{"id":536,"date":"2016-09-07T18:00:11","date_gmt":"2016-09-07T18:00:11","guid":{"rendered":"http:\/\/www.adlice.com\/fr\/?p=536"},"modified":"2022-12-21T10:36:43","modified_gmt":"2022-12-21T10:36:43","slug":"exploit-kits-partie-1","status":"publish","type":"post","link":"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-1\/","title":{"rendered":"Exploits et Exploit kits: Partie I \u2013 D\u00e9finition &#038; Protection"},"content":{"rendered":"\n<h4 class=\"has-accent-color has-text-color wp-block-heading\">Pr\u00e9ambule<\/h4>\n\n\n\n<p><strong>Cet article est segment\u00e9 en trois parties distinctes<\/strong> de mani\u00e8re \u00e0 pr\u00e9senter en d\u00e9tails les diff\u00e9rents aspects des exploits et exploits kits.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>La premi\u00e8re partie <strong>pr\u00e9sentera les d\u00e9finitions<\/strong> de ces termes, de la mani\u00e8re dont ils sont utilis\u00e9s ainsi que les m\u00e9thodes pour s\u2019en pr\u00e9munir : <a href=\"#\">Partie I \u2013 Exploits, Exploit kits et Protection<\/a> <\/li>\n\n\n\n<li>La seconde se concentrera sur <strong>les lieux d\u2019\u00e9changes o\u00f9 ceux-ci sont achet\u00e9s\/vendus<\/strong>, parfois l\u00e9galement, parfois non : <a href=\"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-2\/\" target=\"_blank\" rel=\"noreferrer noopener\">Partie II \u2013 Une Approche Marketing<\/a><\/li>\n\n\n\n<li>Enfin, la troisi\u00e8me partie explorera en d\u00e9tails le <strong>fonctionnement des exploits<\/strong>, exploits kits et anti-exploit : <a href=\"https:\/\/www.adlice.com\/exploits-kits-part-3\/\" target=\"_blank\" rel=\"noreferrer noopener\">Partie III \u2013&nbsp; Une Approche Technique<\/a><\/li>\n<\/ul>\n\n\n\n<h4 class=\"has-accent-color has-text-color wp-block-heading\"><br>D\u00e9finitions<\/h4>\n\n\n\n<p><strong>Un exploit est une portion de code<\/strong> permettant d\u2019<strong>exploiter une vuln\u00e9rabilit\u00e9<\/strong> dans un programme de mani\u00e8re \u00e0 <strong>obtenir des privil\u00e8ges<\/strong> (ex\u00e9cution d\u2019un logiciel, obtention d\u2019informations, etc.) sur l\u2019ordinateur ex\u00e9cutant ledit programme. Ceci nous am\u00e8ne \u00e0 la d\u00e9finition d\u2019une vuln\u00e9rabilit\u00e9. Il s\u2019agit d\u2019une <strong>erreur de conception<\/strong> lors de l\u2019\u00e9criture d\u2019un programme pouvant \u00eatre exploit\u00e9e. Des exemples concrets de vuln\u00e9rabilit\u00e9s seront pr\u00e9sent\u00e9s en partie III.<\/p>\n\n\n\n<p>Un exploit kit est un logiciel fonctionnant habituellement sur un serveur Web et <strong>contenant de multiples exploits<\/strong>. Son but est de d\u00e9terminer si des logiciels vuln\u00e9rables sont pr\u00e9sents sur l\u2019ordinateur communiquant avec lui puis, si c\u2019est le cas, l\u2019exploit kit <strong>ex\u00e9cute l\u2019exploit appropri\u00e9 sur la machine client<\/strong> lui permettant ainsi d\u2019infecter la machine (<a href=\"https:\/\/en.wikipedia.org\/wiki\/Drive-by_download\">drive-by download<\/a>).<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/driveby.jpg\"><img decoding=\"async\" width=\"300\" height=\"178\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/driveby-300x178.jpg\" alt=\"Source: microsoft.com\" class=\"wp-image-543\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/driveby-300x178.jpg 300w, https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/driveby.jpg 960w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><figcaption class=\"wp-element-caption\">Source: microsoft.com<\/figcaption><\/figure>\n<\/div>\n\n\n<p>La plupart du temps, l\u2019utilisation d\u2019un exploit kit <strong>ne requiert aucune connaissance des exploits<\/strong> composant celui-ci ce qui rend celle-ci <strong>particuli\u00e8rement ais\u00e9e<\/strong>.<\/p>\n\n\n\n<h4 class=\"has-accent-color has-text-color wp-block-heading\"><br>Criticit\u00e9 des vuln\u00e9rabilit\u00e9s<\/h4>\n\n\n\n<p>Toutes les vuln\u00e9rabilit\u00e9s ne repr\u00e9sentent pas le m\u00eame danger. En effet, pour \u00eatre exploit\u00e9es certaines n\u00e9cessitent des conditions particuli\u00e8res et d\u2019autres n\u2019offrent qu\u2019un acc\u00e8s limit\u00e9 au syst\u00e8me. C\u2019est pourquoi une organisation, le <a href=\"https:\/\/cve.mitre.org\/\">MITRE<\/a>, s\u2019occupe de les r\u00e9f\u00e9rencer.