<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>exploitation de vulnérabilités &#8211; Réseau CERTA</title>
	<atom:link href="https://www.reseaucerta.org/tag/exploitation-de-vulnrabilits/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.reseaucerta.org</link>
	<description>Des ressources pour enseigner le numérique</description>
	<lastBuildDate>Wed, 28 Jan 2026 18:55:34 +0000</lastBuildDate>
	<language>fr-FR</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.reseaucerta.org/wp-content/uploads/cours/cropped-favicon-certa-32x32.png</url>
	<title>exploitation de vulnérabilités &#8211; Réseau CERTA</title>
	<link>https://www.reseaucerta.org</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Utilisation de la distribution Kali dans le cadre du bloc 3 sur la cybersécurité avec les laboratoires sur Docker (v3)</title>
		<link>https://www.reseaucerta.org/utilisation-de-la-distribution-kali-dans-le-cadre-du-bloc-3-sur-la-cyberscurit-avec-les-laboratoires-sur-docker-v3/</link>
					<comments>https://www.reseaucerta.org/utilisation-de-la-distribution-kali-dans-le-cadre-du-bloc-3-sur-la-cyberscurit-avec-les-laboratoires-sur-docker-v3/#respond</comments>
		
		<dc:creator><![CDATA[Administrateur Certa]]></dc:creator>
		<pubDate>Mon, 18 Sep 2023 19:42:00 +0000</pubDate>
				<category><![CDATA[_BTS SIO]]></category>
		<category><![CDATA[Bloc 3 - Cybersécurité des services informatiques]]></category>
		<category><![CDATA[Côté labo 🧪]]></category>
		<category><![CDATA[analyse trames]]></category>
		<category><![CDATA[certificat]]></category>
		<category><![CDATA[chiffrement]]></category>
		<category><![CDATA[cryptographie]]></category>
		<category><![CDATA[dns spoofing]]></category>
		<category><![CDATA[empoisonnement arp]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[exploitation de vulnérabilités]]></category>
		<category><![CDATA[hameçonnage]]></category>
		<category><![CDATA[hygiène numérique]]></category>
		<category><![CDATA[ingénierie sociale]]></category>
		<category><![CDATA[Kali]]></category>
		<category><![CDATA[metasploit]]></category>
		<category><![CDATA[metasploitable]]></category>
		<category><![CDATA[mutillidae]]></category>
		<category><![CDATA[payloads]]></category>
		<category><![CDATA[remédiations]]></category>
		<category><![CDATA[respect des bonnes pratiques.]]></category>
		<category><![CDATA[scanner de vulnérabilités]]></category>
		<category><![CDATA[typosquating]]></category>
		<category><![CDATA[typosquattage]]></category>
		<guid isPermaLink="false">https://www.reseaucerta.org/?p=2008</guid>

