{"id":773,"date":"2019-05-07T21:37:46","date_gmt":"2019-05-07T19:37:46","guid":{"rendered":"https:\/\/fr.koddos.net\/blog\/?p=773"},"modified":"2019-05-08T21:42:32","modified_gmt":"2019-05-08T19:42:32","slug":"un-bug-critique-a-expose-tron-a-denormes-problemes-lies-aux-attaques-ddos","status":"publish","type":"post","link":"https:\/\/fr.koddos.net\/blog\/un-bug-critique-a-expose-tron-a-denormes-problemes-lies-aux-attaques-ddos\/","title":{"rendered":"UN BUG CRITIQUE A EXPOS\u00c9 TRON \u00c0 D&rsquo;\u00c9NORMES PROBL\u00c8MES LI\u00c9S AUX ATTAQUES DDOS."},"content":{"rendered":"<p><em>Un chercheur ind\u00e9pendant en cybers\u00e9curit\u00e9 a d\u00e9couvert une faille critique dans le code blockchain de Tron. Cette faille aurait pu permettre \u00e0 une personne malveillante de faire planter la blockchain de Tron dans son int\u00e9gralit\u00e9 avec seulement un ordinateur capable de lancer des attaques DDOS.<\/em><\/p>\n<p><strong>HackerOne aide une autre entreprise<\/strong><\/p>\n<p>Le rapport de divulgation de HackerOne donne plus de d\u00e9tails sur la faille. Toute attaque DDOS potentielle aurait pu consommer toutes les ressources de la blockchain \u00e9valu\u00e9e \u00e0 1,6 milliard de dollars. Les attaquants pourraient utiliser l&rsquo;attaque pour demander le d\u00e9ploiement de contrats intelligents infect\u00e9s par du code malveillant.<\/p>\n<p>Dans le rapport, il \u00e9tait indiqu\u00e9 qu&rsquo;\u00aben utilisant une seule machine, un attaquant pourrait lancer une <a href=\"https:\/\/koddos.net\/blog\/ddos-attacks-or-dea-dreammarket-is-closing-but-no-one-knows-why\/\">attaque DDOS<\/a> \u00e0 l&rsquo;ensemble des noeuds [Super Repr\u00e9sentant], soit 51%, et rendre le r\u00e9seau TRON inutilisable ou le rendre indisponible.\u00bb<\/p>\n<p>La faille dans le portefeuille de Tron a permis \u00e0 un seul ordinateur d&rsquo;utiliser toutes les ressources m\u00e9moire du r\u00e9seau. Le bug, d\u00e9couvert le 14 janvier, a re\u00e7u une prime de 1 500 dollars le 1er f\u00e9vrier. Une deuxi\u00e8me prime pour avoir trouver le bug a \u00e9t\u00e9 vers\u00e9e, celle-ci valant 3 100 dollars, bien que l&rsquo;entreprise Tron garde le silence sur la faille.<\/p>\n<p>Les primes vers\u00e9es via HackerOne sont devenues la norme de r\u00e9f\u00e9rence dans le secteur et cette organisation a aid\u00e9 de nombreux hackers \u00e0 transformer leurs comp\u00e9tences en action positive. L&rsquo;entreprise Tron elle-m\u00eame a d\u00e9j\u00e0 vers\u00e9 plus de 78 800 $ en prime sur 15 rapports uniques. La plus haute prime qu&rsquo;ils ont pay\u00e9e \u00e9tait de 10 000 $. Cela n\u2019a rien \u00e0 voir avec la prime de 30 000 $ vers\u00e9e par Coinbase \u00e0 un hacker qui a d\u00e9couvert une faille vraiment critique qui n\u2019a pas encore \u00e9t\u00e9 r\u00e9v\u00e9l\u00e9e bien qu\u2019elle ait \u00e9t\u00e9 d\u00e9couverte plus t\u00f4t cette ann\u00e9e.<\/p>\n<p><strong>Tron n&rsquo;est pas la seule \u00e0 \u00eatre affect\u00e9e par le bug<\/strong><\/p>\n<p>Des failles similaires ont \u00e9t\u00e9 trouv\u00e9es dans d&rsquo;autres blockchains. En fait, Bitcoin Core, la crypto-monnaie OG a r\u00e9v\u00e9l\u00e9 un cas similaire septembre dernier. La <a href=\"https:\/\/koddos.net\/blog\/major-shopping-platform-with-severe-security-flaw-exposed\/\">faille de s\u00e9curit\u00e9<\/a> aurait eu des cons\u00e9quences paralysantes pour la crypto-monnaie, car les n\u0153uds \u00e9taient expos\u00e9s \u00e0 une inondation de trafic de la m\u00eame mani\u00e8re que le bug de Tron.<\/p>\n<p>L\u2019\u00e9cosyst\u00e8me de crypto-monnaie est un gros client de HackerOne, Monero, Augur, et Coinbase \u00e9tant parmi les clients qui offrent des primes via HackerOne. Des chercheurs ind\u00e9pendants ont gagn\u00e9 un total de 878 000 $ aupr\u00e8s d&rsquo;entreprises de cryptomonnaie, et cela seulement en 2018.