<\/p>\n\n\n\n<p>Une fois qu\u2019une vuln\u00e9rabilit\u00e9 est d\u00e9couverte et rendue publique, celle-ci est ajout\u00e9e dans le dictionnaire <strong>Common Vulnerabilities and Exposures (CVE) sous la forme d\u2019un identifiant CVE<\/strong>. L\u2019\u00e9valuation de la criticit\u00e9 des vuln\u00e9rabilit\u00e9s est r\u00e9gie par le syst\u00e8me <a href=\"https:\/\/www.first.org\/cvss\">Common Vulnerability Scoring System<\/a> (CVSS).<\/p>\n\n\n\n<p>Cette \u00e9valuation est constitu\u00e9e de 3 mesures (appel\u00e9es m\u00e9triques) constitu\u00e9es de diff\u00e9rents facteurs de risque. <strong>Plus le facteur de risque est important, plus la m\u00e9trique sera \u00e9lev\u00e9e<\/strong>, 10 \u00e9tant le maximum. Les <strong>vuln\u00e9rabilit\u00e9s non r\u00e9f\u00e9renc\u00e9es<\/strong> ou pour lesquels il n\u2019existe aucun correctif sont d\u00e9nomm\u00e9es par l\u2019appellation &#8220;0-day&#8221;. Il est \u00e0 noter cela n\u2019a aucune influence sur leur score CVSS.<\/p>\n\n\n\n<h4 class=\"has-accent-color has-text-color wp-block-heading\"><br>Popularit\u00e9s des vuln\u00e9rabilit\u00e9s<\/h4>\n\n\n\n<p>Les logiciels pr\u00e9sentant le plus de vuln\u00e9rabilit\u00e9s ne sont pas forc\u00e9ment les plus exploit\u00e9s. En effet, plusieurs facteurs sont \u00e0 prendre en compte :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Score CVSS<\/strong><\/li>\n\n\n\n<li><strong>Popularit\u00e9 du logiciel<\/strong><\/li>\n\n\n\n<li><strong>&#8220;0-day&#8221; ou non<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Score CVSS : Comme nous l\u2019avons vu dans le paragraphe ci-dessus,<strong> plus le score CVSS d\u2019une vuln\u00e9rabilit\u00e9 est \u00e9lev\u00e9, plus son exploitation est ais\u00e9e<\/strong>. On peut donc en d\u00e9duire que les vuln\u00e9rabilit\u00e9s pr\u00e9sentant un haut score CVSS seront plus susceptibles d\u2019\u00eatre exploit\u00e9es que celle pr\u00e9sentant un score plus faible.<\/p>\n\n\n\n<p>Popularit\u00e9 du logiciel : Le but des exploits kits est d\u2019infecter <strong>autant de machines que possible<\/strong>. Aussi, les vuln\u00e9rabilit\u00e9s les plus exploit\u00e9es concernent des produits multi-plate-formes ou encore le syst\u00e8me d\u2019exploitation Windows et ses applications (pr\u00e8s de 90% des terminaux non mobiles connect\u00e9s).<\/p>\n\n\n\n<p>&#8220;0-day&#8221; ou non : Une vuln\u00e9rabilit\u00e9 de type &#8220;0-day&#8221; peut \u00eatre exploitable <strong>durant des mois, voire des ann\u00e9es<\/strong>. Le d\u00e9veloppement d\u2019un exploit est donc particuli\u00e8rement rentable (voir partie II).<\/p>\n\n\n\n<p><strong>D\u00e9monstration:<\/strong><br>En 2015, le MITRE a r\u00e9f\u00e9renc\u00e9 <strong>654 vuln\u00e9rabilit\u00e9s<\/strong> concernant le syst\u00e8me Mac OS ainsi que les logiciels Apple. Microsoft occupe la deuxi\u00e8me place avec 571 vuln\u00e9rabilit\u00e9s.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/Top10_Vulnerable_Vendors_2016.jpg\"><img decoding=\"async\" width=\"300\" height=\"167\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/Top10_Vulnerable_Vendors_2016-300x167.jpg\" alt=\"Source : ITProPortal\" class=\"wp-image-537\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/Top10_Vulnerable_Vendors_2016-300x167.jpg 300w, https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/Top10_Vulnerable_Vendors_2016.jpg 900w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><figcaption class=\"wp-element-caption\">Source : ITProPortal<\/figcaption><\/figure>\n<\/div>\n\n\n<p>Cependant, si l\u2019on compare ces chiffres avec celui des vuln\u00e9rabilit\u00e9s les plus exploit\u00e9es, on se rend compte que les huit premi\u00e8res places sont occup\u00e9es par Adobe Flash Player, <strong>qui n\u2019occupe pourtant que la 5\u00e8me place dans le classement<\/strong> des applications les plus vuln\u00e9rables.