{"id":78,"date":"2018-01-17T08:11:50","date_gmt":"2018-01-17T07:11:50","guid":{"rendered":"https:\/\/fr.koddos.net\/blog\/?p=78"},"modified":"2018-02-09T16:32:57","modified_gmt":"2018-02-09T15:32:57","slug":"defaut-de-bittorrent-permet-a-hacker-de-controler-dispositifs-compromis-a-distance","status":"publish","type":"post","link":"https:\/\/fr.koddos.net\/blog\/defaut-de-bittorrent-permet-a-hacker-de-controler-dispositifs-compromis-a-distance\/","title":{"rendered":"Un d\u00e9faut de Bittorrent permet \u00e0 un hacker de contr\u00f4ler des dispositifs compromis \u00e0 distance"},"content":{"rendered":"<p>Une faille critique r\u00e9cemment d\u00e9couverte dans <a href=\"https:\/\/transmissionbt.com\/\">l&rsquo;application Transmission BitTorren<\/a>t permet aux pirates d&rsquo;ex\u00e9cuter du code malveillant sur des appareils compromis.<\/p>\n<p>Un membre de l&rsquo;initiative Google Project Zero a r\u00e9cemment d\u00e9couvert une faille critique dans l&rsquo;application populaire Transmission BitTorrent, qui permet aux sites Web d&rsquo;ex\u00e9cuter du code malveillant sur les appareils concern\u00e9s. Selon le chercheur, d&rsquo;autres applications client BitTorrent portent probablement des failles de s\u00e9curit\u00e9 similaires.<br \/>\nLe chercheur \u00e0 l&rsquo;origine de cette nouvelle d\u00e9couverte, Tavis Ormandy, a publi\u00e9 un rapport la semaine derni\u00e8re qui incluait un code d&rsquo;attaque de validation de principe ainsi qu&rsquo;une description compl\u00e8te de la faille de s\u00e9curit\u00e9 et de son impact si elle \u00e9tait exploit\u00e9e. Traditionnellement, Project Zero ne publie son rapport que 90 jours apr\u00e8s l&rsquo;avoir \u00e9crit, afin de permettre \u00e0 la plate-forme concern\u00e9e d&rsquo;adresser et de rectifier le probl\u00e8me avant qu&rsquo;il ne soit exploit\u00e9. Cependant, Ormandy a publi\u00e9 son rapport imm\u00e9diatement depuis que son rapport priv\u00e9 \u00e0 Transmission a \u00e9galement \u00e9t\u00e9 livr\u00e9 avec un correctif qui a abord\u00e9 la question. Ormandy a publi\u00e9 son rapport 40 jours apr\u00e8s son rapport soumis en priv\u00e9, car l&rsquo;\u00e9quipe en d\u00e9veloppement derri\u00e8re Transmission n&rsquo;a pas r\u00e9ussi \u00e0 appliquer le correctif de s\u00e9curit\u00e9. Cependant, selon le chercheur, le rapport publi\u00e9 disponible permettrait \u00e0 Ubuntu et \u00e0 d&rsquo;autres projets d&rsquo;installer le correctif de mani\u00e8re ind\u00e9pendante.<br \/>\nDans son <a href=\"https:\/\/lock.cmpxchg8b.com\/rebinder.html\">rapport<\/a> publiquement disponible, le chercheur a \u00e9crit qu&rsquo;il trouvait frustrant que l&rsquo;\u00e9quipe de Transmission n&rsquo;ait pas r\u00e9pondu \u00e0 la question de s\u00e9curit\u00e9, malgr\u00e9 son impact potentiellement dommageable. Cette frustration a encourag\u00e9 Ormandy \u00e0 mettre le correctif de s\u00e9curit\u00e9 \u00e0 la disposition du public afin que les distributions puissent installer le correctif lui-m\u00eame.<br \/>\nSelon un porte-parole de Transmission, ils travaillaient sur un correctif de s\u00e9curit\u00e9 officiel et avaient l&rsquo;intention de le publier d\u00e8s que possible, mais n&rsquo;ont pas donn\u00e9 de dates pr\u00e9cises. Le porte-parole a ajout\u00e9 que la faille de s\u00e9curit\u00e9 n&rsquo;\u00e9tait qu&rsquo;une menace pour les utilisateurs si la protection par mot de passe de l&rsquo;application \u00e9tait d\u00e9sactiv\u00e9e et que son acc\u00e8s \u00e0 distance \u00e9tait activ\u00e9. Le porte-parole a \u00e9galement averti les utilisateurs que leur protection par mot de passe \u00e9tait activ\u00e9e s&rsquo;ils installaient des correctifs de s\u00e9curit\u00e9 non officiels.<br \/>\nDans son rapport, l&rsquo;attaque de preuve de concept d&rsquo;Ormandy fonctionne en exploitant une fonction de Transmission qui permet aux utilisateurs de g\u00e9rer leur application BitTorrent \u00e0 l&rsquo;aide de leur navigateur Web. Selon le rapport, la majorit\u00e9 des utilisateurs BitTorrent ne sont pas concern\u00e9s par la fonction de protection par mot de passe car ils supposent que l&rsquo;interface JSON RPC ne peut \u00eatre g\u00e9r\u00e9e que par un individu \u00e0 proximit\u00e9 physique de l&rsquo;appareil concern\u00e9. Cependant, Ormandy a utilis\u00e9 une technique connue sous le nom de reliure DNS (Domain Name System) qui lui a permis de contr\u00f4ler \u00e0 distance l&rsquo;interface de transmission d\u00e8s que la victime a visit\u00e9 un site Web malveillant. Le chercheur a confirm\u00e9 que cette attaque \u00e9tait possible sur Firefox, Chrome, Linux et Windows, et a not\u00e9 que <a href=\"https:\/\/github.com\/transmission\/transmission\/pull\/468\">plusieurs autres plates-formes<\/a> \u00e9taient susceptibles d&rsquo;\u00eatre affect\u00e9es par la faille.