{"id":979,"date":"2022-11-13T01:14:57","date_gmt":"2022-11-13T00:14:57","guid":{"rendered":"https:\/\/infosec4you.net\/?page_id=979"},"modified":"2024-10-19T12:12:39","modified_gmt":"2024-10-19T10:12:39","slug":"5phasesofhack","status":"publish","type":"page","link":"https:\/\/infosec4you.net\/?page_id=979","title":{"rendered":"5 Phases Of Attack"},"content":{"rendered":"<style>.kb-row-layout-wrap.wp-block-kadence-rowlayout.kb-row-layout-id979_0df918-3f{margin-top:-32px;}.kb-row-layout-id979_0df918-3f > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id979_0df918-3f > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id979_0df918-3f > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);padding-top:25px;padding-bottom:47px;grid-template-columns:minmax(0, 1fr);}.kb-row-layout-id979_0df918-3f{background-image:url('https:\/\/infosec4you.net\/wp-content\/uploads\/2022\/11\/anirudh-Xu4Pz7GI9JY-unsplash-scaled.jpg');background-size:cover;background-position:46% 66%;background-attachment:scroll;background-repeat:no-repeat;}.kb-row-layout-id979_0df918-3f > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id979_0df918-3f > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}@media all and (max-width: 767px){.kb-row-layout-id979_0df918-3f > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id979_0df918-3f alignfull kt-row-has-bg wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-1-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top\">\n<style>.kadence-column979_edee35-e0 > .kt-inside-inner-col,.kadence-column979_edee35-e0 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column979_edee35-e0 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column979_edee35-e0 > .kt-inside-inner-col{flex-direction:column;}.kadence-column979_edee35-e0 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column979_edee35-e0 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column979_edee35-e0{position:relative;}@media all and (max-width: 1024px){.kadence-column979_edee35-e0 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column979_edee35-e0 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column979_edee35-e0 inner-column-1\"><div class=\"kt-inside-inner-col\"><style>.wp-block-kadence-advancedheading.kt-adv-heading979_1e3749-19, .wp-block-kadence-advancedheading.kt-adv-heading979_1e3749-19[data-kb-block=\"kb-adv-heading979_1e3749-19\"]{text-align:center;font-size:2.4em;line-height:1.3em;font-weight:800;font-style:normal;font-family:Montserrat;}.wp-block-kadence-advancedheading.kt-adv-heading979_1e3749-19 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading979_1e3749-19[data-kb-block=\"kb-adv-heading979_1e3749-19\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading979_1e3749-19 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading979_1e3749-19[data-kb-block=\"kb-adv-heading979_1e3749-19\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading979_1e3749-19 wp-block-kadence-advancedheading has-theme-palette-9-color has-text-color\" data-kb-block=\"kb-adv-heading979_1e3749-19\">5 Phases d&rsquo;une cyber attaque <\/h2>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading979_629d44-7a, .wp-block-kadence-advancedheading.kt-adv-heading979_629d44-7a[data-kb-block=\"kb-adv-heading979_629d44-7a\"]{font-size:1.6em;line-height:1em;font-weight:200;font-style:normal;font-family:Montserrat;}.wp-block-kadence-advancedheading.kt-adv-heading979_629d44-7a mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading979_629d44-7a[data-kb-block=\"kb-adv-heading979_629d44-7a\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading979_629d44-7a img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading979_629d44-7a[data-kb-block=\"kb-adv-heading979_629d44-7a\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h4 class=\"kt-adv-heading979_629d44-7a wp-block-kadence-advancedheading has-theme-palette-9-color has-text-color\" data-kb-block=\"kb-adv-heading979_629d44-7a\"><strong>Que se passe-t-il \u00e0 chaque phase d&rsquo;une cyberattaque ?<\/strong><\/h4>\n\n\n\n<p class=\"has-theme-palette-9-color has-text-color has-medium-font-size\">La cybers\u00e9curit\u00e9 commence par la compr\u00e9hension des risques et des menaces. Il est essentiel de conna\u00eetre vos adversaires, leurs objectifs, et leurs m\u00e9thodes d&rsquo;attaque pour mieux vous prot\u00e9ger.