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/top-vulnerabilities-2015.png\"><img decoding=\"async\" width=\"300\" height=\"192\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/top-vulnerabilities-2015-300x192.png\" alt=\"Source : Recorded Future\" class=\"wp-image-538\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/top-vulnerabilities-2015-300x192.png 300w, https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/top-vulnerabilities-2015-1024x654.png 1024w, https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/top-vulnerabilities-2015.png 1340w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><figcaption class=\"wp-element-caption\">Source : Recorded Future<\/figcaption><\/figure>\n<\/div>\n\n\n<p>Si nous analysons le cas de la vuln\u00e9rabilit\u00e9 <strong>CVE-2015-0313<\/strong>, la plus exploit\u00e9e, on se rend compte que son score CVSS est de 10, qu\u2019elle est multi-plate-forme (Windows, Mac OS, et Linux) et qu\u2019elle est de type &#8220;0-day&#8221;.<\/p>\n\n\n\n<h4 class=\"has-accent-color has-text-color wp-block-heading\"><br>Protections passives<\/h4>\n\n\n\n<p>De nombreux exploits encore utilis\u00e9s aujourd\u2019hui ciblent des vuln\u00e9rabilit\u00e9s <strong>pour lesquelles des correctifs sont disponibles<\/strong>. Aussi, il est conseill\u00e9 de maintenir \u00e0 jour les logiciels pr\u00e9sents sur le syst\u00e8me et principalement les logiciels \u00e0 risques, tels que :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Le syst\u00e8me d\u2019exploitation<\/strong><\/li>\n\n\n\n<li><strong>Les navigateurs WEB et leurs plug-ins (Flash Player, SilverLight, Java, etc.)<\/strong><\/li>\n\n\n\n<li><strong>Les lecteurs de fichiers PDF<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Ceci ne sera bien entendu pas efficace contre les exploits de type &#8220;0-day&#8221;.<\/p>\n\n\n\n<p>Une autre approche est de consid\u00e9rer le navigateur <strong>comme le point d\u2019entr\u00e9e des exploits<\/strong> et de le cloisonner via un syst\u00e8me de Sandbox. Dans ce contexte, m\u00eame si un exploit est ex\u00e9cut\u00e9 et un malware install\u00e9 sur le syst\u00e8me h\u00f4te, il est, la plupart du temps, ais\u00e9 de le supprimer. Toutefois, ce type de protection n\u2019emp\u00eache pas le <strong>vol d\u2019information<\/strong> en cas d\u2019exploitation r\u00e9ussie.<\/p>\n\n\n\n<p>Il est \u00e9galement possible de filtrer les requ\u00eates entre le navigateur et de n\u2019autoriser que le trafic l\u00e9gitime. Ceci est rendu possible pas des logiciels tels que <strong>NoScript<\/strong> ou <strong>uMatrix<\/strong>.<br>Bien que tr\u00e8s efficace, le principal inconv\u00e9nient de cette approche est un fort investissement utilisateur.<\/p>\n\n\n\n<h4 class=\"has-accent-color has-text-color wp-block-heading\"><br>Protections actives<\/h4>\n\n\n\n<p>Des logiciels ont \u00e9t\u00e9 d\u00e9velopp\u00e9s pour lutter contre les exploits inconnus ou pour r\u00e9aliser la mitigation d\u2019exploits &#8220;0-day&#8221; ; il s\u2019agit d&#8217;anti-exploits. On peut notamment citer ici <a href=\"https:\/\/www.microsoft.com\/en-us\/download\/details.aspx?id=50766\"><strong>Enhanced Mitigation Experience Toolkit (EMET)<\/strong><\/a> ou encore <a href=\"https:\/\/fr.malwarebytes.com\/antiexploit\/\"><strong>Malwarebytes Anti-Exploit (MBAE)<\/strong><\/a>.<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"648\" height=\"528\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/EMET.png\" alt=\"\" class=\"wp-image-1643\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/EMET.png 648w, https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/EMET-300x244.png 300w, https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/EMET-66x55.png 66w\" sizes=\"(max-width: 648px) 100vw, 648px\" \/><\/figure>\n\n\n\n<p><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"510\" height=\"390\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/MBAE.png\" alt=\"\" class=\"wp-image-1644\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/MBAE.png 510w, https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/MBAE-300x229.png 300w\" sizes=\"(max-width: 510px) 100vw, 510px\" \/><\/figure>\n\n\n\n<p><\/p>\n<\/div>\n<\/div>\n\n\n\n<p>La plupart des m\u00e9thodes utilis\u00e9es par les exploits (voir partie III) sont connues et ces logiciels permettent de les d\u00e9tecter et ainsi de les rendre inefficaces.Cependant, <strong>ces outils ne sont pas infaillibles<\/strong> et les logiciels malveillants s\u2019adaptent constamment pour les contourner.