\",\"width\":667,\"height\":131,\"caption\":\"ENTHEC\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1\",\"name\":\"Enthec\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g\",\"caption\":\"Enthec\"},\"url\":\"https:\/\/enthec.com\/en\/author\/enthec\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u25b7 DrDoS: How to Avoid This Cyberattack | Enthec","description":"DrDoS is a Reflex DDoS Attack That Can Bring Systems Down \u27a1\ufe0f Learn how it works and what measures to use to prevent it","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/enthec.com\/en\/drdos-main-features-and-operation\/","og_locale":"en_US","og_type":"article","og_title":"\u25b7 DrDoS: How to Avoid This Cyberattack | Enthec","og_description":"DrDoS is a Reflex DDoS Attack That Can Bring Systems Down \u27a1\ufe0f Learn how it works and what measures to use to prevent it","og_url":"https:\/\/enthec.com\/en\/drdos-main-features-and-operation\/","og_site_name":"ENTHEC \u00b7 Kartos \u00b7 Qondar","article_published_time":"2025-02-04T15:24:34+00:00","article_modified_time":"2025-02-04T15:28:21+00:00","og_image":[{"width":2560,"height":1738,"url":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/02\/drdos-ciberataque-scaled.jpg","type":"image\/jpeg"}],"author":"Enthec","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Enthec","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/enthec.com\/en\/drdos-main-features-and-operation\/#article","isPartOf":{"@id":"https:\/\/enthec.com\/en\/drdos-main-features-and-operation\/"},"author":{"name":"Enthec","@id":"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1"},"headline":"DrDoS: main features and operation","datePublished":"2025-02-04T15:24:34+00:00","dateModified":"2025-02-04T15:28:21+00:00","mainEntityOfPage":{"@id":"https:\/\/enthec.com\/en\/drdos-main-features-and-operation\/"},"wordCount":974,"commentCount":0,"publisher":{"@id":"https:\/\/enthec.com\/#organization"},"image":{"@id":"https:\/\/enthec.com\/en\/drdos-main-features-and-operation\/#primaryimage"},"thumbnailUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/02\/drdos-ciberataque-scaled.jpg","keywords":["Cybersecurity","Kartos","Risks"],"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/enthec.com\/en\/drdos-main-features-and-operation\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/enthec.com\/en\/drdos-main-features-and-operation\/","url":"https:\/\/enthec.com\/en\/drdos-main-features-and-operation\/","name":"\u25b7 DrDoS: How to Avoid This Cyberattack | Enthec","isPartOf":{"@id":"https:\/\/enthec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/enthec.com\/en\/drdos-main-features-and-operation\/#primaryimage"},"image":{"@id":"https:\/\/enthec.com\/en\/drdos-main-features-and-operation\/#primaryimage"},"thumbnailUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/02\/drdos-ciberataque-scaled.jpg","datePublished":"2025-02-04T15:24:34+00:00","dateModified":"2025-02-04T15:28:21+00:00","description":"DrDoS is a Reflex DDoS Attack That Can Bring Systems Down \u27a1\ufe0f Learn how it works and what measures to use to prevent it","breadcrumb":{"@id":"https:\/\/enthec.com\/en\/drdos-main-features-and-operation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/enthec.com\/en\/drdos-main-features-and-operation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enthec.com\/en\/drdos-main-features-and-operation\/#primaryimage","url":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/02\/drdos-ciberataque-scaled.jpg","contentUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/02\/drdos-ciberataque-scaled.jpg","width":2560,"height":1738,"caption":"Error Alert Failure Icon Problem Concept"},{"@type":"BreadcrumbList","@id":"https:\/\/enthec.com\/en\/drdos-main-features-and-operation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/enthec.com\/en\/"},{"@type":"ListItem","position":2,"name":"DrDoS: main features and operation"}]},{"@type":"WebSite","@id":"https:\/\/enthec.com\/#website","url":"https:\/\/enthec.com\/","name":"ENTHEC","description":"Advanced AI-driven Cyber-Surveillance Platform","publisher":{"@id":"https:\/\/enthec.com\/#organization"},"alternateName":"ENTHEC \u00b7 Kartos \u00b7 Qondar","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/enthec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/enthec.com\/#organization","name":"ENTHEC","alternateName":"ENTHEC \u00b7 Kartos \u00b7 Qondar","url":"https:\/\/enthec.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enthec.com\/#\/schema\/logo\/image\/","url":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png","contentUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png","width":667,"height":131,"caption":"ENTHEC"},"image":{"@id":"https:\/\/enthec.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1","name":"Enthec","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g","caption":"Enthec"},"url":"https:\/\/enthec.com\/en\/author\/enthec\/"}]}},"_links":{"self":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts\/3194","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/comments?post=3194"}],"version-history":[{"count":0,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts\/3194\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/media\/3191"}],"wp:attachment":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/media?parent=3194"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/categories?post=3194"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/tags?post=3194"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}