<\/p>\n<\/div><\/div>\n\n<\/div><\/div>\n\n<style>.kb-row-layout-id979_f53e4a-45 > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id979_f53e4a-45 > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id979_f53e4a-45 > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);padding-top:25px;padding-bottom:20px;grid-template-columns:minmax(0, calc(25% - ((var(--global-kb-gap-md, 2rem) * 1 )\/2)))minmax(0, calc(75% - ((var(--global-kb-gap-md, 2rem) * 1 )\/2)));}.kb-row-layout-id979_f53e4a-45 > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id979_f53e4a-45 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr) minmax(0, 2fr);}}@media all and (max-width: 767px){.kb-row-layout-id979_f53e4a-45 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id979_f53e4a-45 alignnone wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-2-columns kt-row-layout-right-golden kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top\">\n<style>.kadence-column979_186373-58 > .kt-inside-inner-col,.kadence-column979_186373-58 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column979_186373-58 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column979_186373-58 > .kt-inside-inner-col{flex-direction:column;}.kadence-column979_186373-58 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column979_186373-58 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column979_186373-58{position:relative;}@media all and (max-width: 1024px){.kadence-column979_186373-58 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column979_186373-58 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column979_186373-58 inner-column-1\"><div class=\"kt-inside-inner-col\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"340\" height=\"230\" src=\"https:\/\/infosec4you.net\/wp-content\/uploads\/2022\/12\/forensic.png\" alt=\"\" class=\"wp-image-1595\" srcset=\"https:\/\/infosec4you.net\/wp-content\/uploads\/2022\/12\/forensic.png 340w, https:\/\/infosec4you.net\/wp-content\/uploads\/2022\/12\/forensic-300x203.png 300w\" sizes=\"auto, (max-width: 340px) 100vw, 340px\" \/><\/figure>\n<\/div><\/div>\n\n\n<style>.kadence-column979_3798af-22 > .kt-inside-inner-col,.kadence-column979_3798af-22 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column979_3798af-22 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column979_3798af-22 > .kt-inside-inner-col{flex-direction:column;}.kadence-column979_3798af-22 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column979_3798af-22 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column979_3798af-22{position:relative;}@media all and (max-width: 1024px){.kadence-column979_3798af-22 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column979_3798af-22 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column979_3798af-22 inner-column-2\"><div class=\"kt-inside-inner-col\"><style>.wp-block-kadence-advancedheading.kt-adv-heading979_8a7e91-f1, .wp-block-kadence-advancedheading.kt-adv-heading979_8a7e91-f1[data-kb-block=\"kb-adv-heading979_8a7e91-f1\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading979_8a7e91-f1 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading979_8a7e91-f1[data-kb-block=\"kb-adv-heading979_8a7e91-f1\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading979_8a7e91-f1 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading979_8a7e91-f1[data-kb-block=\"kb-adv-heading979_8a7e91-f1\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading979_8a7e91-f1 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading979_8a7e91-f1\">Phase 1 : Collecte d&rsquo;informations (Reconnaissance)<\/h2>\n\n\n\n<p class=\"has-medium-font-size\">L&rsquo;objectif principal du pirate est d&rsquo;identifier des cibles potentielles qui lui permettront d&rsquo;acc\u00e9der \u00e0 des informations sensibles ou de nuire \u00e0 votre activit\u00e9.<\/p>\n\n\n\n<p>La phase de reconnaissance vise \u00e0 recueillir des informations brutes sur une cible, qu&rsquo;il s&rsquo;agisse d&rsquo;une entreprise ou d&rsquo;une personne, pour constituer un inventaire essentiel \u00e0 la pr\u00e9paration d&rsquo;une cyberattaque.<\/p>\n\n\n\n<p>La collecte <strong>passive <\/strong>ne sollicite pas directement le syst\u00e8me cible et s&rsquo;appuie sur des moteurs de recherche, des bases de donn\u00e9es, des r\u00e9seaux sociaux, pour obtenir des informations sur les partenaires, projets en cours, employ\u00e9s, etc. En revanche, la reconnaissance <strong>active<\/strong>, plus intrusive, utilise des outils sp\u00e9cifiques pour identifier les services, adresses IP, syst\u00e8mes d\u2019exploitation, et versions logicielles. Cette \u00e9tape cruciale permet de cartographier le r\u00e9seau du syst\u00e8me d\u2019information et de maximiser les chances de r\u00e9ussite de l\u2019intrusion.