<br \/>\nEn utilisant cette technique, les pirates peuvent abuser de la faille en \u00e9tablissant un nom DNS avec lequel ils ont l&rsquo;autorisation de communiquer. Apr\u00e8s cet \u00e9tablissement, ils r\u00e9solvent le nom Localhost du p\u00e9riph\u00e9rique affect\u00e9. Ormandy a discut\u00e9 de cette technique en d\u00e9tail lors de son deuxi\u00e8me post qui contenait le correctif de s\u00e9curit\u00e9.<br \/>\nUne fois qu&rsquo;un pirate a obtenu un acc\u00e8s \u00e0 distance \u00e0 l&rsquo;application de transmission d&rsquo;un appareil, il peut effectuer des actions potentiellement dommageables telles que la modification du r\u00e9pertoire de t\u00e9l\u00e9chargement de Torrent dans le propre r\u00e9pertoire de la victime. Le pirate peut \u00e9galement ordonner \u00e0 l&rsquo;application Torrent de t\u00e9l\u00e9charger des fichiers malveillants ainsi que de configurer l&rsquo;application pour ex\u00e9cuter automatiquement tous les fichiers t\u00e9l\u00e9charg\u00e9s. Selon le chercheur, ce hack n&rsquo;est pas tr\u00e8s complexe, mais pourrait avoir des cons\u00e9quences tr\u00e8s dommageables.<br \/>\nDans un Tweet, le chercheur a \u00e9galement laiss\u00e9 entendre que c&rsquo;est peut-\u00eatre le premier des nombreux d\u00e9fauts de s\u00e9curit\u00e9 dommageables dans les applications torrent. Cependant, d&rsquo;autres failles de s\u00e9curit\u00e9 n&rsquo;ont pas encore \u00e9t\u00e9 r\u00e9v\u00e9l\u00e9es, ostensiblement \u00e0 cause de la fen\u00eatre obligatoire de 90 jours.<br \/>\nBien que cette derni\u00e8re d\u00e9couverte affecte imm\u00e9diatement tous les utilisateurs de la transmission, la d\u00e9couverte a \u00e9galement mis en \u00e9vidence le potentiel dommageable des techniques de reliure DNS, en particulier si elles sont largement applicables.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Une faille critique r\u00e9cemment d\u00e9couverte dans l&rsquo;application Transmission BitTorrent permet aux pirates d&rsquo;ex\u00e9cuter du code malveillant sur des appareils compromis. Un membre de l&rsquo;initiative Google Project Zero a r\u00e9cemment d\u00e9couvert une faille critique dans l&rsquo;application populaire Transmission BitTorrent, qui permet aux sites Web d&rsquo;ex\u00e9cuter du code malveillant sur les appareils concern\u00e9s. Selon le chercheur, d&rsquo;autres &hellip; <a href=\"https:\/\/fr.koddos.net\/blog\/defaut-de-bittorrent-permet-a-hacker-de-controler-dispositifs-compromis-a-distance\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Un d\u00e9faut de Bittorrent permet \u00e0 un hacker de contr\u00f4ler des dispositifs compromis \u00e0 distance<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":79,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[6,2,4,3],"tags":[14,10,9,12,8,11,13],"class_list":["post-78","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite","category-exploit","category-hacking","category-malware","tag-breche-de-securite","tag-faille-de-securite","tag-hackers","tag-hacking","tag-securite","tag-vie-prive","tag-vulnerabilite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Un d\u00e9faut de Bittorrent permet \u00e0 un hacker de contr\u00f4ler des dispositifs compromis \u00e0 distance - Blog KoDDoS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fr.koddos.net\/blog\/defaut-de-bittorrent-permet-a-hacker-de-controler-dispositifs-compromis-a-distance\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Un d\u00e9faut de Bittorrent permet \u00e0 un hacker de contr\u00f4ler des dispositifs compromis \u00e0 distance - Blog KoDDoS\" \/>\n<meta property=\"og:description\" content=\"Une faille critique r\u00e9cemment d\u00e9couverte dans l&rsquo;application Transmission BitTorrent permet aux pirates d&rsquo;ex\u00e9cuter du code malveillant sur des appareils compromis. Un membre de l&rsquo;initiative Google Project Zero a r\u00e9cemment d\u00e9couvert une faille critique dans l&rsquo;application populaire Transmission BitTorrent, qui permet