{"id":101,"date":"2019-03-08T23:41:41","date_gmt":"2019-03-08T21:41:41","guid":{"rendered":"https:\/\/www.mozdomains.com\/blog\/en\/?p=101"},"modified":"2020-05-31T01:40:37","modified_gmt":"2020-05-30T23:40:37","slug":"what-is-an-ssdp-ddos-attack","status":"publish","type":"post","link":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/what-is-an-ssdp-ddos-attack\/","title":{"rendered":"What is an SSDP DDoS Attack?"},"content":{"rendered":"<p style=\"text-align: justify;\">A Simple Service Discovery Protocol (SSDP) attack is a reflection-based distributed denial-of-service (DDoS) attack that can exploit Universal Plug and Play (UPnP) networking protocols to send a huge amount of traffic to a targeted victim, overpowering the target\u2019s infrastructure and taking their web resource offline.<\/p>\n<p style=\"text-align: justify;\"><strong>How does an SSDP Attack Work?<\/strong><br \/>\nThe\u00a0<strong>SSDP protocol<\/strong>\u00a0is generally used to allow UPnP devices to broadcast their existence to other devices on the network. For instance, when a UPnP printer is linked to a network and it receives an IP address, the printer advertises its services to computers on the network by sending a message to a special IP address known as a multicast address. This multicast address is then responsible for telling all the computers on the network about the new printer. After receiving the discovery message, a computer makes a request to the printer to get a complete list of its services. The printer then responds directly back to the computer with that list. An SSDP attack exploits that final request for services by directing the device to respond to the targeted victim.<\/p>\n<p style=\"text-align: justify;\"><strong>Steps of a Typical SSDP DDoS Attack<\/strong><br \/>\nHere\u2019s what happens during a typical\u00a0<strong>SSDP<\/strong>\u00a0<a href=\"https:\/\/hackercombat.com\/critical-infrastructure-vulnerable-ddos-attacks\/?key5sk1=e17bcd271c605a3df3f393ac23346311fef25037\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">DDoS attack<\/a>:<\/p>\n<p style=\"text-align: justify;\">\u00a0\u00a0\u00a0 \u2022 The attacker performs a scan, looking for plug-and-play devices that can be used as amplification factors.<br \/>\n\u2022 As the attacker discovers networked devices, they develop a list of all the devices that respond.<br \/>\n\u2022 The attacker makes a UDP packet with the spoofed IP address of the target victim.<br \/>\n\u2022 The attacker uses a botnet to send a spoofed discovery packet to each plug-and-play device with a request for as much data as possible by setting specific flags, particularly ssdp:rootdevice or ssdp:all.<br \/>\n\u2022 Each device sends a reply to the targeted victim with data up to about 30 times larger than the attacker\u2019s request.<br \/>\n\u2022 The target receives a huge volume of traffic from all the devices and becomes overwhelmed, possibly resulting in\u00a0<strong>denial-of-service to legitimate traffic<\/strong>.<\/p>\n<p style=\"text-align: justify;\"><strong>Prevent SSDP DDoS Attacks Using Comodo cWatch<\/strong><br \/>\nComodo cWatch is a\u00a0<strong>Managed Security Service<\/strong>, ideal for websites and applications, that provides a Web Application Firewall (WAF) provisioned over a Secure Content Delivery Network (CDN). cWatch is fully managed from a Cyber Security Operation Center (CSOC) of always-available certified security analysts and is powered by a Security Information and Event Management (SIEM) system that can leverage data from more than 85 million endpoints in order to detect and mitigate threats even before they occur.<\/p>\n<p style=\"text-align: justify;\">Comodo cWatch also provides malware detection scanning, preventive methods, and removal services to enable organizations to proactively protect their business and brand reputation from infections and attacks. cWatch Web is available with a\u00a0<a href=\"https:\/\/cwatch.comodo.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">WAF<\/a>\u00a0capable of eliminating application vulnerabilities and protecting web applications and websites against advanced attacks including but not limited to DDoS, Cross-Site Scripting, and SQL Injection. Combined with services like vulnerability scanning, malware scanning, and automatic virtual patching and hardening engines, the Comodo WAF provides robust security that is completely managed for customers as part of the\u00a0<strong>Comodo cWatch Web solution<\/strong>.