<\/p>\n<p>La plus grande partie de cet argent provient de la plateforme EOS de Block.one, qui a vers\u00e9 534 500 $. Cela repr\u00e9sente pr\u00e8s de 60% de toutes les primes vers\u00e9es en 2018, mais a l&rsquo;honneur douteux d&rsquo;\u00eatre le mieux pay\u00e9 de tous les temps dans l&rsquo;\u00e9cosyst\u00e8me de la cryptomonnaie. Coinbase prend la deuxi\u00e8me place avec 290 000 $ alors m\u00eame qu\u2019il g\u00e8re un programme de divulgation depuis 2014. Block.one a ouvert son programme en mai, suivi d\u2019un pirate informatique r\u00e9clamant plus de 100 000 USD en <a href=\"https:\/\/koddos.net\/blog\/air-force-started-bug-bounty-program\/\">primes<\/a> en une seule semaine.<\/p>\n<p>HackerOne a d\u00e9clar\u00e9 qu&rsquo;il y a actuellement 64 soci\u00e9t\u00e9s utilisant la technologie blockchain sur sa plateforme. Cela peut sembler peu, en particulier lorsque le nombre total d\u2019entreprises impliqu\u00e9es dans la blockchain est d\u2019environ 2000. Les bugs critiques d\u00e9tect\u00e9s \u00e0 la fois dans Bitcoin et Bitcoin Cash montrent que la cryptomonnaie n\u2019est peut-\u00eatre pas aussi s\u00fbre que cela puisse para\u00eetre, compte tenu en particulier de la faille absolument critique d\u00e9couverte par Bitcoin l\u2019ann\u00e9e derni\u00e8re.<\/p>\n<p>La gravit\u00e9 de ces bugs est aggrav\u00e9e par les aspects immuables de la blockchain. Il n\u2019existe aucun moyen d\u2019annuler des transactions contrairement \u00e0 un syst\u00e8me centralis\u00e9. Cela a fait beaucoup de gens \u00e0 r\u00e9fl\u00e9chir si la blockchain est bien tout ce qui avait \u00e9t\u00e9 imagin\u00e9 l&rsquo;\u00eatre. Il existe des syst\u00e8mes tels qu&rsquo;EOS et d&rsquo;autres qui ont une porte d\u00e9rob\u00e9e int\u00e9gr\u00e9e, mais ceux-ci n&rsquo;ont jamais vraiment \u00e9t\u00e9 consid\u00e9r\u00e9s comme faisant partie du \u00abv\u00e9ritable\u00bb \u00e9cosyst\u00e8me de la cryptomonnaie par les puristes.<\/p>\n<p>Le fait est qu&rsquo;avec toutes les nouvelles en provenance de hackerspace, ce n&rsquo;est peut-\u00eatre pas une bonne id\u00e9e de garder trop de fonds bloqu\u00e9s dans une blockchain. Un d\u00e9sastre se profile \u00e0 l&rsquo;horizon et il pourrait frapper le plus t\u00f4t possible.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Un chercheur ind\u00e9pendant en cybers\u00e9curit\u00e9 a d\u00e9couvert une faille critique dans le code blockchain de Tron. Cette faille aurait pu permettre \u00e0 une personne malveillante de faire planter la blockchain de Tron dans son int\u00e9gralit\u00e9 avec seulement un ordinateur capable de lancer des attaques DDOS. HackerOne aide une autre entreprise Le rapport de divulgation de &hellip; <a href=\"https:\/\/fr.koddos.net\/blog\/un-bug-critique-a-expose-tron-a-denormes-problemes-lies-aux-attaques-ddos\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">UN BUG CRITIQUE A EXPOS\u00c9 TRON \u00c0 D&rsquo;\u00c9NORMES PROBL\u00c8MES LI\u00c9S AUX ATTAQUES DDOS.<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":774,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[6],"tags":[],"class_list":["post-773","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>UN BUG CRITIQUE A EXPOS\u00c9 TRON \u00c0 D&#039;\u00c9NORMES PROBL\u00c8MES LI\u00c9S AUX ATTAQUES DDOS. - Blog KoDDoS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fr.koddos.net\/blog\/un-bug-critique-a-expose-tron-a-denormes-problemes-lies-aux-attaques-ddos\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"UN BUG CRITIQUE A EXPOS\u00c9 TRON \u00c0 D&#039;\u00c9NORMES PROBL\u00c8MES LI\u00c9S AUX ATTAQUES DDOS. - Blog KoDDoS\" \/>\n<meta property=\"og:description\" content=\"Un chercheur ind\u00e9pendant en cybers\u00e9curit\u00e9 a d\u00e9couvert une faille critique dans le code blockchain de Tron. Cette faille aurait pu permettre \u00e0 une personne malveillante de faire planter la blockchain de Tron dans son int\u00e9gralit\u00e9 avec seulement un ordinateur capable de lancer des attaques DDOS. HackerOne aide une autre entreprise Le rapport de divulgation de &hellip; Continue reading UN BUG CRITIQUE A EXPOS\u00c9 TRON \u00c0 D&rsquo;\u00c9NORMES PROBL\u00c8MES LI\u00c9S AUX ATTAQUES DDOS.