{"id":1167,"date":"2019-08-27T15:03:34","date_gmt":"2019-08-27T13:03:34","guid":{"rendered":"https:\/\/fr.koddos.net\/blog\/?p=1167"},"modified":"2019-08-28T15:06:30","modified_gmt":"2019-08-28T13:06:30","slug":"un-chercheur-decouvre-une-faille-sur-instagram-susceptible-dentrainer-un-piratage-de-taille-et-obtient-une-recompense","status":"publish","type":"post","link":"https:\/\/fr.koddos.net\/blog\/un-chercheur-decouvre-une-faille-sur-instagram-susceptible-dentrainer-un-piratage-de-taille-et-obtient-une-recompense\/","title":{"rendered":"UN CHERCHEUR D\u00c9COUVRE UNE FAILLE SUR INSTAGRAM SUSCEPTIBLE D&rsquo;ENTRA\u00ceNER UN PIRATAGE DE TAILLE, ET OBTIENT UNE R\u00c9COMPENSE"},"content":{"rendered":"\n<p>Imaginons\nqu&rsquo;un cybercriminel dispose des ressources et de l&rsquo;expertise n\u00e9cessaires pour\ng\u00e9rer plus d&rsquo;un million de comptes en dix minutes. C&rsquo;est pr\u00e9cis\u00e9ment ce que\nrisquait Instagram en raison d&rsquo;une faille de s\u00e9curit\u00e9 cruciale, selon le\nsp\u00e9cialiste Laxman Muthiyah.<\/p>\n\n\n\n<p>Sur\nson <strong><a href=\"https:\/\/twitter.com\/LaxmanMuthiyah\">profil\nTwitter<\/a><\/strong>, Laxman Muthiyah se dit d\u00e9veloppeur Web, un chercheur en\ns\u00e9curit\u00e9 et \u00abparfois hacker\u00bb, bien qu&rsquo;il soit l&rsquo;un des experts qui d\u00e9tecte les\nfailles potentielles et <strong>les <a href=\"https:\/\/thezerohack.com\/hack-any-instagram\">communique<\/a><\/strong> \u00e0\nl&rsquo;entit\u00e9 afin que ces failles puissent \u00eatre corrig\u00e9 \u00e0 temps, et m\u00eame obtenir\nensuite des primes pour son travail.<\/p>\n\n\n\n<p><strong>Un\nexploit important<\/strong><\/p>\n\n\n\n<p>R\u00e9cemment,\nMuthiyah a identifi\u00e9 un exploit important sur Instagram, en particulier, dans\nla fa\u00e7on dont les m\u00e9dias sociaux et le r\u00e9seau d&rsquo;affichage ont g\u00e9r\u00e9 la\nvalidation de ses codes de r\u00e9initialisation de mot de passe. La vuln\u00e9rabilit\u00e9\naurait pu faire en sorte qu&rsquo;un hacker demande un million de codes de\nr\u00e9initialisation de mot de passe dans un espace de temps de 10 minutes avec un\npourcentage de r\u00e9ussite sans faille.<\/p>\n\n\n\n<p>Avec\nla vuln\u00e9rabilit\u00e9 potentielle, il n&rsquo;\u00e9tait pas n\u00e9cessaire d&rsquo;utiliser des listes\nou des astuces suppl\u00e9mentaires pour voler et pirater les mots de passe\nInstagram. Au lieu de cela, l\u2019attaquant pourrait simplement utiliser le\nprocessus de r\u00e9initialisation du mot de passe du syst\u00e8me et violer des milliers\nde comptes.<\/p>\n\n\n\n<p>Le\nsp\u00e9cialiste avait d\u00e9j\u00e0 d\u00e9couvert une<a href=\"https:\/\/koddos.net\/blog\/a-new-bluetooth-vulnerability-called-knob-poses-a-threat-to-vulnerable-devices\/\">\n<strong>vuln\u00e9rabilit\u00e9 <\/strong><\/a>&nbsp;en juillet, qui\npermettait aux cybercriminels de pirater un compte sans autorisation. Facebook\n(rappelez-vous qu&rsquo; Instagram appartient au g\u00e9ant des r\u00e9seaux sociaux) lui a\nvers\u00e9 30 000 dollars pour son aide pr\u00e9cieuse, et le probl\u00e8me a \u00e9t\u00e9 rapidement\nr\u00e9solu. Cela signifiait qu&rsquo;Instagram utilisait des codes de r\u00e9initialisation de\nmot de passe \u00e0 six chiffres pour valider l&rsquo;op\u00e9ration.<\/p>\n\n\n\n<p>Le\nchercheur a rep\u00e9r\u00e9 un moyen de contourner les mesures de d\u00e9tection des attaques\npar force brute utilis\u00e9es par la plate-forme pour \u00e9viter que des agents\nexternes ne d\u00e9chiffrent le code en tirant parti de niveaux de puissance de\ntraitement facilement accessibles.<\/p>\n\n\n\n<p>Et\nalors que l&rsquo;expert avait d\u00e9j\u00e0 identifi\u00e9 trois vuln\u00e9rabilit\u00e9s sur Facebook dans\nle pass\u00e9 et qu&rsquo;il s&rsquo;agissait de la quatri\u00e8me, il n&rsquo;allait pas en rester l\u00e0. En\nfin de compte, il a d\u00e9couvert qu&rsquo;il pourrait exister d&rsquo;autres vuln\u00e9rabilit\u00e9s de\nprise de contr\u00f4le au niveau du point d&rsquo;extr\u00e9mit\u00e9 du mot de passe.