{"id":562,"date":"2016-10-03T16:09:04","date_gmt":"2016-10-03T16:09:04","guid":{"rendered":"http:\/\/www.adlice.com\/fr\/?p=562"},"modified":"2022-12-21T10:36:29","modified_gmt":"2022-12-21T10:36:29","slug":"exploit-kits-partie-2","status":"publish","type":"post","link":"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-2\/","title":{"rendered":"Exploits et Exploit kits: Partie II \u2013 Comment gagnent t-ils de l&#8217;argent ?"},"content":{"rendered":"\n<h4 class=\"has-accent-color has-text-color wp-block-heading\"><br>Introduction<\/h4>\n\n\n\n<p>Comme nous l\u2019avons vu dans la <a href=\"\/\/www.adlice.com\/fr\/exploit-kits-partie-1\">partie I<\/a>, la d\u00e9couverte et l\u2019exploitation de nouvelles vuln\u00e9rabilit\u00e9s sont essentielles \u00e0 l\u2019efficacit\u00e9 des Exploit kits. Ainsi, un Exploit kit qui ne renouvelle pas sa base de donn\u00e9es d\u2019exploits <strong>ne sera pas efficace et perdra en popularit\u00e9<\/strong>.<\/p>\n\n\n\n<p>De nombreuses personnes recherchent les vuln\u00e9rabilit\u00e9s dans les programmes et les moyen pour les exploiter, et cela pour diff\u00e9rentes raisons. On peut notamment citer la renomm\u00e9e, l\u2019\u00e9thique, et bien entendu <strong>le facteur financier<\/strong>.<\/p>\n\n\n\n<h4 class=\"has-accent-color has-text-color wp-block-heading\"><br>Consid\u00e9rations l\u00e9gales et Bug Bounty<\/h4>\n\n\n\n<p>Il est important de pr\u00e9ciser que rechercher des vuln\u00e9rabilit\u00e9s dans un programme et publier des exploits pour celles-ci <strong>n\u2019est en rien ill\u00e9gal<\/strong> (\u00e0 moins que cela ne soit clairement d\u00e9fini dans l\u2019<a href=\"https:\/\/fr.wikipedia.org\/wiki\/Licence_de_logiciel\">EULA<\/a> li\u00e9 \u00e0 celui-ci). <strong>Seul importe l\u2019utilisation qui est fait de l\u2019exploitation de la faille<\/strong>.<\/p>\n\n\n\n<p>De nombreuses soci\u00e9t\u00e9s proposent maintenant des programmes de <a href=\"https:\/\/fr.wikipedia.org\/wiki\/Bug_bounty\">Bug Bounty<\/a>. Ces programmes d\u00e9finissent un cadre de travail pr\u00e9cis ainsi que les r\u00e9compenses (argent, swag, reconnaissance de comp\u00e9tences, etc.) offertes aux chercheurs de vuln\u00e9rabilit\u00e9s.<\/p>\n\n\n\n<p>Pour les entreprises concern\u00e9es, le grand avantage de tels programmes est double. Cela leur permet <strong>d\u2019encourager les chercheurs \u00e0 rapporter les vuln\u00e9rabilit\u00e9s trouv\u00e9es via le programme de Bug Bounty<\/strong> plut\u00f4t que de les rendre publique ou de les vendre \u00e0 d\u2019autres organismes mais \u00e9galement <strong>de r\u00e9aliser des tests de vuln\u00e9rabilit\u00e9s de leurs programmes \u00e0 moindre frais<\/strong>.<\/p>\n\n\n\n<h4 class=\"has-accent-color has-text-color wp-block-heading\"><br>March\u00e9 l\u00e9gal<\/h4>\n\n\n\n<p>Certaines entreprises se sont sp\u00e9cialis\u00e9es dans l\u2019achat et la vente d\u2019exploits, <strong>proposant souvent des prix d\u2019achats bien sup\u00e9rieurs \u00e0 ceux des programmes de Bug Bounty<\/strong>.<\/p>\n\n\n\n<p>On peut notamment citer ici le service\u00ab Absolute Zero-Day \u00bb op\u00e9r\u00e9 par <a href=\"https:\/\/fr.wikipedia.org\/wiki\/Kevin_Mitnick\">Kevin Mitnick<\/a>, qui met en relation les d\u00e9veloppeurs d\u2019exploits et les acheteurs potentiels. Le service n\u2019est int\u00e9ress\u00e9 que par les exploits pr\u00e9sentant un score CVSS d\u2019une valeur minimal de 8 et concernant les logiciels populaires (voir <a href=\"\/\/www.adlice.com\/fr\/exploit-kits-partie-1\">partie I<\/a>).<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/Mitnick_Absolute.png\"><img decoding=\"async\" width=\"300\" height=\"45\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/Mitnick_Absolute-300x45.png\" alt=\"Mitnick's Absolute Zero-Day\" class=\"wp-image-563\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/Mitnick_Absolute-300x45.png 300w, https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/Mitnick_Absolute.png 834w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p>Vendeurs et acheteurs doivent \u00eatre qualifi\u00e9s pour avoir acc\u00e8s au service. Pour ceci, des frais d\u2019inscription \u00e9lev\u00e9s doivent \u00eatre pay\u00e9s par les vendeurs et les acheteurs. Pour ces derniers, des investigations suppl\u00e9mentaires sont \u00e9galement r\u00e9alis\u00e9es. Selon Mitnick, un exploit est vendu au minimum <strong>au prix de 100&#8217;000 dollars<\/strong> et leurs clients incluent des gouvernements et d\u2019importantes soci\u00e9t\u00e9s.