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fr.koddos.net\/blog\/un-bug-critique-a-expose-tron-a-denormes-problemes-lies-aux-attaques-ddos\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog KoDDoS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/koddosCom\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-07T19:37:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-08T19:42:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i2.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/05\/Popular-E-Ticket-System-Vulnerable-to-Hacking-Attacks.jpg?fit=880%2C543&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"880\" \/>\n\t<meta property=\"og:image:height\" content=\"543\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"KoDDoS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:site\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"KoDDoS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/un-bug-critique-a-expose-tron-a-denormes-problemes-lies-aux-attaques-ddos\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/un-bug-critique-a-expose-tron-a-denormes-problemes-lies-aux-attaques-ddos\\\/\"},\"author\":{\"name\":\"KoDDoS\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\"},\"headline\":\"UN BUG CRITIQUE A EXPOS\u00c9 TRON \u00c0 D&rsquo;\u00c9NORMES PROBL\u00c8MES LI\u00c9S AUX ATTAQUES DDOS.\",\"datePublished\":\"2019-05-07T19:37:46+00:00\",\"dateModified\":\"2019-05-08T19:42:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/un-bug-critique-a-expose-tron-a-denormes-problemes-lies-aux-attaques-ddos\\\/\"},\"wordCount\":775,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/un-bug-critique-a-expose-tron-a-denormes-problemes-lies-aux-attaques-ddos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/Popular-E-Ticket-System-Vulnerable-to-Hacking-Attacks.jpg?fit=880%2C543&ssl=1\",\"articleSection\":[\"Actualit\u00e9s\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/un-bug-critique-a-expose-tron-a-denormes-problemes-lies-aux-attaques-ddos\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/un-bug-critique-a-expose-tron-a-denormes-problemes-lies-aux-attaques-ddos\\\/\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/un-bug-critique-a-expose-tron-a-denormes-problemes-lies-aux-attaques-ddos\\\/\",\"name\":\"UN BUG CRITIQUE A EXPOS\u00c9 TRON \u00c0 D'\u00c9NORMES PROBL\u00c8MES LI\u00c9S AUX ATTAQUES DDOS. - Blog KoDDoS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/un-bug-critique-a-expose-tron-a-denormes-problemes-lies-aux-attaques-ddos\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/un-bug-critique-a-expose-tron-a-denormes-problemes-lies-aux-attaques-ddos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/Popular-E-Ticket-System-Vulnerable-to-Hacking-Attacks.jpg?fit=880%2C543&ssl=1\",\"datePublished\":\"2019-05-07T19:37:46+00:00\",\"dateModified\":\"2019-05-08T19:42:32+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/un-bug-critique-a-expose-tron-a-denormes-problemes-lies-aux-attaques-ddos\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/un-bug-critique-a-expose-tron-a-denormes-problemes-lies-aux-attaques-ddos\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/un-bug-critique-a-expose-tron-a-denormes-problemes-lies-aux-attaques-ddos\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/Popular-E-Ticket-System-Vulnerable-to-Hacking-Attacks.jpg?fit=880%2C543&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/Popular-E-Ticket-System-Vulnerable-to-Hacking-Attacks.jpg?fit=880%2C543&ssl=1\",\"width\":880,\"height\":543},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/un-bug-critique-a-expose-tron-a-denormes-problemes-lies-aux-attaques-ddos\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"UN BUG CRITIQUE A EXPOS\u00c9 TRON \u00c0 D&rsquo;\u00c9NORMES PROBL\u00c8MES LI\u00c9S AUX ATTAQUES DDOS.