					<description><![CDATA[Activités en laboratoire permettant d'exploiter la distribution Kali Linux dans le cadre du bloc 3 sur la cybersécurité. Deux laboratoires composés de conteneurs Docker sont fournis. Les activités suivantes utilisant ces laboratoires sont proposées : • Activité 1 : attaque MITM d'un s...]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="6211" class="elementor elementor-6211">
				<div class="elementor-element elementor-element-1dbff715 e-con-full e-flex e-con e-parent" data-id="1dbff715" data-element_type="container" data-e-type="container">
		<div class="elementor-element elementor-element-6a9688ca e-con-full e-flex e-con e-child" data-id="6a9688ca" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
				<div class="elementor-element elementor-element-566fdb94 elementor-widget elementor-widget-heading" data-id="566fdb94" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h1 class="elementor-heading-title elementor-size-default">Utilisation de la distribution Kali dans le cadre du bloc 3 sur la cybersécurité avec les laboratoires sur Docker (v3)</h1>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-194278ff e-con-full e-flex e-con e-child" data-id="194278ff" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
		<div class="elementor-element elementor-element-5c97a0cc e-con-full e-flex e-con e-child" data-id="5c97a0cc" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-1f8167cf elementor-widget elementor-widget-heading" data-id="1f8167cf" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Public concerné <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f393.png" alt="🎓" class="wp-smiley" style="height: 1em; max-height: 1em;" /></h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-58c14bd6 e-con-full e-flex e-con e-child" data-id="58c14bd6" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-5228b330 elementor-widget elementor-widget-text-editor" data-id="5228b330" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									BTS Services Informatiques aux Organisations								</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-256bdd03 e-con-full e-flex e-con e-child" data-id="256bdd03" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-fa536cc elementor-widget elementor-widget-heading" data-id="fa536cc" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Matière <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4da.png" alt="📚" class="wp-smiley" style="height: 1em; max-height: 1em;" /></h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-ba30799 e-con-full e-flex e-con e-child" data-id="ba30799" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-119f6587 elementor-widget elementor-widget-text-editor" data-id="119f6587" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									Bloc 3 &#8211; Cybersécurité des services informatiques								</div>
				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-3a4160ca e-con-full e-flex e-con e-child" data-id="3a4160ca" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
		<div class="elementor-element elementor-element-65ae97da e-con-full e-flex e-con e-child" data-id="65ae97da" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-53de58f0 elementor-widget elementor-widget-heading" data-id="53de58f0" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Présentation <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4cb.png" alt="📋" class="wp-smiley" style="height: 1em; max-height: 1em;" /></h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-62f424b9 e-con-full e-flex e-con e-child" data-id="62f424b9" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-4e06afea elementor-widget elementor-widget-text-editor" data-id="4e06afea" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p><strong>Activit&eacute;s en laboratoire </strong>permettant d&rsquo;exploiter la distribution Kali Linux dans le cadre du bloc 3 sur la cybers&eacute;curit&eacute;.<br />
Deux laboratoires compos&eacute;s de conteneurs Docker sont fournis.</p>

<p><strong>Les activit&eacute;s suivantes</strong> utilisant ces laboratoires sont propos&eacute;es :</p>

<ul>
	<li>Activit&eacute; 1&nbsp;: attaque MITM d&rsquo;un service SSH et mise en place de contre-mesures</li>
	<li>Activit&eacute; 2&nbsp;: attaque MITM d&rsquo;un service HTTP et mise en place de contre-mesures</li>
	<li>Activit&eacute; 3&nbsp;: attaque de type injection SQL et mise en place de contre-mesures</li>
	<li>Activit&eacute; 4&nbsp;: attaque par ing&eacute;nierie sociale (hame&ccedil;onnage associ&eacute; &agrave; du typosquattage)</li>
	<li>Activit&eacute; 5&nbsp;: exploitation d&rsquo;une faille applicative du service FTP via l&rsquo;outil &laquo;&nbsp;Metasploit&nbsp;&raquo;</li>
	<li>Activit&eacute; 6&nbsp;: analyse des failles de s&eacute;curit&eacute; avec Nessus</li>
	<li>Activit&eacute; 7&nbsp;: attaque de type DNS SPOOFING et propositions de contre-mesures</li>
</ul>

<p>Les activit&eacute;s peuvent se traiter de mani&egrave;re ind&eacute;pendante. La progression propos&eacute;e peut donc &ecirc;tre modifi&eacute;e et adapt&eacute;e en fonction des outils disponibles et des sp&eacute;cificit&eacute;s de chaque &eacute;tablissement.<br />
Les professeurs peuvent reprendre en l&rsquo;&eacute;tat ces activit&eacute;s ou les modifier pour les int&eacute;grer dans leurs travaux en laboratoire.</p>