&nbsp;<\/p>\n\n\n\n<h4 class=\"has-accent-color has-text-color wp-block-heading\"><br>Conclusion<\/h4>\n\n\n\n<p>Les exploits kits jouent <strong>un r\u00f4le pr\u00e9pond\u00e9rant dans la propagation des logiciels malveillants<\/strong>, car ils permettent \u00e0 l\u2019attaquant d\u2019installer silencieusement ceux-ci, <strong>sans aucune interaction avec l\u2019utilisateur<\/strong>. Les produits pour lesquels le plus de failles ont \u00e9t\u00e9 d\u00e9couvertes ne sont pas forc\u00e9ment <strong>les moins s\u00fbrs ou les plus exploit\u00e9s<\/strong>. Il n\u2019existe pas de solution infaillible pour se pr\u00e9munir contre ce genre de menace. Aussi, il est conseill\u00e9 d\u2019allier <strong>protections passives et actives<\/strong>, de mani\u00e8re \u00e0 r\u00e9duire au maximum la surface d\u2019attaque potentielle.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Les exploits et exploit kits jouent un r\u00f4le majeur dans la propagation des logiciels malveillants. Apprenez leur fonctionnement et \u00e0 vous en pr\u00e9munir<\/p>\n","protected":false},"author":1,"featured_media":544,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[449,441,443],"class_list":["post-536","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-analysis","tag-kits-dexploit","tag-protection","tag-vulnerabilites","category-36","description-off"],"views":1128,"yoast_score":67,"yoast_readable":60,"featured_image_src":"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/888260856.jpg","author_info":{"display_name":"tigzy","author_link":"https:\/\/www.adlice.com\/fr\/author\/tigzy\/"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Exploit kits, Partie 1: D\u00e9finition et Protection \u2022 Adlice Software<\/title>\n<meta name=\"description\" content=\"Les exploit kits jouent un r\u00f4le majeur dans la propagation des logiciels malveillants. D\u00e9finition g\u00e9n\u00e9rale, apprenez \u00e0 vous prot\u00e9ger.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-1\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Exploit kits, Partie 1: D\u00e9finition et Protection \u2022 Adlice Software\" \/>\n<meta property=\"og:description\" content=\"Les exploit kits jouent un r\u00f4le majeur dans la propagation des logiciels malveillants. D\u00e9finition g\u00e9n\u00e9rale, apprenez \u00e0 vous prot\u00e9ger.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-1\/\" \/>\n<meta property=\"og:site_name\" content=\"Adlice Software\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/RogueKiller\" \/>\n<meta property=\"article:published_time\" content=\"2016-09-07T18:00:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-21T10:36:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/888260856.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1166\" \/>\n\t<meta property=\"og:image:height\" content=\"674\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"tigzy\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@AdliceSoftware\" \/>\n<meta name=\"twitter:site\" content=\"@AdliceSoftware\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"tigzy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-1\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-1\/\"},\"author\":{\"name\":\"tigzy\",\"@id\":\"https:\/\/www.adlice.com\/fr\/#\/schema\/person\/a02b30804320a4059d268dc2567a307d\"},\"headline\":\"Exploits et Exploit kits: Partie I \u2013 D\u00e9finition &#038; Protection\",\"datePublished\":\"2016-09-07T18:00:11+00:00\",\"dateModified\":\"2022-12-21T10:36:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-1\/\"},\"wordCount\":1186,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.adlice.com\/fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-1\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/888260856.jpg\",\"keywords\":[\"kits d'exploit\",\"protection\",\"vulnerabilit\u00e9s\"],\"articleSection\":[\"Analysis\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-1\/\",\"url\":\"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-1\/\",\"name\":\"Exploit kits, Partie 1: D\u00e9finition et Protection \u2022 Adlice Software\",\"isPartOf\":{\"@id\":\"https:\/\/www.adlice.com\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-1\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-1\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/888260856.jpg\",\"datePublished\":\"2016-09-07T18:00:11+00:00\",\"dateModified\":\"2022-12-21T10:36:43+00:00\",\"description\":\"Les exploit kits jouent un r\u00f4le majeur dans la propagation des logiciels malveillants. D\u00e9finition g\u00e9n\u00e9rale, apprenez \u00e0 vous prot\u00e9ger.