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"name\":\"Blog KoDDoS\",\"description\":\"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.\",\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\",\"name\":\"KoDDoS\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"width\":258,\"height\":55,\"caption\":\"KoDDoS\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/koddosCom\",\"https:\\\/\\\/x.com\\\/koddoscom\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\",\"name\":\"KoDDoS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"caption\":\"KoDDoS\"},\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/author\\\/oiyndjepop\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"UN BUG CRITIQUE A EXPOS\u00c9 TRON \u00c0 D'\u00c9NORMES PROBL\u00c8MES LI\u00c9S AUX ATTAQUES DDOS. - Blog KoDDoS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fr.koddos.net\/blog\/un-bug-critique-a-expose-tron-a-denormes-problemes-lies-aux-attaques-ddos\/","og_locale":"fr_FR","og_type":"article","og_title":"UN BUG CRITIQUE A EXPOS\u00c9 TRON \u00c0 D'\u00c9NORMES PROBL\u00c8MES LI\u00c9S AUX ATTAQUES DDOS. - Blog KoDDoS","og_description":"Un chercheur ind\u00e9pendant en cybers\u00e9curit\u00e9 a d\u00e9couvert une faille critique dans le code blockchain de Tron. Cette faille aurait pu permettre \u00e0 une personne malveillante de faire planter la blockchain de Tron dans son int\u00e9gralit\u00e9 avec seulement un ordinateur capable de lancer des attaques DDOS. HackerOne aide une autre entreprise Le rapport de divulgation de &hellip; Continue reading UN BUG CRITIQUE A EXPOS\u00c9 TRON \u00c0 D&rsquo;\u00c9NORMES PROBL\u00c8MES LI\u00c9S AUX ATTAQUES DDOS.","og_url":"https:\/\/fr.koddos.net\/blog\/un-bug-critique-a-expose-tron-a-denormes-problemes-lies-aux-attaques-ddos\/","og_site_name":"Blog KoDDoS","article_publisher":"https:\/\/www.facebook.com\/koddosCom","article_published_time":"2019-05-07T19:37:46+00:00","article_modified_time":"2019-05-08T19:42:32+00:00","og_image":[{"width":880,"height":543,"url":"https:\/\/i2.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/05\/Popular-E-Ticket-System-Vulnerable-to-Hacking-Attacks.jpg?fit=880%2C543&ssl=1","type":"image\/jpeg"}],"author":"KoDDoS","twitter_card":"summary_large_image","twitter_creator":"@koddoscom","twitter_site":"@koddoscom","twitter_misc":{"\u00c9crit par":"KoDDoS","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fr.koddos.net\/blog\/un-bug-critique-a-expose-tron-a-denormes-problemes-lies-aux-attaques-ddos\/#article","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/un-bug-critique-a-expose-tron-a-denormes-problemes-lies-aux-attaques-ddos\/"},"author":{"name":"KoDDoS","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85"},"headline":"UN BUG CRITIQUE A EXPOS\u00c9 TRON \u00c0 D&rsquo;\u00c9NORMES PROBL\u00c8MES LI\u00c9S AUX ATTAQUES DDOS.","datePublished":"2019-05-07T19:37:46+00:00","dateModified":"2019-05-08T19:42:32+00:00","mainEntityOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/un-bug-critique-a-expose-tron-a-denormes-problemes-lies-aux-attaques-ddos\/"},"wordCount":775,"commentCount":0,"publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/un-bug-critique-a-expose-tron-a-denormes-problemes-lies-aux-attaques-ddos\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/05\/Popular-E-Ticket-System-Vulnerable-to-Hacking-Attacks.jpg?fit=880%2C543&ssl=1","articleSection":["Actualit\u00e9s"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/fr.koddos.net\/blog\/un-bug-critique-a-expose-tron-a-denormes-problemes-lies-aux-attaques-ddos\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/fr.koddos.net\/blog\/un-bug-critique-a-expose-tron-a-denormes-problemes-lies-aux-attaques-ddos\/","url":"https:\/\/fr.koddos.net\/blog\/un-bug-critique-a-expose-tron-a-denormes-problemes-lies-aux-attaques-ddos\/","name":"UN