<p>D&rsquo;autres activit&eacute;s ont vocation &agrave; &ecirc;tre ajout&eacute;es.</p>
								</div>
				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-6a2bf15b e-con-full e-flex e-con e-child" data-id="6a2bf15b" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
		<div class="elementor-element elementor-element-3b21d465 e-con-full e-flex e-con e-child" data-id="3b21d465" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-35909b0a elementor-widget elementor-widget-heading" data-id="35909b0a" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Prérequis <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/26a1.png" alt="⚡" class="wp-smiley" style="height: 1em; max-height: 1em;" /></h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-21c893af e-con-full e-flex e-con e-child" data-id="21c893af" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-357a666e elementor-widget elementor-widget-text-editor" data-id="357a666e" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									Connaissances de base concernant l’administration d’un système GNU/Linux, fondamentaux en matière de cryptographie, de certificat, fondamentaux réseaux (Ethernet, IP, TCP).								</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-2468b14c e-con-full e-flex e-con e-child" data-id="2468b14c" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-50002e0b elementor-widget elementor-widget-heading" data-id="50002e0b" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Savoirs <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f393.png" alt="🎓" class="wp-smiley" style="height: 1em; max-height: 1em;" /></h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-24511f59 e-con-full e-flex e-con e-child" data-id="24511f59" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-709d0cf2 elementor-widget elementor-widget-text-editor" data-id="709d0cf2" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Typologie des risques et leurs impacts.<br />
Principe de la s&eacute;curit&eacute; : disponibilit&eacute;, int&eacute;grit&eacute; et confidentialit&eacute;.<br />
Chiffrement, authentification et preuve : principes et techniques.<br />
S&eacute;curit&eacute; des applications Web : risques, menaces et protocoles.<br />
Cybers&eacute;curit&eacute; : bonnes pratiques, normes et standards.<br />
S&eacute;curit&eacute; du d&eacute;veloppement d&rsquo;application.<br />
Vuln&eacute;rabilit&eacute;s et contre-mesures sur les probl&egrave;mes courants de d&eacute;veloppement.</p>								</div>
				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-1684513d e-con-full e-flex e-con e-child" data-id="1684513d" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
		<div class="elementor-element elementor-element-2a81585b e-con-full e-flex e-con e-child" data-id="2a81585b" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-57dfdb65 elementor-widget elementor-widget-heading" data-id="57dfdb65" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Compétences <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4aa.png" alt="💪" class="wp-smiley" style="height: 1em; max-height: 1em;" /></h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-27636038 e-con-full e-flex e-con e-child" data-id="27636038" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-7582c6ed elementor-widget elementor-widget-text-editor" data-id="7582c6ed" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Prot&eacute;ger les donn&eacute;es &agrave; caract&egrave;re personnel.<br />
Garantir la disponibilit&eacute;, l&rsquo;int&eacute;grit&eacute; et la confidentialit&eacute; des services informatiques et des donn&eacute;es de l&rsquo;organisation face &agrave; des cyberattaques.<br />
Assurer la cybers&eacute;curit&eacute; d&rsquo;une infrastructure r&eacute;seau, d&rsquo;un syst&egrave;me, d&rsquo;un service.<br />
Assurer la cybers&eacute;curit&eacute; d&rsquo;une solution applicative.</p>
								</div>
				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-476f5b46 e-con-full e-flex e-con e-child" data-id="476f5b46" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
		<div class="elementor-element elementor-element-57f68725 e-con-full e-flex e-con e-child" data-id="57f68725" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-7f9fd83f elementor-widget elementor-widget-heading" data-id="7f9fd83f" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Outils <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f6e0.png" alt="🛠" class="wp-smiley" style="height: 1em; max-height: 1em;" /></h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-8afa5d4 e-con-full e-flex e-con e-child" data-id="8afa5d4" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-13fc501f elementor-widget elementor-widget-text-editor" data-id="13fc501f" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Kali avec le framework metasploit, metasploitable, mutillidae, conteneurs sur Docker.<br />
Laboratoires 1 et 2 fournis</p>