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-1\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-1\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-1\/#primaryimage\",\"url\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/888260856.jpg\",\"contentUrl\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/888260856.jpg\",\"width\":1166,\"height\":674},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-1\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.adlice.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Exploits et Exploit kits: Partie I \u2013 D\u00e9finition &#038; Protection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.adlice.com\/fr\/#website\",\"url\":\"https:\/\/www.adlice.com\/fr\/\",\"name\":\"Adlice Software\",\"description\":\"Anti-malware and analysis tools\",\"publisher\":{\"@id\":\"https:\/\/www.adlice.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.adlice.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.adlice.com\/fr\/#organization\",\"name\":\"Adlice Software\",\"url\":\"https:\/\/www.adlice.com\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.adlice.com\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png\",\"contentUrl\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png\",\"width\":276,\"height\":276,\"caption\":\"Adlice Software\"},\"image\":{\"@id\":\"https:\/\/www.adlice.com\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/RogueKiller\",\"https:\/\/x.com\/AdliceSoftware\",\"https:\/\/fr.linkedin.com\/company\/adlice-software\",\"https:\/\/www.youtube.com\/channel\/UC4CQ-gIZMGWxl-auf0QqYhQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.adlice.com\/fr\/#\/schema\/person\/a02b30804320a4059d268dc2567a307d\",\"name\":\"tigzy\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.adlice.com\/fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d81e380961b1b69969fa84994ad1e4cba26afe93a49d8dd3148e9c33ffe4ccac?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d81e380961b1b69969fa84994ad1e4cba26afe93a49d8dd3148e9c33ffe4ccac?s=96&d=mm&r=g\",\"caption\":\"tigzy\"},\"description\":\"Founder and owner of Adlice Software, Tigzy started as lead developer on the popular Anti-malware called RogueKiller. Involved in all the Adlice projects as lead developer, Tigzy is also doing research and reverse engineering as well as writing blog posts.\",\"url\":\"https:\/\/www.adlice.com\/fr\/author\/tigzy\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Exploit kits, Partie 1: D\u00e9finition et Protection \u2022 Adlice Software","description":"Les exploit kits jouent un r\u00f4le majeur dans la propagation des logiciels malveillants. D\u00e9finition g\u00e9n\u00e9rale, apprenez \u00e0 vous prot\u00e9ger.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-1\/","og_locale":"fr_FR","og_type":"article","og_title":"Exploit kits, Partie 1: D\u00e9finition et Protection \u2022 Adlice Software","og_description":"Les exploit kits jouent un r\u00f4le majeur dans la propagation des logiciels malveillants. D\u00e9finition g\u00e9n\u00e9rale, apprenez \u00e0 vous prot\u00e9ger.","og_url":"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-1\/","og_site_name":"Adlice Software","article_publisher":"https:\/\/www.facebook.com\/RogueKiller","article_published_time":"2016-09-07T18:00:11+00:00","article_modified_time":"2022-12-21T10:36:43+00:00","og_image":[{"width":1166,"height":674,"url":"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/888260856.jpg","type":"image\/jpeg"}],"author":"tigzy","twitter_card":"summary_large_image","twitter_creator":"@AdliceSoftware","twitter_site":"@AdliceSoftware","twitter_misc":{"\u00c9crit par":"tigzy","Dur\u00e9e de lecture estim\u00e9e":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-1\/#article","isPartOf":{"@id":"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-1\/"},"author":{"name":"tigzy","@id":"https:\/\/www.adlice.com\/fr\/#\/schema\/person\/a02b30804320a4059d268dc2567a307d"},"headline":"Exploits et Exploit kits: Partie I \u2013 D\u00e9finition &#038; Protection","datePublished":"2016-09-07T18:00:11+00:00","dateModified":"2022-12-21T10:36:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-1\/"},"wordCount":1186,"commentCount":0,"publisher":{"@id":"https:\/\/www.adlice.com\/fr\/#organization"},"image":{"@id":"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-1\/#primaryimage"},"thumbnailUrl":"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/888260856.jpg","keywords":["kits d'exploit","protection","vulnerabilit\u00e9s"],"articleSection":["Analysis"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-1\/","url":"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-1\/","name":"Exploit kits, Partie 1: D\u00e9finition et Protection \u2022 Adlice Software","isPartOf":{"@id":"https:\/\/www.adlice.