<\/p>\n\n\n\n<p>Un autre exemple est le service ZERODIUM, fond\u00e9s par des experts en cyber-s\u00e9curit\u00e9. La soci\u00e9t\u00e9 ach\u00e8te des exploits pour les produits ci-dessous :<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/zerodium_prices.png\"><img decoding=\"async\" width=\"906\" height=\"602\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/zerodium_prices.png\" alt=\"Source : zerodium.com\" class=\"wp-image-564\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/zerodium_prices.png 906w, https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/zerodium_prices-300x199.png 300w, https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/zerodium_prices-330x220.png 330w\" sizes=\"(max-width: 906px) 100vw, 906px\" \/><\/a><figcaption class=\"wp-element-caption\">Source : zerodium.com<\/figcaption><\/figure>\n<\/div>\n\n\n<p>Contrairement au service \u00ab Absolute Zero-Day \u00bb, les d\u00e9veloppeurs d\u2019exploits n\u2019ont pas besoin d\u2019\u00eatre qualifi\u00e9s. En ce qui concerne leurs clients, ZERODIUM n\u2019accepte que des entreprises majeures actives dans la D\u00e9fense, la Finance, la Technologie ainsi que les agences gouvernementales.<\/p>\n\n\n\n<h4 class=\"has-accent-color has-text-color wp-block-heading\"><br>March\u00e9 parall\u00e8le<\/h4>\n\n\n\n<p>Comme nous l\u2019avons vu ci-dessus, <strong>il est tr\u00e8s difficile, voire impossible, d\u2019acheter des exploits \u00e0 ces entreprises<\/strong>. C\u2019est pourquoi des lieux de vente et d\u2019\u00e9change alternatifs ont vu le jour.<\/p>\n\n\n\n<p>La plupart du temps, <strong>il s\u2019agit de forum priv\u00e9s ou semi-priv\u00e9s<\/strong> o\u00f9 il est possible pour n\u2019importe qui, moyennant finances, d\u2019acheter des exploits 0-day mais \u00e9galement des Exploit kit, des outils de hacking, etc.<\/p>\n\n\n\n<p>Un exemple est le forum priv\u00e9 DarkLife. Pour y avoir acc\u00e8s, il est n\u00e9cessaire d\u2019\u00eatre d\u00e9j\u00e0 connu ou de payer 100 dollars USD. Une fois connect\u00e9 et v\u00e9rifi\u00e9, il est possible d\u2019acc\u00e9der aux diff\u00e9rentes sections du forum :<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"644\" height=\"431\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/DarkLife_invite.png\" alt=\"DarkLife Invitation Form\" class=\"wp-image-1653\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/DarkLife_invite.png 644w, https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/DarkLife_invite-300x201.png 300w, https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/DarkLife_invite-330x220.png 330w\" sizes=\"(max-width: 644px) 100vw, 644px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"643\" height=\"504\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/DarkLife_logged.png\" alt=\"DarkLife Forum\" class=\"wp-image-1654\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/DarkLife_logged.png 643w, https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/DarkLife_logged-300x235.png 300w\" sizes=\"(max-width: 643px) 100vw, 643px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<p>Un autre exemple, sur le forum exploit.in, ou l\u2019utilisateur BuggyCorp propose un exploit 0-day de type \u00e9l\u00e9vation de privil\u00e8ges concernant <strong>toutes les versions de Windows pour 90&#8217;000 dollars<\/strong>.