<\/p>\n<\/div><\/div>\n\n<\/div><\/div>\n\n<style>.kb-row-layout-id979_53fd02-6e > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id979_53fd02-6e > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id979_53fd02-6e > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);padding-top:25px;padding-bottom:20px;grid-template-columns:minmax(0, calc(25% - ((var(--global-kb-gap-md, 2rem) * 1 )\/2)))minmax(0, calc(75% - ((var(--global-kb-gap-md, 2rem) * 1 )\/2)));}.kb-row-layout-id979_53fd02-6e > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id979_53fd02-6e > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr) minmax(0, 2fr);}}@media all and (max-width: 767px){.kb-row-layout-id979_53fd02-6e > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id979_53fd02-6e alignnone wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-2-columns kt-row-layout-right-golden kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top\">\n<style>.kadence-column979_538473-a8 > .kt-inside-inner-col,.kadence-column979_538473-a8 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column979_538473-a8 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column979_538473-a8 > .kt-inside-inner-col{flex-direction:column;}.kadence-column979_538473-a8 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column979_538473-a8 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column979_538473-a8{position:relative;}@media all and (max-width: 1024px){.kadence-column979_538473-a8 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column979_538473-a8 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column979_538473-a8 inner-column-1\"><div class=\"kt-inside-inner-col\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"340\" height=\"230\" src=\"https:\/\/infosec4you.net\/wp-content\/uploads\/2022\/12\/vul22.png\" alt=\"\" class=\"wp-image-1599\" srcset=\"https:\/\/infosec4you.net\/wp-content\/uploads\/2022\/12\/vul22.png 340w, https:\/\/infosec4you.net\/wp-content\/uploads\/2022\/12\/vul22-300x203.png 300w\" sizes=\"auto, (max-width: 340px) 100vw, 340px\" \/><\/figure>\n<\/div><\/div>\n\n\n<style>.kadence-column979_ebe55a-be > .kt-inside-inner-col,.kadence-column979_ebe55a-be > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column979_ebe55a-be > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column979_ebe55a-be > .kt-inside-inner-col{flex-direction:column;}.kadence-column979_ebe55a-be > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column979_ebe55a-be > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column979_ebe55a-be{position:relative;}@media all and (max-width: 1024px){.kadence-column979_ebe55a-be > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column979_ebe55a-be > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column979_ebe55a-be inner-column-2\"><div class=\"kt-inside-inner-col\"><style>.wp-block-kadence-advancedheading.kt-adv-heading979_4a1e13-b3, .wp-block-kadence-advancedheading.kt-adv-heading979_4a1e13-b3[data-kb-block=\"kb-adv-heading979_4a1e13-b3\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading979_4a1e13-b3 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading979_4a1e13-b3[data-kb-block=\"kb-adv-heading979_4a1e13-b3\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading979_4a1e13-b3 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading979_4a1e13-b3[data-kb-block=\"kb-adv-heading979_4a1e13-b3\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading979_4a1e13-b3 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading979_4a1e13-b3\">Phase 2 : Identification des vuln\u00e9rabilit\u00e9s (Scanning)<\/h2>\n\n\n\n<p class=\"has-medium-font-size\">Une vuln\u00e9rabilit\u00e9 est une faille ou une faiblesse dans un syst\u00e8me qui, si elle est exploit\u00e9e, peut compromettre la confidentialit\u00e9, l&rsquo;int\u00e9grit\u00e9 ou la disponibilit\u00e9 des donn\u00e9es. Ces failles offrent aux attaquants une porte d&rsquo;entr\u00e9e pour acc\u00e9der \u00e0 des informations sensibles ou perturber le fonctionnement du syst\u00e8me.