<\/p>\n\n\n\n<p><strong>Probl\u00e8mes\nli\u00e9s au syst\u00e8me de code de r\u00e9initialisation de mot de passe<\/strong><\/p>\n\n\n\n<p>Bien\nque moins s\u00e9v\u00e8re que le dernier <strong><a href=\"https:\/\/koddos.net\/blog\/cybercriminals-are-exploiting-vulnerable-servers-of-two-famous-vpns\/\">exploit<\/a><\/strong>,\nMuthiyah s&rsquo;est concentr\u00e9 sur l&rsquo;ID de l&rsquo;appareil qu&rsquo;Instagram utilise comme\nidentifiant unique pour valider les chiffres de r\u00e9initialisation du mot de\npasse.<\/p>\n\n\n\n<p>Il\na expliqu\u00e9 que lorsqu&rsquo;une personne demande un code d&rsquo;acc\u00e8s via son appareil\nmobile, un ID d&rsquo;appareil est envoy\u00e9 avec cette demande et que le m\u00eame ID\nd&rsquo;appareil est ensuite utilis\u00e9 pour v\u00e9rifier ce code.<\/p>\n\n\n\n<p>Comme\nMuthiyah est constamment \u00e0 la recherche de sc\u00e9narios alternatifs ou\nhypoth\u00e9tiques, il est souvent cr\u00e9atif dans la recherche de probl\u00e8mes et dans la\nrecherche de solutions. \u00c0 ce propos, il s&rsquo;est demand\u00e9 si le m\u00eame ID d&rsquo;appareil\n\u00e9tait utilis\u00e9 pour demander des codes de r\u00e9initialisation de mot de passe pour\nplusieurs comptes. Malheureusement, c&rsquo;\u00e9tait le cas.<\/p>\n\n\n\n<p>Dor\u00e9navant,\nil n&rsquo;y avait plus qu&rsquo;\u00e0 faire des calculs math\u00e9matiques simples. Les codes \u00e0 six\nchiffres avaient un million de probabilit\u00e9s. Par cons\u00e9quent, demander des codes\n\u00e0 100 000 personnes \u00e0 partir du m\u00eame ID de p\u00e9riph\u00e9rique renverrait un\npourcentage de r\u00e9ussite de 10%.<\/p>\n\n\n\n<p>Pourtant,\nsi un million de codes d&rsquo;utilisateur \u00e9taient demand\u00e9s, le taux de succ\u00e8s du\npirate potentiel pourrait atteindre 100 % en incr\u00e9mentant le mot de passe un\npar un.<\/p>\n\n\n\n<p><strong>Un\nespace de temps de 10 minutes<\/strong><\/p>\n\n\n\n<p>Il\ny a cependant un b\u00e9mol. Les 10 minutes pr\u00e9c\u00e9demment mentionn\u00e9es dans l&rsquo;article\nsont dues au fait que les codes de r\u00e9initialisation de mot de passe d&rsquo;Instagram\ndurent 10 minutes et qu&rsquo;ils expirent une fois \u00e9coul\u00e9. Cependant, il pourrait\n\u00eatre plus que suffisant pour se solder en une <strong><a href=\"https:\/\/koddos.net\/blog\/school-hacking-is-still-a-thing-bored-cybersecurity-loving-teen-reveals-how-he-got-access-to-millions-of-student-records\/\">attaque\nde piratage de taille<\/a><\/strong>. Le chercheur a d\u00e9clar\u00e9 que l&rsquo;attaque\ndevait alors \u00eatre effectu\u00e9e dans ce d\u00e9lai.<\/p>\n\n\n\n<p>Les\nmembres du personnel de s\u00e9curit\u00e9 de Facebook ont rapidement r\u00e9agi et ont\nconfirm\u00e9 l&rsquo;exploit potentiel, mais ils l&rsquo;ont \u00e9galement corrig\u00e9 \u00e0 temps. Le\nr\u00e9seau social a indiqu\u00e9 que Muthiyah avait d\u00e9tect\u00e9 des protections\ninsuffisantes sur un point d&rsquo;extr\u00e9mit\u00e9 de r\u00e9cup\u00e9ration, ce qui permettrait \u00e0 un\nhacker de g\u00e9n\u00e9rer plusieurs nonces valides (terme associ\u00e9 \u00e0 la cryptographie\nd\u00e9signant un nombre arbitraire pouvant \u00eatre utilis\u00e9 une seule fois) pour tenter\nune r\u00e9cup\u00e9ration.<\/p>\n\n\n\n<p>Le\nr\u00e9seau social a remis \u00e0 l&rsquo;\u00ab\u00e9thique hacker\u00bb une prime de 10 000 dollars en guise\nde remerciement pour son aide.