aux sites Web d&rsquo;ex\u00e9cuter du code malveillant sur les appareils concern\u00e9s. Selon le chercheur, d&rsquo;autres &hellip; Continue reading Un d\u00e9faut de Bittorrent permet \u00e0 un hacker de contr\u00f4ler des dispositifs compromis \u00e0 distance\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fr.koddos.net\/blog\/defaut-de-bittorrent-permet-a-hacker-de-controler-dispositifs-compromis-a-distance\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog KoDDoS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/koddosCom\" \/>\n<meta property=\"article:published_time\" content=\"2018-01-17T07:11:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-02-09T15:32:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/Bittorrent-Flaw-Allows-Hacker-To-Control-Compromised-Devices-Remotely.jpg?fit=825%2C510&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"825\" \/>\n\t<meta property=\"og:image:height\" content=\"510\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"cvssgrpkqsptqz\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:site\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"cvssgrpkqsptqz\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/defaut-de-bittorrent-permet-a-hacker-de-controler-dispositifs-compromis-a-distance\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/defaut-de-bittorrent-permet-a-hacker-de-controler-dispositifs-compromis-a-distance\\\/\"},\"author\":{\"name\":\"cvssgrpkqsptqz\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/9df2a4428c694fe68e9dcce5d98a0731\"},\"headline\":\"Un d\u00e9faut de Bittorrent permet \u00e0 un hacker de contr\u00f4ler des dispositifs compromis \u00e0 distance\",\"datePublished\":\"2018-01-17T07:11:50+00:00\",\"dateModified\":\"2018-02-09T15:32:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/defaut-de-bittorrent-permet-a-hacker-de-controler-dispositifs-compromis-a-distance\\\/\"},\"wordCount\":821,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/defaut-de-bittorrent-permet-a-hacker-de-controler-dispositifs-compromis-a-distance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/Bittorrent-Flaw-Allows-Hacker-To-Control-Compromised-Devices-Remotely.jpg?fit=825%2C510&ssl=1\",\"keywords\":[\"br\u00e8che de s\u00e9curit\u00e9\",\"faille de s\u00e9curit\u00e9\",\"hackers\",\"hacking\",\"s\u00e9curit\u00e9\",\"vie priv\u00e9\",\"vuln\u00e9rabilit\u00e9\"],\"articleSection\":[\"Actualit\u00e9s\",\"Exploit\",\"Hacking\",\"Malware\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/defaut-de-bittorrent-permet-a-hacker-de-controler-dispositifs-compromis-a-distance\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/defaut-de-bittorrent-permet-a-hacker-de-controler-dispositifs-compromis-a-distance\\\/\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/defaut-de-bittorrent-permet-a-hacker-de-controler-dispositifs-compromis-a-distance\\\/\",\"name\":\"Un d\u00e9faut de Bittorrent permet \u00e0 un hacker de contr\u00f4ler des dispositifs compromis \u00e0 distance - Blog KoDDoS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/defaut-de-bittorrent-permet-a-hacker-de-controler-dispositifs-compromis-a-distance\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/defaut-de-bittorrent-permet-a-hacker-de-controler-dispositifs-compromis-a-distance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/Bittorrent-Flaw-Allows-Hacker-To-Control-Compromised-Devices-Remotely.jpg?fit=825%2C510&ssl=1\",\"datePublished\":\"2018-01-17T07:11:50+00:00\",\"dateModified\":\"2018-02-09T15:32:57+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/defaut-de-bittorrent-permet-a-hacker-de-controler-dispositifs-compromis-a-distance\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/defaut-de-bittorrent-permet-a-hacker-de-controler-dispositifs-compromis-a-distance\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/defaut-de-bittorrent-permet-a-hacker-de-controler-dispositifs-compromis-a-distance\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/Bittorrent-Flaw-Allows-Hacker-To-Control-Compromised-Devices-Remotely.jpg?fit=825%2C510&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/Bittorrent-Flaw-Allows-Hacker-To-Control-Compromised-Devices-Remotely.jpg?fit=825%2C510&ssl=1\",\"width\":825,\"height\":510},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/defaut-de-bittorrent-permet-a-hacker-de-controler-dispositifs-compromis-a-distance\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Un d\u00e9faut de Bittorrent permet \u00e0 un hacker de contr\u00f4ler des dispositifs compromis \u00e0 distance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"name\":\"Blog KoDDoS\",\"description\":\"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.