<\/p>\n\n\n\n<p>Une fois l&rsquo;infrastructure du syst\u00e8me d&rsquo;information cartographi\u00e9e et un maximum de renseignements recueillis, le pirate va analyser les vuln\u00e9rabilit\u00e9s existantes pour \u00e9valuer la probabilit\u00e9 de r\u00e9ussite de son attaque. Les failles peuvent \u00eatre techniques ou non. Par exemple, une mauvaise configuration d&rsquo;un serveur, des droits d&rsquo;utilisateur trop permissifs, ou des mots de passe faibles. Certaines failles proviennent de syst\u00e8mes d\u2019exploitation obsol\u00e8tes, comme Windows XP ou Windows 7 apr\u00e8s 2020, ou encore des syst\u00e8mes non mis \u00e0 jour par les administrateurs ou utilisateurs.<\/p>\n\n\n\n<p>Les vuln\u00e9rabilit\u00e9s peuvent aussi affecter les applications ou services qui les supportent. Par exemple, une application web pourrait contenir une faille permettant de contourner l\u2019authentification, engageant ainsi la responsabilit\u00e9 du d\u00e9veloppeur. De plus, la faille peut r\u00e9sider dans le service ou le protocole r\u00e9seau utilis\u00e9. Par exemple, dans le cas du HTTPS, si l&rsquo;algorithme de chiffrement est faible ou obsol\u00e8te, les donn\u00e9es crypt\u00e9es peuvent \u00eatre intercept\u00e9es et d\u00e9crypt\u00e9es.<\/p>\n<\/div><\/div>\n\n<\/div><\/div>\n\n<style>.kb-row-layout-id979_ec0d17-c0 > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id979_ec0d17-c0 > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id979_ec0d17-c0 > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);padding-top:25px;padding-bottom:20px;grid-template-columns:minmax(0, calc(25% - ((var(--global-kb-gap-md, 2rem) * 1 )\/2)))minmax(0, calc(75% - ((var(--global-kb-gap-md, 2rem) * 1 )\/2)));}.kb-row-layout-id979_ec0d17-c0 > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id979_ec0d17-c0 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr) minmax(0, 2fr);}}@media all and (max-width: 767px){.kb-row-layout-id979_ec0d17-c0 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id979_ec0d17-c0 alignnone wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-2-columns kt-row-layout-right-golden kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top\">\n<style>.kadence-column979_bfa8d1-95 > .kt-inside-inner-col,.kadence-column979_bfa8d1-95 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column979_bfa8d1-95 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column979_bfa8d1-95 > .kt-inside-inner-col{flex-direction:column;}.kadence-column979_bfa8d1-95 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column979_bfa8d1-95 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column979_bfa8d1-95{position:relative;}@media all and (max-width: 1024px){.kadence-column979_bfa8d1-95 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column979_bfa8d1-95 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column979_bfa8d1-95 inner-column-1\"><div class=\"kt-inside-inner-col\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"503\" height=\"341\" src=\"https:\/\/infosec4you.net\/wp-content\/uploads\/2022\/12\/intru22.png\" alt=\"\" class=\"wp-image-1619\" srcset=\"https:\/\/infosec4you.net\/wp-content\/uploads\/2022\/12\/intru22.png 503w, https:\/\/infosec4you.net\/wp-content\/uploads\/2022\/12\/intru22-300x203.png 300w\" sizes=\"auto, (max-width: 503px) 100vw, 503px\" \/><\/figure>\n<\/div><\/div>\n\n\n<style>.kadence-column979_ba65e1-ee > .kt-inside-inner-col,.kadence-column979_ba65e1-ee > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column979_ba65e1-ee > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column979_ba65e1-ee > .kt-inside-inner-col{flex-direction:column;}.kadence-column979_ba65e1-ee > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column979_ba65e1-ee > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column979_ba65e1-ee{position:relative;}@media all and (max-width: 1024px){.kadence-column979_ba65e1-ee > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column979_ba65e1-ee > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column979_ba65e1-ee inner-column-2\"><div class=\"kt-inside-inner-col\"><style>.wp-block-kadence-advancedheading.kt-adv-heading979_21bb89-4a, .wp-block-kadence-advancedheading.kt-adv-heading979_21bb89-4a[data-kb-block=\"kb-adv-heading979_21bb89-4a\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading979_21bb89-4a mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading979_21bb89-4a[data-kb-block=\"kb-adv-heading979_21bb89-4a\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading979_21bb89-4a