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Imaginons qu&rsquo;un cybercriminel dispose des ressources et de l&rsquo;expertise n\u00e9cessaires pour g\u00e9rer plus d&rsquo;un million de comptes en dix minutes. C&rsquo;est pr\u00e9cis\u00e9ment ce que risquait Instagram en raison d&rsquo;une faille de s\u00e9curit\u00e9 cruciale, selon le sp\u00e9cialiste Laxman Muthiyah. Sur son profil Twitter, Laxman Muthiyah se dit d\u00e9veloppeur Web, un chercheur en s\u00e9curit\u00e9 et \u00abparfois hacker\u00bb, &hellip; <a href=\"https:\/\/fr.koddos.net\/blog\/un-chercheur-decouvre-une-faille-sur-instagram-susceptible-dentrainer-un-piratage-de-taille-et-obtient-une-recompense\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">UN CHERCHEUR D\u00c9COUVRE UNE FAILLE SUR INSTAGRAM SUSCEPTIBLE D&rsquo;ENTRA\u00ceNER UN PIRATAGE DE TAILLE, ET OBTIENT UNE R\u00c9COMPENSE<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":1168,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"jetpack_post_was_ever_published":false},"categories":[6],"tags":[],"class_list":["post-1167","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>UN CHERCHEUR D\u00c9COUVRE UNE FAILLE SUR INSTAGRAM SUSCEPTIBLE D&#039;ENTRA\u00ceNER UN PIRATAGE DE TAILLE, ET OBTIENT UNE R\u00c9COMPENSE - Blog KoDDoS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fr.koddos.net\/blog\/un-chercheur-decouvre-une-faille-sur-instagram-susceptible-dentrainer-un-piratage-de-taille-et-obtient-une-recompense\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"UN CHERCHEUR D\u00c9COUVRE UNE FAILLE SUR INSTAGRAM SUSCEPTIBLE D&#039;ENTRA\u00ceNER UN PIRATAGE DE TAILLE, ET OBTIENT UNE R\u00c9COMPENSE - Blog KoDDoS\" \/>\n<meta property=\"og:description\" content=\"Imaginons qu&rsquo;un cybercriminel dispose des ressources et de l&rsquo;expertise n\u00e9cessaires pour g\u00e9rer plus d&rsquo;un million de comptes en dix minutes. C&rsquo;est pr\u00e9cis\u00e9ment ce que risquait Instagram en raison d&rsquo;une faille de s\u00e9curit\u00e9 cruciale, selon le sp\u00e9cialiste Laxman Muthiyah. Sur son profil Twitter, Laxman Muthiyah se dit d\u00e9veloppeur Web, un chercheur en s\u00e9curit\u00e9 et \u00abparfois hacker\u00bb, &hellip; Continue reading UN CHERCHEUR D\u00c9COUVRE UNE FAILLE SUR INSTAGRAM SUSCEPTIBLE D&rsquo;ENTRA\u00ceNER UN PIRATAGE DE TAILLE, ET OBTIENT UNE R\u00c9COMPENSE\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fr.koddos.net\/blog\/un-chercheur-decouvre-une-faille-sur-instagram-susceptible-dentrainer-un-piratage-de-taille-et-obtient-une-recompense\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog KoDDoS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/koddosCom\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-27T13:03:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-08-28T13:06:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/08\/Researcher-Spots-Instagram-Vulnerability-that-Could-Result-in-Enormous-Hack-Gets-Reward.jpg?fit=825%2C510&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"825\" \/>\n\t<meta property=\"og:image:height\" content=\"510\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"KoDDoS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:site\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"KoDDoS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/un-chercheur-decouvre-une-faille-sur-instagram-susceptible-dentrainer-un-piratage-de-taille-et-obtient-une-recompense\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/un-chercheur-decouvre-une-faille-sur-instagram-susceptible-dentrainer-un-piratage-de-taille-et-obtient-une-recompense\\\/\"},\"author\":{\"name\":\"KoDDoS\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\"},\"headline\":\"UN CHERCHEUR D\u00c9COUVRE UNE FAILLE SUR INSTAGRAM SUSCEPTIBLE D&rsquo;ENTRA\u00ceNER UN PIRATAGE DE TAILLE, ET OBTIENT UNE