<ul>
	<li>Laboratoire 1 : https://forge.apps.education.fr/reseau-certa/bts-sio/labos-kali-docker/lab1/</li>
	<li>Laboratoire 2 : https://forge.apps.education.fr/reseau-certa/bts-sio/labos-kali-docker/lab2/</li>
</ul>

<p><strong>Le temps d&#39;installation de chaque laboratoire peut prendre un peu de temps, notamment lors du t&eacute;l&eacute;chargement de l&#39;image Kali.</strong></p>
								</div>
				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-5f9a8b1c e-con-full e-flex e-con e-child" data-id="5f9a8b1c" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
		<div class="elementor-element elementor-element-6e2c4d8a e-con-full e-flex e-con e-child" data-id="6e2c4d8a" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-7b5e9f2d elementor-widget elementor-widget-heading" data-id="7b5e9f2d" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Téléchargements <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4e5.png" alt="📥" class="wp-smiley" style="height: 1em; max-height: 1em;" /></h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-8c1f3e6b e-con-full e-flex e-con e-child" data-id="8c1f3e6b" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-9d4a7c5e elementor-widget elementor-widget-text-editor" data-id="9d4a7c5e" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p><strong><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4ce.png" alt="📎" class="wp-smiley" style="height: 1em; max-height: 1em;" /> labo-kali.pdf</strong><br>Fichier libre &#8211; <a href="/wp-content/uploads/laboratoires/labo-kali.pdf" target="_blank">Télécharger</a> (77.16 KB)</p><p><strong><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4ce.png" alt="📎" class="wp-smiley" style="height: 1em; max-height: 1em;" /> labo-kali-docker-situations_et_laboratoires_v3.zip</strong><br>Fichier libre &#8211; <a href="/wp-content/uploads/laboratoires/labo-kali-docker-situations_et_laboratoires_v3.zip" target="_blank">Télécharger</a> (20.49 MB)</p><p><strong><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> labo-kali-docker-corriges_des_situations_v3.zip</strong><br>Corrigé disponible &#8211; <a href="/wp-content/uploads/laboratoires/private/labo-kali-docker-corriges_des_situations_v3.zip" target="_blank">Télécharger</a></p>								</div>
				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-7012ba46 e-con-full e-flex e-con e-child" data-id="7012ba46" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
		<div class="elementor-element elementor-element-574718d6 e-con-full e-flex e-con e-child" data-id="574718d6" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-73863dd9 elementor-widget elementor-widget-heading" data-id="73863dd9" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Mots-clés ﹟</h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-3683f1b4 e-con-full e-flex e-con e-child" data-id="3683f1b4" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-6115401d elementor-widget elementor-widget-text-editor" data-id="6115401d" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									Kali, cryptographie, chiffrement, certificat, analyse trames, empoisonnement arp, scanner de vulnérabilités, exploitation de vulnérabilités, exploit, metasploit, metasploitable, mutillidae, payloads, hameçonnage, typosquattage, typosquating, ingénierie sociale, dns spoofing, remédiations, hygiène numérique, respect des bonnes pratiques.								</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-56867941 e-con-full e-flex e-con e-child" data-id="56867941" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-562116c1 elementor-widget elementor-widget-heading" data-id="562116c1" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Version <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4dd.png" alt="📝" class="wp-smiley" style="height: 1em; max-height: 1em;" /></h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-1cbb70b2 e-con-full e-flex e-con e-child" data-id="1cbb70b2" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-2fb0a8a4 elementor-widget elementor-widget-text-editor" data-id="2fb0a8a4" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									V3.0								</div>
				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-733aa9fd e-con-full e-flex e-con e-child" data-id="733aa9fd" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
		<div class="elementor-element elementor-element-480ddade e-con-full e-flex e-con e-child" data-id="480ddade" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-6463db97 elementor-widget elementor-widget-heading" data-id="6463db97" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Date de publication <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4c5.png" alt="📅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-4e6d85c5 e-con-full e-flex e-con e-child" data-id="4e6d85c5" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-6bf9fe6d elementor-widget elementor-widget-text-editor" data-id="6bf9fe6d" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									18/09/2023								</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-4a1a1e4c e-con-full e-flex e-con e-child" data-id="4a1a1e4c" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-3485285a elementor-widget elementor-widget-heading" data-id="3485285a" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Auteur.e(s) <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/270d.png" alt="✍" class="wp-smiley" style="height: 1em; max-height: 1em;" /></h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-4f21a5e7 e-con-full e-flex e-con e-child" data-id="4f21a5e7" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-36af1b3c elementor-widget elementor-widget-text-editor" data-id="36af1b3c" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									Quentin Demoulières, Patrice Dignan, Apollonie Raffalli, Patrizio Valente, Cécile Nivaggioni avec la relecture de Valérie Martinez et les tests de Christelle Thiry.								</div>
				</div>
				</div>
				</div>
				</div>
				</div>
		]]></content:encoded>
					