<\/p>\n<p style=\"text-align: justify;\"><strong>Key Features Offered by cWatch:<\/strong><\/p>\n<p style=\"text-align: justify;\">\u00a0\u00a0\u00a0 \u2022\u00a0<strong>Secure Content Delivery Network<\/strong>\u00a0(CDN): A global system of distributed servers to enhance the performance of web applications and websites<br \/>\n\u2022\u00a0<strong>Malware Monitoring and Remediation<\/strong>: Detects malware, provides the methods and tools to remove it, and prevents future malware attacks<br \/>\n\u2022\u00a0<strong>Cyber Security Operations Center<\/strong>\u00a0(CSOC): A team of always-on certified cybersecurity professionals providing 24x7x365 surveillance and remediation services<br \/>\n\u2022\u00a0<strong>Web Application Firewall\u00a0<\/strong>(WAF): Powerful, real-time edge protection for websites and web applications providing advanced security, filtering, and intrusion protection<br \/>\n\u2022\u00a0<strong>Security Information and Event Management<\/strong>\u00a0(SIEM): Advanced intelligence capable of leveraging current events and data from 85M+ endpoints and 100M+ domains<br \/>\n\u2022\u00a0<strong>PCI Scanning<\/strong>: Enables service providers and merchants to stay in compliance with PCI DSS<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A Simple Service Discovery Protocol (SSDP) attack is a reflection-based distributed denial-of-service (DDoS) attack that can exploit Universal Plug and Play (UPnP) networking protocols to send a huge amount of traffic to a targeted victim, overpowering the target\u2019s infrastructure and taking their web resource offline. How does an SSDP Attack Work? The\u00a0SSDP protocol\u00a0is generally used to allow UPnP devices to broadcast their existence to other devices on the network. For instance, when a UPnP printer is linked to a network and it receives an IP address, the printer advertises its services to computers on the network by sending a message\u2026<\/p>\n","protected":false},"author":3,"featured_media":105,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-101","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-website-security"],"blocksy_meta":{"styles_descriptor":{"styles":{"desktop":"","tablet":"","mobile":""},"google_fonts":[],"version":4}},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is an SSDP DDoS Attack? - MozDomains Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/what-is-an-ssdp-ddos-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is an SSDP DDoS Attack? - MozDomains Blog\" \/>\n<meta property=\"og:description\" content=\"A Simple Service Discovery Protocol (SSDP) attack is a reflection-based distributed denial-of-service (DDoS) attack that can exploit Universal Plug and Play (UPnP) networking protocols to send a huge amount of traffic to a targeted victim, overpowering the target\u2019s infrastructure and taking their web resource offline. How does an SSDP Attack Work? The\u00a0SSDP protocol\u00a0is generally used to allow UPnP devices to broadcast their existence to other devices on the network. For instance, when a UPnP printer is linked to a network and it receives an IP address, the printer advertises its services to computers on the network by sending a message\u2026\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/what-is-an-ssdp-ddos-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"MozDomains Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/hackermoz\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-08T21:41:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-30T23:40:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/uploads\/2019\/03\/ssdp-attack.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Momed Jussub\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Momed Jussub\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/what-is-an-ssdp-ddos-attack\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/what-is-an-ssdp-ddos-attack\\\/\"},\"author\":{\"name\":\"Momed Jussub\",\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/#\\\/schema\\\/person\\\/53ab8153fe48257d7e1210e28064b6e6\"},\"headline\":\"What is an SSDP DDoS Attack?\",\"datePublished\":\"2019-03-08T21:41:41+00:00\",\"dateModified\":\"2020-05-30T23:40:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/what-is-an-ssdp-ddos-attack\\\/\"},\"wordCount\":624,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/what-is-an-ssdp-ddos-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/ssdp-attack.png\",\"articleSection\":[\"Website Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/what-is-an-ssdp-ddos-attack\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/what-is-an-ssdp-ddos-attack\\\/\",\"url\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/what-is-an-ssdp-ddos-attack\\\/\",\"name\":\"What is an SSDP DDoS Attack? - MozDomains Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/what-is-an-ssdp-ddos-attack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/what-is-an-ssdp-ddos-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/ssdp-attack.png\",\"datePublished\":\"2019-03-08T21:41:41+00:00\",\"dateModified\":\"2020-05-30T23:40:37+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/what-is-an-ssdp-ddos-attack\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/what-is-an-ssdp-ddos-attack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/what-is-an-ssdp-ddos-attack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/ssdp-attack.png\",\"contentUrl\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/ssdp-attack.