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-1\/#primaryimage"},"image":{"@id":"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-1\/#primaryimage"},"thumbnailUrl":"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/888260856.jpg","datePublished":"2016-09-07T18:00:11+00:00","dateModified":"2022-12-21T10:36:43+00:00","description":"Les exploit kits jouent un r\u00f4le majeur dans la propagation des logiciels malveillants. D\u00e9finition g\u00e9n\u00e9rale, apprenez \u00e0 vous prot\u00e9ger.","breadcrumb":{"@id":"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-1\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.adlice.com\/fr\/exploit-kits-partie-1\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-1\/#primaryimage","url":"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/888260856.jpg","contentUrl":"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/888260856.jpg","width":1166,"height":674},{"@type":"BreadcrumbList","@id":"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-1\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.adlice.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Exploits et Exploit kits: Partie I \u2013 D\u00e9finition &#038; Protection"}]},{"@type":"WebSite","@id":"https:\/\/www.adlice.com\/fr\/#website","url":"https:\/\/www.adlice.com\/fr\/","name":"Adlice Software","description":"Anti-malware and analysis tools","publisher":{"@id":"https:\/\/www.adlice.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.adlice.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.adlice.com\/fr\/#organization","name":"Adlice Software","url":"https:\/\/www.adlice.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.adlice.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png","contentUrl":"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png","width":276,"height":276,"caption":"Adlice Software"},"image":{"@id":"https:\/\/www.adlice.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/RogueKiller","https:\/\/x.com\/AdliceSoftware","https:\/\/fr.linkedin.com\/company\/adlice-software","https:\/\/www.youtube.com\/channel\/UC4CQ-gIZMGWxl-auf0QqYhQ"]},{"@type":"Person","@id":"https:\/\/www.adlice.com\/fr\/#\/schema\/person\/a02b30804320a4059d268dc2567a307d","name":"tigzy","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.adlice.com\/fr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d81e380961b1b69969fa84994ad1e4cba26afe93a49d8dd3148e9c33ffe4ccac?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d81e380961b1b69969fa84994ad1e4cba26afe93a49d8dd3148e9c33ffe4ccac?s=96&d=mm&r=g","caption":"tigzy"},"description":"Founder and owner of Adlice Software, Tigzy started as lead developer on the popular Anti-malware called RogueKiller. Involved in all the Adlice projects as lead developer, Tigzy is also doing research and reverse engineering as well as writing blog posts.","url":"https:\/\/www.adlice.com\/fr\/author\/tigzy\/"}]}},"_links":{"self":[{"href":"https:\/\/www.adlice.com\/fr\/wp-json\/wp\/v2\/posts\/536","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.adlice.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.adlice.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.adlice.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adlice.com\/fr\/wp-json\/wp\/v2\/comments?post=536"}],"version-history":[{"count":0,"href":"https:\/\/www.adlice.com\/fr\/wp-json\/wp\/v2\/posts\/536\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.adlice.com\/fr\/wp-json\/wp\/v2\/media\/544"}],"wp:attachment":[{"href":"https:\/\/www.adlice.com\/fr\/wp-json\/wp\/v2\/media?parent=536"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.adlice.com\/fr\/wp-json\/wp\/v2\/categories?post=536"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.adlice.com\/fr\/wp-json\/wp\/v2\/tags?post=536"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}