					<wfw:commentRss>https://www.reseaucerta.org/utilisation-de-la-distribution-kali-dans-le-cadre-du-bloc-3-sur-la-cyberscurit-avec-les-laboratoires-sur-docker-v3/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Utilisation de la distribution Kali dans le cadre du bloc 3 sur la cybersécurité v2 + MITM</title>
		<link>https://www.reseaucerta.org/utilisation-de-la-distribution-kali-dans-le-cadre-du-bloc-3-sur-la-cyberscurit-v2-mitm/</link>
					<comments>https://www.reseaucerta.org/utilisation-de-la-distribution-kali-dans-le-cadre-du-bloc-3-sur-la-cyberscurit-v2-mitm/#respond</comments>
		
		<dc:creator><![CDATA[Administrateur Certa]]></dc:creator>
		<pubDate>Mon, 07 Nov 2022 19:42:00 +0000</pubDate>
				<category><![CDATA[_BTS SIO]]></category>
		<category><![CDATA[Bloc 3 - Cybersécurité des services informatiques]]></category>
		<category><![CDATA[Bloc 3 - Cybersécurité des services informatiques - SISR]]></category>
		<category><![CDATA[Côté labo 🧪]]></category>
		<category><![CDATA[analyse trames]]></category>
		<category><![CDATA[certificat]]></category>
		<category><![CDATA[chiffrement]]></category>
		<category><![CDATA[cryptographie]]></category>
		<category><![CDATA[dns spoofing]]></category>
		<category><![CDATA[empoisonnement arp]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[exploitation de vulnérabilités]]></category>
		<category><![CDATA[hameçonnage]]></category>
		<category><![CDATA[hygiène numérique]]></category>
		<category><![CDATA[ingénierie sociale]]></category>
		<category><![CDATA[Kali]]></category>
		<category><![CDATA[metasploit]]></category>
		<category><![CDATA[payloads]]></category>
		<category><![CDATA[remédiations]]></category>
		<category><![CDATA[respect des bonnes pratiques.]]></category>
		<category><![CDATA[scanner de vulnérabilités]]></category>
		<category><![CDATA[typosquating]]></category>
		<category><![CDATA[typosquattage]]></category>
		<guid isPermaLink="false">https://www.reseaucerta.org/?p=2009</guid>