R\u00c9COMPENSE\",\"datePublished\":\"2019-08-27T13:03:34+00:00\",\"dateModified\":\"2019-08-28T13:06:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/un-chercheur-decouvre-une-faille-sur-instagram-susceptible-dentrainer-un-piratage-de-taille-et-obtient-une-recompense\\\/\"},\"wordCount\":875,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/un-chercheur-decouvre-une-faille-sur-instagram-susceptible-dentrainer-un-piratage-de-taille-et-obtient-une-recompense\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/Researcher-Spots-Instagram-Vulnerability-that-Could-Result-in-Enormous-Hack-Gets-Reward.jpg?fit=825%2C510&ssl=1\",\"articleSection\":[\"Actualit\u00e9s\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/un-chercheur-decouvre-une-faille-sur-instagram-susceptible-dentrainer-un-piratage-de-taille-et-obtient-une-recompense\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/un-chercheur-decouvre-une-faille-sur-instagram-susceptible-dentrainer-un-piratage-de-taille-et-obtient-une-recompense\\\/\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/un-chercheur-decouvre-une-faille-sur-instagram-susceptible-dentrainer-un-piratage-de-taille-et-obtient-une-recompense\\\/\",\"name\":\"UN CHERCHEUR D\u00c9COUVRE UNE FAILLE SUR INSTAGRAM SUSCEPTIBLE D'ENTRA\u00ceNER UN PIRATAGE DE TAILLE, ET OBTIENT UNE R\u00c9COMPENSE - Blog KoDDoS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/un-chercheur-decouvre-une-faille-sur-instagram-susceptible-dentrainer-un-piratage-de-taille-et-obtient-une-recompense\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/un-chercheur-decouvre-une-faille-sur-instagram-susceptible-dentrainer-un-piratage-de-taille-et-obtient-une-recompense\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/Researcher-Spots-Instagram-Vulnerability-that-Could-Result-in-Enormous-Hack-Gets-Reward.jpg?fit=825%2C510&ssl=1\",\"datePublished\":\"2019-08-27T13:03:34+00:00\",\"dateModified\":\"2019-08-28T13:06:30+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/un-chercheur-decouvre-une-faille-sur-instagram-susceptible-dentrainer-un-piratage-de-taille-et-obtient-une-recompense\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/un-chercheur-decouvre-une-faille-sur-instagram-susceptible-dentrainer-un-piratage-de-taille-et-obtient-une-recompense\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/un-chercheur-decouvre-une-faille-sur-instagram-susceptible-dentrainer-un-piratage-de-taille-et-obtient-une-recompense\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/Researcher-Spots-Instagram-Vulnerability-that-Could-Result-in-Enormous-Hack-Gets-Reward.jpg?fit=825%2C510&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/Researcher-Spots-Instagram-Vulnerability-that-Could-Result-in-Enormous-Hack-Gets-Reward.jpg?fit=825%2C510&ssl=1\",\"width\":825,\"height\":510},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/un-chercheur-decouvre-une-faille-sur-instagram-susceptible-dentrainer-un-piratage-de-taille-et-obtient-une-recompense\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"UN CHERCHEUR D\u00c9COUVRE UNE FAILLE SUR INSTAGRAM SUSCEPTIBLE D&rsquo;ENTRA\u00ceNER UN PIRATAGE DE TAILLE, ET OBTIENT UNE R\u00c9COMPENSE\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"name\":\"Blog KoDDoS\",\"description\":\"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.\",\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\",\"name\":\"KoDDoS\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"width\":258,\"height\":55,\"caption\":\"KoDDoS\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/koddosCom\",\"https:\\\/\\\/x.com\\\/koddoscom\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\",\"name\":\"KoDDoS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"caption\":\"KoDDoS\"},\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/author\\\/oiyndjepop\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"UN CHERCHEUR D\u00c9COUVRE UNE FAILLE SUR INSTAGRAM SUSCEPTIBLE D'ENTRA\u00ceNER UN PIRATAGE DE TAILLE, ET