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/BuggyCorp.png\"><img decoding=\"async\" width=\"300\" height=\"129\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/BuggyCorp-300x129.png\" alt=\"BuggyCorp selling exploit\" class=\"wp-image-567\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/BuggyCorp-300x129.png 300w, https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/BuggyCorp-1024x440.png 1024w, https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/BuggyCorp.png 1890w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p>Une vid\u00e9o montrant l\u2019efficacit\u00e9 de l\u2019exploit malgr\u00e9 la pr\u00e9sence de l\u2019outil EMET (voir <a href=\"\/\/www.adlice.com\/fr\/exploit-kits-partie-1\">partie I<\/a>) est \u00e9galement pr\u00e9sente.<\/p>\n\n\n\n<h4 class=\"has-accent-color has-text-color wp-block-heading\"><br>Exemple de transaction<\/h4>\n\n\n\n<p>Nous \u00e9tudieront ici une transaction r\u00e9alis\u00e9e entre le hacker russe Vitaliy Toropov et la soci\u00e9t\u00e9 <a href=\"https:\/\/fr.wikipedia.org\/wiki\/Hacking_Team\">Hacking Team<\/a>, sp\u00e9cialis\u00e9e dans la vente de logiciels servant \u00e0 l&#8217;espionnage et \u00e0 la surveillance.<\/p>\n\n\n\n<p><strong>Le 13 octobre 2013<\/strong>, Vitaliy Toropov contacte la soci\u00e9t\u00e9 et propose de lui vendre six exploits concernant Windows, Java, Flash Player et Safari, <strong>pour un prix de 30&#8217;000 \u00e0 45&#8217;000 dollars par exploit<\/strong>.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Hi, is your company interested in buying zero-day vulnerabilities with RCE exploits for the latest versions of Flash Player, Silverlight, Java, Safari?<\/p>\n\n\n\n<p>All exploits allow to embed and remote execute custom payloads and demonstrate modern techniques for bypassing ASLR and DEP-like protections on Windows, OS X, and iOS without using of unreliable ROP and heap sprays.<\/p>\n<\/blockquote>\n\n\n\n<p>La soci\u00e9t\u00e9 n\u2019est int\u00e9ress\u00e9e que par l\u2019exploit concernant Flash Player. <strong>Le 25 octobre<\/strong>, un accord est pass\u00e9 entre Toropov et Hacking Team, dont les clauses sont les suivantes :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Le prix est fix\u00e9 \u00e0 45&#8217;000 dollars pour une vente non-exclusive et un rabais sur les prochains exploits<\/li>\n\n\n\n<li>Les sources de l\u2019exploit sont envoy\u00e9es, et trois jours de tests sont pr\u00e9vus<\/li>\n\n\n\n<li>Le paiement sera r\u00e9alis\u00e9 en trois parties : 20&#8217;000, 15&#8217;000 et 10&#8217;000 dollars<\/li>\n\n\n\n<li>Le paiement peut \u00eatre interrompu si la vuln\u00e9rabilit\u00e9 est corrig\u00e9e par le vendeur<\/li>\n\n\n\n<li>Hacking Team s\u2019engage \u00e0 ne pas rapporter cette vuln\u00e9rabilit\u00e9s au vendeur<\/li>\n<\/ul>\n\n\n\n<p><strong>Le 29 octobre<\/strong>, Hacking Team teste l\u2019exploit et le 30 octobre, Toropov re\u00e7oit la premi\u00e8re partie du paiement. Il est ensuite pr\u00e9cis\u00e9 que le rabais sera de 5&#8217;000 dollars pour le second exploit et de 10&#8217;000 dollars pour le troisi\u00e8me.<\/p>\n\n\n\n<p>Au total, la soci\u00e9t\u00e9 Hacking Team a achet\u00e9 pour un montant minimum connu de <strong>84&#8217;000 dollars d\u2019exploits<\/strong> \u00e0 Vitaliy Toropov.<\/p>\n\n\n\n<h4 class=\"has-accent-color has-text-color wp-block-heading\"><br>Conclusion<\/h4>\n\n\n\n<p>Il est tout \u00e0 fait l\u00e9gal de rechercher des vuln\u00e9rabilit\u00e9s et des exploits pour celles-ci. Les soci\u00e9t\u00e9s \u00e9ditrices de logiciels l\u2019ont bien compris et proposent depuis quelques ann\u00e9es des programmes de Bug Bounty. Toutefois, ces programmes ne peuvent rivaliser en termes financiers avec les soci\u00e9t\u00e9s et les plateformes sp\u00e9cialis\u00e9es dans la revente d\u2019exploits. Il n\u2019est donc que peu probable de voir celles-ci dispara\u00eetre \u00e0 court ou moyen termes.<\/p>\n\n\n\n<p>Comme nous avons pu le voir avec la transaction r\u00e9alis\u00e9e entre Vitaliy Toropov et la soci\u00e9t\u00e9 Hacking Team, <strong>l\u2019acquisition d\u2019un exploit respecte des conditions strictes<\/strong> (engagement du client, test de l\u2019exploit, mesures de garantie, etc.) <strong>m\u00eame sur le march\u00e9 parall\u00e8le<\/strong>, assurant \u00e0 la fois les int\u00e9r\u00eats du d\u00e9veloppeur et du client.