img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading979_21bb89-4a[data-kb-block=\"kb-adv-heading979_21bb89-4a\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading979_21bb89-4a wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading979_21bb89-4a\">Phase 3 : Intrusion (Exploitation)<\/h2>\n\n\n\n<p class=\"has-medium-font-size\">Dans la deuxi\u00e8me phase d&rsquo;une attaque, le pirate cherche \u00e0 p\u00e9n\u00e9trer le r\u00e9seau de l&rsquo;entreprise et \u00e0 s&rsquo;y implanter durablement. Une fois les failles identifi\u00e9es, il passe \u00e0 l&rsquo;exploitation, c&rsquo;est-\u00e0-dire l&rsquo;intrusion proprement dite.<\/p>\n\n\n\n<p>Cette intrusion peut se faire via l&rsquo;injection de code malveillant dans une application ou un syst\u00e8me, mais aussi par l&rsquo;ing\u00e9nierie sociale, en exploitant le facteur humain, par exemple via du phishing pour obtenir des identifiants. Cela lui permet de rester ind\u00e9tectable tout en poursuivant ses actions malveillantes.<\/p>\n<\/div><\/div>\n\n<\/div><\/div>\n\n<style>.kb-row-layout-id979_c9364e-10 > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id979_c9364e-10 > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id979_c9364e-10 > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);padding-top:25px;padding-bottom:20px;grid-template-columns:minmax(0, calc(25% - ((var(--global-kb-gap-md, 2rem) * 1 )\/2)))minmax(0, calc(75% - ((var(--global-kb-gap-md, 2rem) * 1 )\/2)));}.kb-row-layout-id979_c9364e-10 > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id979_c9364e-10 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr) minmax(0, 2fr);}}@media all and (max-width: 767px){.kb-row-layout-id979_c9364e-10 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id979_c9364e-10 alignnone wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-2-columns kt-row-layout-right-golden kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top\">\n<style>.kadence-column979_b15ad1-af > .kt-inside-inner-col,.kadence-column979_b15ad1-af > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column979_b15ad1-af > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column979_b15ad1-af > .kt-inside-inner-col{flex-direction:column;}.kadence-column979_b15ad1-af > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column979_b15ad1-af > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column979_b15ad1-af{position:relative;}@media all and (max-width: 1024px){.kadence-column979_b15ad1-af > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column979_b15ad1-af > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column979_b15ad1-af inner-column-1\"><div class=\"kt-inside-inner-col\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"340\" height=\"230\" src=\"https:\/\/infosec4you.net\/wp-content\/uploads\/2022\/12\/granted.png\" alt=\"\" class=\"wp-image-1620\" srcset=\"https:\/\/infosec4you.net\/wp-content\/uploads\/2022\/12\/granted.png 340w, https:\/\/infosec4you.net\/wp-content\/uploads\/2022\/12\/granted-300x203.png 300w\" sizes=\"auto, (max-width: 340px) 100vw, 340px\" \/><\/figure>\n<\/div><\/div>\n\n\n<style>.kadence-column979_00b801-0b > .kt-inside-inner-col,.kadence-column979_00b801-0b > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column979_00b801-0b > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column979_00b801-0b > .kt-inside-inner-col{flex-direction:column;}.kadence-column979_00b801-0b > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column979_00b801-0b > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column979_00b801-0b{position:relative;}@media all and (max-width: 1024px){.kadence-column979_00b801-0b > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column979_00b801-0b > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column979_00b801-0b inner-column-2\"><div class=\"kt-inside-inner-col\"><style>.wp-block-kadence-advancedheading.kt-adv-heading979_2be00c-51, .wp-block-kadence-advancedheading.kt-adv-heading979_2be00c-51[data-kb-block=\"kb-adv-heading979_2be00c-51\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading979_2be00c-51 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading979_2be00c-51[data-kb-block=\"kb-adv-heading979_2be00c-51\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading979_2be00c-51 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading979_2be00c-51[data-kb-block=\"kb-adv-heading979_2be00c-51\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading979_2be00c-51 