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/what-is-an-ssdp-ddos-attack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is an SSDP DDoS Attack?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/\",\"name\":\"MozDomains Blog\",\"description\":\"Tutorials and Tips\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/#organization\",\"name\":\"MozDomains Blog\",\"url\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/mozdomains-logo.svg\",\"contentUrl\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/mozdomains-logo.svg\",\"caption\":\"MozDomains Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/#\\\/schema\\\/person\\\/53ab8153fe48257d7e1210e28064b6e6\",\"name\":\"Momed Jussub\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/wp-content\\\/litespeed\\\/avatar\\\/28674fdd1e00d7f5f874e31e914df50c.jpg?ver=1775811367\",\"url\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/wp-content\\\/litespeed\\\/avatar\\\/28674fdd1e00d7f5f874e31e914df50c.jpg?ver=1775811367\",\"contentUrl\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/wp-content\\\/litespeed\\\/avatar\\\/28674fdd1e00d7f5f874e31e914df50c.jpg?ver=1775811367\",\"caption\":\"Momed Jussub\"},\"description\":\"Network Engineer (Cisco, Mikrotik, Juniper, Huawei, Ubiquiti, Fortigate, pfSense, Palo Alto), CCTV Engineer, IPTV Engineer, Virtualization Specialist OpenVZ, XEN, KVM and HyperV, Optical Fiber Network Specialist, System Administrator Windows \\\/Linux, PenTester, Full Stack Developer (HTML, CSS3, PHP, C # Desktop App, C # ASP.NET, MySQL, MSSQL) and Writer.\",\"sameAs\":[\"https:\\\/\\\/www.mozdomains.com\",\"https:\\\/\\\/www.facebook.com\\\/hackermoz\\\/\",\"http:\\\/\\\/instagram.com\\\/momedjussub\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/momedjussub\"],\"url\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/author\\\/momed-jussub\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is an SSDP DDoS Attack? - MozDomains Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/what-is-an-ssdp-ddos-attack\/","og_locale":"en_US","og_type":"article","og_title":"What is an SSDP DDoS Attack? - MozDomains Blog","og_description":"A Simple Service Discovery Protocol (SSDP) attack is a reflection-based distributed denial-of-service (DDoS) attack that can exploit Universal Plug and Play (UPnP) networking protocols to send a huge amount of traffic to a targeted victim, overpowering the target\u2019s infrastructure and taking their web resource offline. How does an SSDP Attack Work? The\u00a0SSDP protocol\u00a0is generally used to allow UPnP devices to broadcast their existence to other devices on the network. For instance, when a UPnP printer is linked to a network and it receives an IP address, the printer advertises its services to computers on the network by sending a message\u2026","og_url":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/what-is-an-ssdp-ddos-attack\/","og_site_name":"MozDomains Blog","article_author":"https:\/\/www.facebook.com\/hackermoz\/","article_published_time":"2019-03-08T21:41:41+00:00","article_modified_time":"2020-05-30T23:40:37+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/uploads\/2019\/03\/ssdp-attack.png","type":"image\/png"}],"author":"Momed Jussub","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Momed Jussub","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/what-is-an-ssdp-ddos-attack\/#article","isPartOf":{"@id":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/what-is-an-ssdp-ddos-attack\/"},"author":{"name":"Momed Jussub","@id":"https:\/\/www.mozdomains.com\/blog\/en\/#\/schema\/person\/53ab8153fe48257d7e1210e28064b6e6"},"headline":"What is an SSDP DDoS