<\/p>\n\n\n\n<p>Il est ainsi possible d\u2019imaginer que certaines soci\u00e9t\u00e9s n\u2019h\u00e9sitent pas \u00e0 r\u00e9aliser des transactions de ce genre, pour des motifs plus ou moins louables.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>D\u00e9couvrez le fonctionnement des lieux o\u00f9 les transactions entre vendeurs et acheteurs d&#8217;exploits ont lieu ainsi que les conditions de ces transactions.<\/p>\n","protected":false},"author":1,"featured_media":271,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[453,456,360],"class_list":["post-562","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-non-classifiee","tag-bug-bounty","tag-marche-noir","tag-vulnerabilite","category-2","description-off"],"views":320,"yoast_score":63,"yoast_readable":60,"featured_image_src":"https:\/\/www.adlice.com\/wp-content\/uploads\/2014\/10\/malware.jpg","author_info":{"display_name":"tigzy","author_link":"https:\/\/www.adlice.com\/fr\/author\/tigzy\/"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Exploit kits, Part. 2: Comment sont-ils Mon\u00e9tis\u00e9s? \u2022 Adlice Software<\/title>\n<meta name=\"description\" content=\"Les Exploits kits sont une des fa\u00e7ons pr\u00e9f\u00e9r\u00e9es de distribuer des malware. Comment gagnent t-ils de l&#039;argent ? Explications.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-2\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Exploit kits, Part. 2: Comment sont-ils Mon\u00e9tis\u00e9s? \u2022 Adlice Software\" \/>\n<meta property=\"og:description\" content=\"Les Exploits kits sont une des fa\u00e7ons pr\u00e9f\u00e9r\u00e9es de distribuer des malware. Comment gagnent t-ils de l&#039;argent ? Explications.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Adlice Software\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/RogueKiller\" \/>\n<meta property=\"article:published_time\" content=\"2016-10-03T16:09:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-21T10:36:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2014\/10\/malware.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1317\" \/>\n\t<meta property=\"og:image:height\" content=\"786\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"tigzy\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@AdliceSoftware\" \/>\n<meta name=\"twitter:site\" content=\"@AdliceSoftware\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"tigzy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-2\/\"},\"author\":{\"name\":\"tigzy\",\"@id\":\"https:\/\/www.adlice.com\/fr\/#\/schema\/person\/a02b30804320a4059d268dc2567a307d\"},\"headline\":\"Exploits et Exploit kits: Partie II \u2013 Comment gagnent t-ils de l&#8217;argent ?\",\"datePublished\":\"2016-10-03T16:09:04+00:00\",\"dateModified\":\"2022-12-21T10:36:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-2\/\"},\"wordCount\":1125,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.adlice.com\/fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2014\/10\/malware.jpg\",\"keywords\":[\"bug bounty\",\"march\u00e9 noir\",\"vulnerabilit\u00e9\"],\"articleSection\":[\"Non classifi\u00e9(e)\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-2\/\",\"url\":\"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-2\/\",\"name\":\"Exploit kits, Part. 2: Comment sont-ils Mon\u00e9tis\u00e9s? \u2022 Adlice Software\",\"isPartOf\":{\"@id\":\"https:\/\/www.adlice.com\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2014\/10\/malware.jpg\",\"datePublished\":\"2016-10-03T16:09:04+00:00\",\"dateModified\":\"2022-12-21T10:36:29+00:00\",\"description\":\"Les Exploits kits sont une des fa\u00e7ons pr\u00e9f\u00e9r\u00e9es de distribuer des malware. Comment gagnent t-ils de l'argent ? Explications.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-2\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-2\/#primaryimage\",\"url\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2014\/10\/malware.jpg\",\"contentUrl\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2014\/10\/malware.jpg\",\"width\":1317,\"height\":786},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.adlice.