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading979_2be00c-51\">Phase 4 : Maintien de l\u2019intrusion <\/h2>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Renforcement des acc\u00e8s et mouvements lat\u00e9raux<\/strong><\/p>\n\n\n\n<p>Une fois la phase d\u2019intrusion r\u00e9ussie, le pirate va chercher \u00e0 renforcer son acc\u00e8s au syst\u00e8me pour maintenir son contr\u00f4le. Cela passe par plusieurs \u00e9tapes :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Mise en place d&rsquo;une backdoor<\/strong> : Le pirate installe une porte d\u00e9rob\u00e9e qui lui permet d&rsquo;\u00e9tablir une connexion permanente et discr\u00e8te au r\u00e9seau interne de l\u2019entreprise.<\/li>\n\n\n\n<li><strong>\u00c9l\u00e9vation des privil\u00e8ges<\/strong> : Il va ensuite tenter d\u2019obtenir les droits administratifs n\u00e9cessaires pour \u00e9largir ses capacit\u00e9s d\u2019action. Gr\u00e2ce aux canaux d\u2019acc\u00e8s et aux identifiants obtenus lors des phases pr\u00e9c\u00e9dentes, il pourra d\u00e9verrouiller des niveaux de contr\u00f4le plus \u00e9lev\u00e9s.<\/li>\n\n\n\n<li><strong>Mouvement lat\u00e9ral<\/strong> : Une fois bien implant\u00e9, le pirate va commencer \u00e0 se d\u00e9placer d\u2019un syst\u00e8me \u00e0 un autre au sein du r\u00e9seau. Ce mouvement lat\u00e9ral lui permet d\u2019infecter plus de syst\u00e8mes et de comptes utilisateurs. En infectant progressivement d&rsquo;autres machines, il s&rsquo;ancre davantage dans l\u2019infrastructure, et il peut cibler sp\u00e9cifiquement les syst\u00e8mes qui h\u00e9bergent les donn\u00e9es les plus sensibles et les plus pr\u00e9cieuses pour ses objectifs.<\/li>\n<\/ul>\n\n\n\n<p>Ainsi, en renfor\u00e7ant continuellement son acc\u00e8s, le pirate devient capable de maintenir une pr\u00e9sence ind\u00e9tect\u00e9e tout en pr\u00e9parant des actions plus destructrices ou en volant des informations critiques.<\/p>\n<\/div><\/div>\n\n<\/div><\/div>\n\n<style>.kb-row-layout-id979_7358b6-e2 > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id979_7358b6-e2 > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id979_7358b6-e2 > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);padding-top:25px;padding-bottom:20px;grid-template-columns:minmax(0, calc(25% - ((var(--global-kb-gap-md, 2rem) * 1 )\/2)))minmax(0, calc(75% - ((var(--global-kb-gap-md, 2rem) * 1 )\/2)));}.kb-row-layout-id979_7358b6-e2 > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id979_7358b6-e2 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr) minmax(0, 2fr);}}@media all and (max-width: 767px){.kb-row-layout-id979_7358b6-e2 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id979_7358b6-e2 alignnone wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-2-columns kt-row-layout-right-golden kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top\">\n<style>.kadence-column979_94a1af-0a > .kt-inside-inner-col,.kadence-column979_94a1af-0a > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column979_94a1af-0a > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column979_94a1af-0a > .kt-inside-inner-col{flex-direction:column;}.kadence-column979_94a1af-0a > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column979_94a1af-0a > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column979_94a1af-0a{position:relative;}@media all and (max-width: 1024px){.kadence-column979_94a1af-0a > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column979_94a1af-0a > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column979_94a1af-0a inner-column-1\"><div class=\"kt-inside-inner-col\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"340\" height=\"230\" src=\"https:\/\/infosec4you.net\/wp-content\/uploads\/2022\/12\/rans5-1.png\" alt=\"\" class=\"wp-image-1621\" srcset=\"https:\/\/infosec4you.net\/wp-content\/uploads\/2022\/12\/rans5-1.png 340w, https:\/\/infosec4you.net\/wp-content\/uploads\/2022\/12\/rans5-1-300x203.png 300w\" sizes=\"auto, (max-width: 340px) 100vw, 340px\" \/><\/figure>\n<\/div><\/div>\n\n\n<style>.kadence-column979_74f6c0-ae > .kt-inside-inner-col,.kadence-column979_74f6c0-ae > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column979_74f6c0-ae > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column979_74f6c0-ae > .kt-inside-inner-col{flex-direction:column;}.kadence-column979_74f6c0-ae > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column979_74f6c0-ae > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column979_74f6c0-ae{position:relative;}@media all and (max-width: 1024px){.kadence-column979_74f6c0-ae > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column979_74f6c0-ae > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column979_74f6c0-ae inner-column-2\"><div class=\"kt-inside-inner-col\"><style>.wp-block-kadence-advancedheading.kt-adv-heading979_a6001b-f4, .wp-block-kadence-advancedheading.kt-adv-heading979_a6001b-f4[data-kb-block=\"kb-adv-heading979_a6001b-f4\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading979_a6001b-f4 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading979_a6001b-f4[data-kb-block=\"kb-adv-heading979_a6001b-f4\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading979_a6001b-f4 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading979_a6001b-f4[data-kb-block=\"kb-adv-heading979_a6001b-f4\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading979_a6001b-f4 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading979_a6001b-f4\">Phase 5 : Exfiltration de donn\u00e9es<\/h2>\n\n\n\n<p class=\"has-medium-font-size\">L&rsquo;exfiltration de donn\u00e9es, \u00e9galement appel\u00e9e &lsquo;fuite de donn\u00e9es&rsquo;, &lsquo;perte de donn\u00e9es&rsquo; ou encore &lsquo;vol de donn\u00e9es&rsquo;, fait r\u00e9f\u00e9rence \u00e0 la sortie non autoris\u00e9e d&rsquo;informations sensibles d&rsquo;une organisation. <\/p>\n\n\n\n<p>Ce processus peut \u00eatre intentionnel, dans le cadre d&rsquo;une cyberattaque, ou accidentel, suite \u00e0 une mauvaise manipulation ou une faille de s\u00e9curit\u00e9. Quel que soit le terme utilis\u00e9, l&rsquo;exfiltration compromet la confidentialit\u00e9 et l&rsquo;int\u00e9grit\u00e9 des donn\u00e9es, et peut entra\u00eener des pertes importantes pour l&rsquo;entreprise.<\/p>\n\n\n\n<p>Une fois que le pirate a localis\u00e9 les donn\u00e9es recherch\u00e9es (acc\u00e8s bancaires, secrets industriels, projets, donn\u00e9es clients, sauvegardes, etc.), il entame l&rsquo;exfiltration. L\u2019objectif d\u2019une cyberattaque ne se limite pas toujours au vol de donn\u00e9es ; elle peut viser \u00e0 vous nuire de diff\u00e9rentes mani\u00e8res :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Chantage<\/strong> : prendre vos donn\u00e9es en otage.<\/li>\n\n\n\n<li><strong>Vente<\/strong> : revendre vos donn\u00e9es sur le march\u00e9 noir ou \u00e0 vos concurrents.<\/li>\n\n\n\n<li><strong>Destruction de r\u00e9putation<\/strong> : ternir votre image de marque.<\/li>\n\n\n\n<li><strong>Sabotage<\/strong> : effacer vos donn\u00e9es, vous poussant \u00e0 la faillite.<\/li>\n<\/ul>\n<\/div><\/div>\n\n<\/div><\/div>\n\n<style>.kb-row-layout-id979_ee688e-8e > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id979_ee688e-8e > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id979_ee688e-8e > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);padding-top:25px;padding-bottom:20px;grid-template-columns:minmax(0, calc(25% - ((var(--global-kb-gap-md, 2rem) * 1 )\/2)))minmax(0, calc(75% - ((var(--global-kb-gap-md, 2rem) * 1 )\/2)));}.kb-row-layout-id979_ee688e-8e > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id979_ee688e-8e > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr) minmax(0, 2fr);}}@media all and (max-width: 767px){.kb-row-layout-id979_ee688e-8e > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id979_ee688e-8e alignnone wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-2-columns kt-row-layout-right-golden kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top\">\n<style>.kadence-column979_225ac7-87 > .kt-inside-inner-col,.kadence-column979_225ac7-87 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column979_225ac7-87 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column979_225ac7-87 > .kt-inside-inner-col{flex-direction:column;}.kadence-column979_225ac7-87 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column979_225ac7-87 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column979_225ac7-87{position:relative;}@media all and (max-width: 1024px){.kadence-column979_225ac7-87 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column979_225ac7-87 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column979_225ac7-87 inner-column-1\"><div