OBTIENT UNE R\u00c9COMPENSE - Blog KoDDoS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fr.koddos.net\/blog\/un-chercheur-decouvre-une-faille-sur-instagram-susceptible-dentrainer-un-piratage-de-taille-et-obtient-une-recompense\/","og_locale":"fr_FR","og_type":"article","og_title":"UN CHERCHEUR D\u00c9COUVRE UNE FAILLE SUR INSTAGRAM SUSCEPTIBLE D'ENTRA\u00ceNER UN PIRATAGE DE TAILLE, ET OBTIENT UNE R\u00c9COMPENSE - Blog KoDDoS","og_description":"Imaginons qu&rsquo;un cybercriminel dispose des ressources et de l&rsquo;expertise n\u00e9cessaires pour g\u00e9rer plus d&rsquo;un million de comptes en dix minutes. C&rsquo;est pr\u00e9cis\u00e9ment ce que risquait Instagram en raison d&rsquo;une faille de s\u00e9curit\u00e9 cruciale, selon le sp\u00e9cialiste Laxman Muthiyah. Sur son profil Twitter, Laxman Muthiyah se dit d\u00e9veloppeur Web, un chercheur en s\u00e9curit\u00e9 et \u00abparfois hacker\u00bb, &hellip; Continue reading UN CHERCHEUR D\u00c9COUVRE UNE FAILLE SUR INSTAGRAM SUSCEPTIBLE D&rsquo;ENTRA\u00ceNER UN PIRATAGE DE TAILLE, ET OBTIENT UNE R\u00c9COMPENSE","og_url":"https:\/\/fr.koddos.net\/blog\/un-chercheur-decouvre-une-faille-sur-instagram-susceptible-dentrainer-un-piratage-de-taille-et-obtient-une-recompense\/","og_site_name":"Blog KoDDoS","article_publisher":"https:\/\/www.facebook.com\/koddosCom","article_published_time":"2019-08-27T13:03:34+00:00","article_modified_time":"2019-08-28T13:06:30+00:00","og_image":[{"width":825,"height":510,"url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/08\/Researcher-Spots-Instagram-Vulnerability-that-Could-Result-in-Enormous-Hack-Gets-Reward.jpg?fit=825%2C510&ssl=1","type":"image\/jpeg"}],"author":"KoDDoS","twitter_card":"summary_large_image","twitter_creator":"@koddoscom","twitter_site":"@koddoscom","twitter_misc":{"\u00c9crit par":"KoDDoS","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fr.koddos.net\/blog\/un-chercheur-decouvre-une-faille-sur-instagram-susceptible-dentrainer-un-piratage-de-taille-et-obtient-une-recompense\/#article","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/un-chercheur-decouvre-une-faille-sur-instagram-susceptible-dentrainer-un-piratage-de-taille-et-obtient-une-recompense\/"},"author":{"name":"KoDDoS","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85"},"headline":"UN CHERCHEUR D\u00c9COUVRE UNE FAILLE SUR INSTAGRAM SUSCEPTIBLE D&rsquo;ENTRA\u00ceNER UN PIRATAGE DE TAILLE, ET OBTIENT UNE R\u00c9COMPENSE","datePublished":"2019-08-27T13:03:34+00:00","dateModified":"2019-08-28T13:06:30+00:00","mainEntityOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/un-chercheur-decouvre-une-faille-sur-instagram-susceptible-dentrainer-un-piratage-de-taille-et-obtient-une-recompense\/"},"wordCount":875,"commentCount":0,"publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/un-chercheur-decouvre-une-faille-sur-instagram-susceptible-dentrainer-un-piratage-de-taille-et-obtient-une-recompense\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/08\/Researcher-Spots-Instagram-Vulnerability-that-Could-Result-in-Enormous-Hack-Gets-Reward.jpg?fit=825%2C510&ssl=1","articleSection":["Actualit\u00e9s"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/fr.koddos.net\/blog\/un-chercheur-decouvre-une-faille-sur-instagram-susceptible-dentrainer-un-piratage-de-taille-et-obtient-une-recompense\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/fr.koddos.net\/blog\/un-chercheur-decouvre-une-faille-sur-instagram-susceptible-dentrainer-un-piratage-de-taille-et-obtient-une-recompense\/","url":"https:\/\/fr.koddos.net\/blog\/un-chercheur-decouvre-une-faille-sur-instagram-susceptible-dentrainer-un-piratage-de-taille-et-obtient-une-recompense\/","name":"UN CHERCHEUR D\u00c9COUVRE UNE FAILLE SUR INSTAGRAM SUSCEPTIBLE D'ENTRA\u00ceNER UN PIRATAGE DE TAILLE, ET OBTIENT UNE R\u00c9COMPENSE - Blog KoDDoS","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/un-chercheur-decouvre-une-faille-sur-instagram-susceptible-dentrainer-un-piratage-de-taille-et-obtient-une-recompense\/#primaryimage"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/un-chercheur-decouvre-une-faille-sur-instagram-susceptible-dentrainer-un-piratage-de-taille-et-obtient-une-recompense\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/08\/Researcher-Spots-Instagram-Vulnerability-that-Could-Result-in-Enormous-Hack-Gets-Reward.jpg?fit=825%2C510&ssl=1","datePublished":"2019-08-27T13:03:34+00:00","dateModified":"2019-08-28T13:06:30+00:00","breadcrumb":{"@id":"https:\/\/fr.koddos.net\/blog\/un-chercheur-decouvre-une-faille-sur-instagram-susceptible-dentrainer-un-piratage-de-taille-et-obtient-une-recompense\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fr.koddos.net\/blog\/un-chercheur-decouvre-une-faille-sur-instagram-susceptible-dentrainer-un-piratage-de-taille-et-obtient-une-recompense\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/un-chercheur-decouvre-une-faille-sur-instagram-susceptible-dentrainer-un-piratage-de-taille-et-obtient-une-recompense\/#primaryimage","url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/08\/Researcher-Spots-Instagram-Vulnerability-that-Could-Result-in-Enormous-Hack-Gets-Reward.jpg?fit=825%2C510&ssl=1","contentUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/08\/Researcher-Spots-Instagram-Vulnerability-that-Could-Result-in-Enormous-Hack-Gets-Reward.jpg?fit=825%2C510&ssl=1","width":825,"height":510},{"@type":"BreadcrumbList","@id":"https:\/\/fr.koddos.net\/blog\/un-chercheur-decouvre-une-faille-sur-instagram-susceptible-dentrainer-un-piratage-de-taille-et-obtient-une-recompense\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/fr.koddos.net\/blog\/"},{"@type":"ListItem","position":2,"name":"UN CHERCHEUR D\u00c9COUVRE UNE FAILLE SUR INSTAGRAM SUSCEPTIBLE D&rsquo;ENTRA\u00ceNER UN PIRATAGE DE TAILLE, ET OBTIENT UNE R\u00c9COMPENSE"}]},{"@type":"WebSite","@id":"https:\/\/fr.koddos.net\/blog\/#website","url":"https:\/\/fr.koddos.net\/blog\/","name":"Blog KoDDoS","description":"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.","publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fr.koddos.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/fr.koddos.net\/blog\/#organization","name":"KoDDoS","url":"https:\/\/fr.koddos.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","contentUrl":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","width":258,"height":55,"caption":"KoDDoS"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/koddosCom","https:\/\/x.com\/koddoscom"]},{"@type":"Person","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85","name":"KoDDoS","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","caption":"KoDDoS"},"url":"https:\/\/fr.koddos.net\/blog\/author\/oiyndjepop\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/08\/Researcher-Spots-Instagram-Vulnerability-that-Could-Result-in-Enormous-Hack-Gets-Reward.jpg?fit=825%2C510&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9DjzA-iP","jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/1167","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/comments?post=1167"}],"version-history":[{"count":1,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/1167\/revisions"}],"predecessor-version":[{"id":1169,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/1167\/revisions\/1169"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media\/1168"}],"wp:attachment":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media?parent=1167"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/categories?post=1167"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/tags?post=1167"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}