BUG CRITIQUE A EXPOS\u00c9 TRON \u00c0 D'\u00c9NORMES PROBL\u00c8MES LI\u00c9S AUX ATTAQUES DDOS. - Blog KoDDoS","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/un-bug-critique-a-expose-tron-a-denormes-problemes-lies-aux-attaques-ddos\/#primaryimage"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/un-bug-critique-a-expose-tron-a-denormes-problemes-lies-aux-attaques-ddos\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/05\/Popular-E-Ticket-System-Vulnerable-to-Hacking-Attacks.jpg?fit=880%2C543&ssl=1","datePublished":"2019-05-07T19:37:46+00:00","dateModified":"2019-05-08T19:42:32+00:00","breadcrumb":{"@id":"https:\/\/fr.koddos.net\/blog\/un-bug-critique-a-expose-tron-a-denormes-problemes-lies-aux-attaques-ddos\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fr.koddos.net\/blog\/un-bug-critique-a-expose-tron-a-denormes-problemes-lies-aux-attaques-ddos\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/un-bug-critique-a-expose-tron-a-denormes-problemes-lies-aux-attaques-ddos\/#primaryimage","url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/05\/Popular-E-Ticket-System-Vulnerable-to-Hacking-Attacks.jpg?fit=880%2C543&ssl=1","contentUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/05\/Popular-E-Ticket-System-Vulnerable-to-Hacking-Attacks.jpg?fit=880%2C543&ssl=1","width":880,"height":543},{"@type":"BreadcrumbList","@id":"https:\/\/fr.koddos.net\/blog\/un-bug-critique-a-expose-tron-a-denormes-problemes-lies-aux-attaques-ddos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/fr.koddos.net\/blog\/"},{"@type":"ListItem","position":2,"name":"UN BUG CRITIQUE A EXPOS\u00c9 TRON \u00c0 D&rsquo;\u00c9NORMES PROBL\u00c8MES LI\u00c9S AUX ATTAQUES DDOS."}]},{"@type":"WebSite","@id":"https:\/\/fr.koddos.net\/blog\/#website","url":"https:\/\/fr.koddos.net\/blog\/","name":"Blog KoDDoS","description":"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.","publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fr.koddos.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/fr.koddos.net\/blog\/#organization","name":"KoDDoS","url":"https:\/\/fr.koddos.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","contentUrl":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","width":258,"height":55,"caption":"KoDDoS"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/koddosCom","https:\/\/x.com\/koddoscom"]},{"@type":"Person","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85","name":"KoDDoS","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","caption":"KoDDoS"},"url":"https:\/\/fr.koddos.net\/blog\/author\/oiyndjepop\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/05\/Popular-E-Ticket-System-Vulnerable-to-Hacking-Attacks.jpg?fit=880%2C543&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9DjzA-ct","jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/773","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/comments?post=773"}],"version-history":[{"count":1,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/773\/revisions"}],"predecessor-version":[{"id":775,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/773\/revisions\/775"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media\/774"}],"wp:attachment":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media?parent=773"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/categories?post=773"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/tags?post=773"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}