class=\"kt-inside-inner-col\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"340\" height=\"230\" src=\"https:\/\/infosec4you.net\/wp-content\/uploads\/2022\/12\/voc.png\" alt=\"\" class=\"wp-image-1554\" srcset=\"https:\/\/infosec4you.net\/wp-content\/uploads\/2022\/12\/voc.png 340w, https:\/\/infosec4you.net\/wp-content\/uploads\/2022\/12\/voc-300x203.png 300w\" sizes=\"auto, (max-width: 340px) 100vw, 340px\" \/><\/figure>\n<\/div><\/div>\n\n\n<style>.kadence-column979_47c592-c4 > .kt-inside-inner-col,.kadence-column979_47c592-c4 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column979_47c592-c4 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column979_47c592-c4 > .kt-inside-inner-col{flex-direction:column;}.kadence-column979_47c592-c4 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column979_47c592-c4 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column979_47c592-c4{position:relative;}@media all and (max-width: 1024px){.kadence-column979_47c592-c4 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column979_47c592-c4 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column979_47c592-c4 inner-column-2\"><div class=\"kt-inside-inner-col\"><style>.wp-block-kadence-advancedheading.kt-adv-heading979_503c7b-c7, .wp-block-kadence-advancedheading.kt-adv-heading979_503c7b-c7[data-kb-block=\"kb-adv-heading979_503c7b-c7\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading979_503c7b-c7 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading979_503c7b-c7[data-kb-block=\"kb-adv-heading979_503c7b-c7\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading979_503c7b-c7 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading979_503c7b-c7[data-kb-block=\"kb-adv-heading979_503c7b-c7\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading979_503c7b-c7 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading979_503c7b-c7\"> Vocabulaire :<\/h2>\n\n\n\n<p><strong>Une vuln\u00e9rabilit\u00e9<\/strong>\u00a0est une faiblesse dans un logiciel ou la configuration d\u2019un syst\u00e8me, souvent caus\u00e9e par des patchs non appliqu\u00e9s.<\/p>\n\n\n\n<p><strong>Un Exploit<\/strong> est le moyen par lequel un attaquant tire parti d&rsquo;une faille dans un syst\u00e8me, une application ou un service (ex. : buffer overflow, injection SQL, erreurs de configuration).<\/p>\n\n\n\n<p><strong>L\u2019exploitation<\/strong>\u00a0vise \u00e0 obtenir le contr\u00f4le du syst\u00e8me, souvent avec des privil\u00e8ges administrateur.<\/p>\n\n\n\n<p><strong>Payload<\/strong> est un code ex\u00e9cut\u00e9 par la machine cible.<\/p>\n\n\n\n<p><strong>Shellcode<\/strong> est une s\u00e9rie d&rsquo;instructions dans le payload.<\/p>\n\n\n\n<p><strong>Un Shell distant<\/strong>\u00a0permet au hacker de prendre le contr\u00f4le \u00e0 distance de l&rsquo;ordinateur compromis, de modifier des fichiers, d&rsquo;installer des logiciels malveillants, et d&rsquo;utiliser la machine pour lancer des attaques contre d&rsquo;autres syst\u00e8mes.<\/p>\n<\/div><\/div>\n\n<\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>5 Phases d&rsquo;une cyber attaque Que se passe-t-il \u00e0 chaque phase d&rsquo;une cyberattaque ? La cybers\u00e9curit\u00e9 commence par la compr\u00e9hension des risques et des menaces. Il est essentiel de conna\u00eetre vos adversaires, leurs objectifs, et leurs m\u00e9thodes d&rsquo;attaque pour mieux vous prot\u00e9ger. Phase 1 : Collecte d&rsquo;informations (Reconnaissance) L&rsquo;objectif principal du pirate est d&rsquo;identifier des&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"class_list":["post-979","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/infosec4you.net\/index.php?rest_route=\/wp\/v2\/pages\/979","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infosec4you.net\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/infosec4you.net\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/infosec4you.net\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infosec4you.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=979"}],"version-history":[{"count":43,"href":"https:\/\/infosec4you.net\/index.php?rest_route=\/wp\/v2\/pages\/979\/revisions"}],"predecessor-version":[{"id":1917,"href":"https:\/\/infosec4you.net\/index.php?rest_route=\/wp\/v2\/pages\/979\/revisions\/1917"}],"wp:attachment":[{"href":"https:\/\/infosec4you.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=979"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}