Attack?","datePublished":"2019-03-08T21:41:41+00:00","dateModified":"2020-05-30T23:40:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/what-is-an-ssdp-ddos-attack\/"},"wordCount":624,"commentCount":0,"publisher":{"@id":"https:\/\/www.mozdomains.com\/blog\/en\/#organization"},"image":{"@id":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/what-is-an-ssdp-ddos-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/uploads\/2019\/03\/ssdp-attack.png","articleSection":["Website Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.mozdomains.com\/blog\/en\/website-security\/what-is-an-ssdp-ddos-attack\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/what-is-an-ssdp-ddos-attack\/","url":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/what-is-an-ssdp-ddos-attack\/","name":"What is an SSDP DDoS Attack? - MozDomains Blog","isPartOf":{"@id":"https:\/\/www.mozdomains.com\/blog\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/what-is-an-ssdp-ddos-attack\/#primaryimage"},"image":{"@id":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/what-is-an-ssdp-ddos-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/uploads\/2019\/03\/ssdp-attack.png","datePublished":"2019-03-08T21:41:41+00:00","dateModified":"2020-05-30T23:40:37+00:00","breadcrumb":{"@id":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/what-is-an-ssdp-ddos-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mozdomains.com\/blog\/en\/website-security\/what-is-an-ssdp-ddos-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/what-is-an-ssdp-ddos-attack\/#primaryimage","url":"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/uploads\/2019\/03\/ssdp-attack.png","contentUrl":"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/uploads\/2019\/03\/ssdp-attack.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/what-is-an-ssdp-ddos-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.mozdomains.com\/blog\/en\/"},{"@type":"ListItem","position":2,"name":"What is an SSDP DDoS Attack?"}]},{"@type":"WebSite","@id":"https:\/\/www.mozdomains.com\/blog\/en\/#website","url":"https:\/\/www.mozdomains.com\/blog\/en\/","name":"MozDomains Blog","description":"Tutorials and Tips","publisher":{"@id":"https:\/\/www.mozdomains.com\/blog\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mozdomains.com\/blog\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mozdomains.com\/blog\/en\/#organization","name":"MozDomains Blog","url":"https:\/\/www.mozdomains.com\/blog\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mozdomains.com\/blog\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/uploads\/2021\/05\/mozdomains-logo.svg","contentUrl":"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/uploads\/2021\/05\/mozdomains-logo.svg","caption":"MozDomains Blog"},"image":{"@id":"https:\/\/www.mozdomains.com\/blog\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.mozdomains.com\/blog\/en\/#\/schema\/person\/53ab8153fe48257d7e1210e28064b6e6","name":"Momed Jussub","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/litespeed\/avatar\/28674fdd1e00d7f5f874e31e914df50c.jpg?ver=1775811367","url":"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/litespeed\/avatar\/28674fdd1e00d7f5f874e31e914df50c.jpg?ver=1775811367","contentUrl":"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/litespeed\/avatar\/28674fdd1e00d7f5f874e31e914df50c.jpg?ver=1775811367","caption":"Momed Jussub"},"description":"Network Engineer (Cisco, Mikrotik, Juniper, Huawei, Ubiquiti, Fortigate, pfSense, Palo Alto), CCTV Engineer, IPTV Engineer, Virtualization Specialist OpenVZ, XEN, KVM and HyperV, Optical Fiber Network Specialist, System Administrator Windows \/Linux, PenTester, Full Stack Developer (HTML, CSS3, PHP, C # Desktop App, C # ASP.NET, MySQL, MSSQL) and Writer.","sameAs":["https:\/\/www.mozdomains.com","https:\/\/www.facebook.com\/hackermoz\/","http:\/\/instagram.com\/momedjussub","https:\/\/www.linkedin.com\/in\/momedjussub"],"url":"https:\/\/www.mozdomains.com\/blog\/en\/author\/momed-jussub\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mozdomains.com\/blog\/en\/wp-json\/wp\/v2\/posts\/101","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mozdomains.com\/blog\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mozdomains.com\/blog\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mozdomains.com\/blog\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mozdomains.com\/blog\/en\/wp-json\/wp\/v2\/comments?post=101"}],"version-history":[{"count":0,"href":"https:\/\/www.mozdomains.com\/blog\/en\/wp-json\/wp\/v2\/posts\/101\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mozdomains.com\/blog\/en\/wp-json\/wp\/v2\/media\/105"}],"wp:attachment":[{"href":"https:\/\/www.mozdomains.com\/blog\/en\/wp-json\/wp\/v2\/media?parent=101"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mozdomains.com\/blog\/en\/wp-json\/wp\/v2\/categories?post=101"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mozdomains.com\/blog\/en\/wp-json\/wp\/v2\/tags?post=101"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}