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Exploits et Exploit kits: Partie II \u2013 Comment gagnent t-ils de l&#8217;argent ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.adlice.com\/fr\/#website\",\"url\":\"https:\/\/www.adlice.com\/fr\/\",\"name\":\"Adlice Software\",\"description\":\"Anti-malware and analysis tools\",\"publisher\":{\"@id\":\"https:\/\/www.adlice.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.adlice.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.adlice.com\/fr\/#organization\",\"name\":\"Adlice Software\",\"url\":\"https:\/\/www.adlice.com\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.adlice.com\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png\",\"contentUrl\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png\",\"width\":276,\"height\":276,\"caption\":\"Adlice Software\"},\"image\":{\"@id\":\"https:\/\/www.adlice.com\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/RogueKiller\",\"https:\/\/x.com\/AdliceSoftware\",\"https:\/\/fr.linkedin.com\/company\/adlice-software\",\"https:\/\/www.youtube.com\/channel\/UC4CQ-gIZMGWxl-auf0QqYhQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.adlice.com\/fr\/#\/schema\/person\/a02b30804320a4059d268dc2567a307d\",\"name\":\"tigzy\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.adlice.com\/fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d81e380961b1b69969fa84994ad1e4cba26afe93a49d8dd3148e9c33ffe4ccac?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d81e380961b1b69969fa84994ad1e4cba26afe93a49d8dd3148e9c33ffe4ccac?s=96&d=mm&r=g\",\"caption\":\"tigzy\"},\"description\":\"Founder and owner of Adlice Software, Tigzy started as lead developer on the popular Anti-malware called RogueKiller. Involved in all the Adlice projects as lead developer, Tigzy is also doing research and reverse engineering as well as writing blog posts.\",\"url\":\"https:\/\/www.adlice.com\/fr\/author\/tigzy\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Exploit kits, Part. 2: Comment sont-ils Mon\u00e9tis\u00e9s? \u2022 Adlice Software","description":"Les Exploits kits sont une des fa\u00e7ons pr\u00e9f\u00e9r\u00e9es de distribuer des malware. Comment gagnent t-ils de l'argent ? Explications.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-2\/","og_locale":"fr_FR","og_type":"article","og_title":"Exploit kits, Part. 2: Comment sont-ils Mon\u00e9tis\u00e9s? \u2022 Adlice Software","og_description":"Les Exploits kits sont une des fa\u00e7ons pr\u00e9f\u00e9r\u00e9es de distribuer des malware. Comment gagnent t-ils de l'argent ? Explications.","og_url":"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-2\/","og_site_name":"Adlice Software","article_publisher":"https:\/\/www.facebook.com\/RogueKiller","article_published_time":"2016-10-03T16:09:04+00:00","article_modified_time":"2022-12-21T10:36:29+00:00","og_image":[{"width":1317,"height":786,"url":"https:\/\/www.adlice.com\/wp-content\/uploads\/2014\/10\/malware.jpg","type":"image\/jpeg"}],"author":"tigzy","twitter_card":"summary_large_image","twitter_creator":"@AdliceSoftware","twitter_site":"@AdliceSoftware","twitter_misc":{"\u00c9crit par":"tigzy","Dur\u00e9e de lecture estim\u00e9e":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-2\/#article","isPartOf":{"@id":"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-2\/"},"author":{"name":"tigzy","@id":"https:\/\/www.adlice.com\/fr\/#\/schema\/person\/a02b30804320a4059d268dc2567a307d"},"headline":"Exploits et Exploit kits: Partie II \u2013 Comment gagnent t-ils de l&#8217;argent ?","datePublished":"2016-10-03T16:09:04+00:00","dateModified":"2022-12-21T10:36:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-2\/"},"wordCount":1125,"commentCount":0,"publisher":{"@id":"https:\/\/www.adlice.com\/fr\/#organization"},"image":{"@id":"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.adlice.com\/wp-content\/uploads\/2014\/10\/malware.jpg","keywords":["bug bounty","march\u00e9 noir","vulnerabilit\u00e9"],"articleSection":["Non classifi\u00e9(e)"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-2\/","url":"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-2\/","name":"Exploit kits, Part. 2: Comment sont-ils Mon\u00e9tis\u00e9s? \u2022 Adlice Software","isPartOf":{"@id":"https:\/\/www.adlice.