\",\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\",\"name\":\"KoDDoS\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"width\":258,\"height\":55,\"caption\":\"KoDDoS\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/koddosCom\",\"https:\\\/\\\/x.com\\\/koddoscom\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/9df2a4428c694fe68e9dcce5d98a0731\",\"name\":\"cvssgrpkqsptqz\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/004dce143c68d28963f42b82c6ec56fb69999473313676bf79049066c79cbee3?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/004dce143c68d28963f42b82c6ec56fb69999473313676bf79049066c79cbee3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/004dce143c68d28963f42b82c6ec56fb69999473313676bf79049066c79cbee3?s=96&d=mm&r=g\",\"caption\":\"cvssgrpkqsptqz\"},\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/author\\\/cvssgrpkqsptqz\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Un d\u00e9faut de Bittorrent permet \u00e0 un hacker de contr\u00f4ler des dispositifs compromis \u00e0 distance - Blog KoDDoS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fr.koddos.net\/blog\/defaut-de-bittorrent-permet-a-hacker-de-controler-dispositifs-compromis-a-distance\/","og_locale":"fr_FR","og_type":"article","og_title":"Un d\u00e9faut de Bittorrent permet \u00e0 un hacker de contr\u00f4ler des dispositifs compromis \u00e0 distance - Blog KoDDoS","og_description":"Une faille critique r\u00e9cemment d\u00e9couverte dans l&rsquo;application Transmission BitTorrent permet aux pirates d&rsquo;ex\u00e9cuter du code malveillant sur des appareils compromis. Un membre de l&rsquo;initiative Google Project Zero a r\u00e9cemment d\u00e9couvert une faille critique dans l&rsquo;application populaire Transmission BitTorrent, qui permet aux sites Web d&rsquo;ex\u00e9cuter du code malveillant sur les appareils concern\u00e9s. Selon le chercheur, d&rsquo;autres &hellip; Continue reading Un d\u00e9faut de Bittorrent permet \u00e0 un hacker de contr\u00f4ler des dispositifs compromis \u00e0 distance","og_url":"https:\/\/fr.koddos.net\/blog\/defaut-de-bittorrent-permet-a-hacker-de-controler-dispositifs-compromis-a-distance\/","og_site_name":"Blog KoDDoS","article_publisher":"https:\/\/www.facebook.com\/koddosCom","article_published_time":"2018-01-17T07:11:50+00:00","article_modified_time":"2018-02-09T15:32:57+00:00","og_image":[{"width":825,"height":510,"url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/Bittorrent-Flaw-Allows-Hacker-To-Control-Compromised-Devices-Remotely.jpg?fit=825%2C510&ssl=1","type":"image\/jpeg"}],"author":"cvssgrpkqsptqz","twitter_card":"summary_large_image","twitter_creator":"@koddoscom","twitter_site":"@koddoscom","twitter_misc":{"\u00c9crit par":"cvssgrpkqsptqz","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fr.koddos.net\/blog\/defaut-de-bittorrent-permet-a-hacker-de-controler-dispositifs-compromis-a-distance\/#article","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/defaut-de-bittorrent-permet-a-hacker-de-controler-dispositifs-compromis-a-distance\/"},"author":{"name":"cvssgrpkqsptqz","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/9df2a4428c694fe68e9dcce5d98a0731"},"headline":"Un d\u00e9faut de Bittorrent permet \u00e0 un hacker de contr\u00f4ler des dispositifs compromis \u00e0 distance","datePublished":"2018-01-17T07:11:50+00:00","dateModified":"2018-02-09T15:32:57+00:00","mainEntityOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/defaut-de-bittorrent-permet-a-hacker-de-controler-dispositifs-compromis-a-distance\/"},"wordCount":821,"commentCount":0,"publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/defaut-de-bittorrent-permet-a-hacker-de-controler-dispositifs-compromis-a-distance\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/Bittorrent-Flaw-Allows-Hacker-To-Control-Compromised-Devices-Remotely.jpg?fit=825%2C510&ssl=1","keywords":["br\u00e8che de s\u00e9curit\u00e9","faille de s\u00e9curit\u00e9","hackers","hacking","s\u00e9curit\u00e9","vie