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-2\/#primaryimage"},"image":{"@id":"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.adlice.com\/wp-content\/uploads\/2014\/10\/malware.jpg","datePublished":"2016-10-03T16:09:04+00:00","dateModified":"2022-12-21T10:36:29+00:00","description":"Les Exploits kits sont une des fa\u00e7ons pr\u00e9f\u00e9r\u00e9es de distribuer des malware. Comment gagnent t-ils de l'argent ? Explications.","breadcrumb":{"@id":"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-2\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.adlice.com\/fr\/exploit-kits-partie-2\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-2\/#primaryimage","url":"https:\/\/www.adlice.com\/wp-content\/uploads\/2014\/10\/malware.jpg","contentUrl":"https:\/\/www.adlice.com\/wp-content\/uploads\/2014\/10\/malware.jpg","width":1317,"height":786},{"@type":"BreadcrumbList","@id":"https:\/\/www.adlice.com\/fr\/exploit-kits-partie-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.adlice.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Exploits et Exploit kits: Partie II \u2013 Comment gagnent t-ils de l&#8217;argent ?"}]},{"@type":"WebSite","@id":"https:\/\/www.adlice.com\/fr\/#website","url":"https:\/\/www.adlice.com\/fr\/","name":"Adlice Software","description":"Anti-malware and analysis tools","publisher":{"@id":"https:\/\/www.adlice.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.adlice.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.adlice.com\/fr\/#organization","name":"Adlice Software","url":"https:\/\/www.adlice.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.adlice.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png","contentUrl":"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png","width":276,"height":276,"caption":"Adlice Software"},"image":{"@id":"https:\/\/www.adlice.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/RogueKiller","https:\/\/x.com\/AdliceSoftware","https:\/\/fr.linkedin.com\/company\/adlice-software","https:\/\/www.youtube.com\/channel\/UC4CQ-gIZMGWxl-auf0QqYhQ"]},{"@type":"Person","@id":"https:\/\/www.adlice.com\/fr\/#\/schema\/person\/a02b30804320a4059d268dc2567a307d","name":"tigzy","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.adlice.com\/fr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d81e380961b1b69969fa84994ad1e4cba26afe93a49d8dd3148e9c33ffe4ccac?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d81e380961b1b69969fa84994ad1e4cba26afe93a49d8dd3148e9c33ffe4ccac?s=96&d=mm&r=g","caption":"tigzy"},"description":"Founder and owner of Adlice Software, Tigzy started as lead developer on the popular Anti-malware called RogueKiller. Involved in all the Adlice projects as lead developer, Tigzy is also doing research and reverse engineering as well as writing blog posts.","url":"https:\/\/www.adlice.com\/fr\/author\/tigzy\/"}]}},"_links":{"self":[{"href":"https:\/\/www.adlice.com\/fr\/wp-json\/wp\/v2\/posts\/562","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.adlice.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.adlice.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.adlice.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adlice.com\/fr\/wp-json\/wp\/v2\/comments?post=562"}],"version-history":[{"count":0,"href":"https:\/\/www.adlice.com\/fr\/wp-json\/wp\/v2\/posts\/562\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.adlice.com\/fr\/wp-json\/wp\/v2\/media\/271"}],"wp:attachment":[{"href":"https:\/\/www.adlice.com\/fr\/wp-json\/wp\/v2\/media?parent=562"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.adlice.com\/fr\/wp-json\/wp\/v2\/categories?post=562"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.adlice.com\/fr\/wp-json\/wp\/v2\/tags?post=562"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}