priv\u00e9","vuln\u00e9rabilit\u00e9"],"articleSection":["Actualit\u00e9s","Exploit","Hacking","Malware"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/fr.koddos.net\/blog\/defaut-de-bittorrent-permet-a-hacker-de-controler-dispositifs-compromis-a-distance\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/fr.koddos.net\/blog\/defaut-de-bittorrent-permet-a-hacker-de-controler-dispositifs-compromis-a-distance\/","url":"https:\/\/fr.koddos.net\/blog\/defaut-de-bittorrent-permet-a-hacker-de-controler-dispositifs-compromis-a-distance\/","name":"Un d\u00e9faut de Bittorrent permet \u00e0 un hacker de contr\u00f4ler des dispositifs compromis \u00e0 distance - Blog KoDDoS","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/defaut-de-bittorrent-permet-a-hacker-de-controler-dispositifs-compromis-a-distance\/#primaryimage"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/defaut-de-bittorrent-permet-a-hacker-de-controler-dispositifs-compromis-a-distance\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/Bittorrent-Flaw-Allows-Hacker-To-Control-Compromised-Devices-Remotely.jpg?fit=825%2C510&ssl=1","datePublished":"2018-01-17T07:11:50+00:00","dateModified":"2018-02-09T15:32:57+00:00","breadcrumb":{"@id":"https:\/\/fr.koddos.net\/blog\/defaut-de-bittorrent-permet-a-hacker-de-controler-dispositifs-compromis-a-distance\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fr.koddos.net\/blog\/defaut-de-bittorrent-permet-a-hacker-de-controler-dispositifs-compromis-a-distance\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/defaut-de-bittorrent-permet-a-hacker-de-controler-dispositifs-compromis-a-distance\/#primaryimage","url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/Bittorrent-Flaw-Allows-Hacker-To-Control-Compromised-Devices-Remotely.jpg?fit=825%2C510&ssl=1","contentUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/Bittorrent-Flaw-Allows-Hacker-To-Control-Compromised-Devices-Remotely.jpg?fit=825%2C510&ssl=1","width":825,"height":510},{"@type":"BreadcrumbList","@id":"https:\/\/fr.koddos.net\/blog\/defaut-de-bittorrent-permet-a-hacker-de-controler-dispositifs-compromis-a-distance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/fr.koddos.net\/blog\/"},{"@type":"ListItem","position":2,"name":"Un d\u00e9faut de Bittorrent permet \u00e0 un hacker de contr\u00f4ler des dispositifs compromis \u00e0 distance"}]},{"@type":"WebSite","@id":"https:\/\/fr.koddos.net\/blog\/#website","url":"https:\/\/fr.koddos.net\/blog\/","name":"Blog KoDDoS","description":"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.","publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fr.koddos.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/fr.koddos.net\/blog\/#organization","name":"KoDDoS","url":"https:\/\/fr.koddos.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","contentUrl":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","width":258,"height":55,"caption":"KoDDoS"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/koddosCom","https:\/\/x.com\/koddoscom"]},{"@type":"Person","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/9df2a4428c694fe68e9dcce5d98a0731","name":"cvssgrpkqsptqz","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/004dce143c68d28963f42b82c6ec56fb69999473313676bf79049066c79cbee3?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/004dce143c68d28963f42b82c6ec56fb69999473313676bf79049066c79cbee3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/004dce143c68d28963f42b82c6ec56fb69999473313676bf79049066c79cbee3?s=96&d=mm&r=g","caption":"cvssgrpkqsptqz"},"url":"https:\/\/fr.koddos.net\/blog\/author\/cvssgrpkqsptqz\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/Bittorrent-Flaw-Allows-Hacker-To-Control-Compromised-Devices-Remotely.jpg?fit=825%2C510&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9DjzA-1g","jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/78","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/comments?post=78"}],"version-history":[{"count":1,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/78\/revisions"}],"predecessor-version":[{"id":80,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/78\/revisions\/80"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media\/79"}],"wp:attachment":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media?parent=78"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/categories?post=78"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/tags?post=78"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}