					<description><![CDATA[Activités en laboratoire permettant d'exploiter la distribution Kali Linux dans le cadre du bloc 3 sur la cybersécurité. Deux laboratoires composés de machines virtuelles sur VirtualBox sont fournis (connexion requise) &#8595;&#8595; . Les activités suivantes utilisant ces laboratoires sont p...]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="6212" class="elementor elementor-6212">
				<div class="elementor-element elementor-element-1dbff715 e-con-full e-flex e-con e-parent" data-id="1dbff715" data-element_type="container" data-e-type="container">
		<div class="elementor-element elementor-element-6a9688ca e-con-full e-flex e-con e-child" data-id="6a9688ca" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
				<div class="elementor-element elementor-element-566fdb94 elementor-widget elementor-widget-heading" data-id="566fdb94" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h1 class="elementor-heading-title elementor-size-default">Utilisation de la distribution Kali dans le cadre du bloc 3 sur la cybersécurité - Activités MITM</h1>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-194278ff e-con-full e-flex e-con e-child" data-id="194278ff" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
		<div class="elementor-element elementor-element-5c97a0cc e-con-full e-flex e-con e-child" data-id="5c97a0cc" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-1f8167cf elementor-widget elementor-widget-heading" data-id="1f8167cf" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Public concerné <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f393.png" alt="🎓" class="wp-smiley" style="height: 1em; max-height: 1em;" /></h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-58c14bd6 e-con-full e-flex e-con e-child" data-id="58c14bd6" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-5228b330 elementor-widget elementor-widget-text-editor" data-id="5228b330" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									BTS Services Informatiques aux Organisations								</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-256bdd03 e-con-full e-flex e-con e-child" data-id="256bdd03" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-fa536cc elementor-widget elementor-widget-heading" data-id="fa536cc" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Matière <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4da.png" alt="📚" class="wp-smiley" style="height: 1em; max-height: 1em;" /></h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-ba30799 e-con-full e-flex e-con e-child" data-id="ba30799" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-119f6587 elementor-widget elementor-widget-text-editor" data-id="119f6587" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									Bloc 3 &#8211; Cybersécurité des services informatiques								</div>
				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-3a4160ca e-con-full e-flex e-con e-child" data-id="3a4160ca" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
		<div class="elementor-element elementor-element-65ae97da e-con-full e-flex e-con e-child" data-id="65ae97da" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-53de58f0 elementor-widget elementor-widget-heading" data-id="53de58f0" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Présentation <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4cb.png" alt="📋" class="wp-smiley" style="height: 1em; max-height: 1em;" /></h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-62f424b9 e-con-full e-flex e-con e-child" data-id="62f424b9" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-4e06afea elementor-widget elementor-widget-text-editor" data-id="4e06afea" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p><strong>Activit&eacute;s en laboratoire </strong>permettant d&rsquo;exploiter la distribution Kali Linux dans le cadre du bloc 3 sur la cybers&eacute;curit&eacute;.<br />
Deux laboratoires compos&eacute;s de machines virtuelles sur VirtualBox sont fournis (connexion requise) &darr;&darr; .</p>

<p><strong>Les activit&eacute;s suivantes</strong> utilisant ces laboratoires sont propos&eacute;es :</p>

<ul>
	<li>Activit&eacute; 1&nbsp;: attaque MITM d&rsquo;un service SSH et mise en place de contre-mesures</li>
	<li>Activit&eacute; 2&nbsp;: attaque MITM d&rsquo;un service HTTP et mise en place de contre-mesures</li>
	<li>Activit&eacute; 3&nbsp;: attaque de type injection SQL et mise en place de contre-mesures</li>
	<li>Activit&eacute; 4&nbsp;: attaque par ing&eacute;nierie sociale (hame&ccedil;onnage associ&eacute; &agrave; du typosquattage)</li>
	<li>Activit&eacute; 5&nbsp;: exploitation d&rsquo;une faille applicative du service FTP via l&rsquo;outil &laquo;&nbsp;Metasploit&nbsp;&raquo;</li>
	<li>Activit&eacute; 6&nbsp;: analyse des failles de s&eacute;curit&eacute; avec Nessus</li>
	<li>Activit&eacute; 7&nbsp;: attaque de type DNS SPOOFING et propositions de contre-mesures</li>
</ul>

<p>Les activit&eacute;s peuvent se traiter de mani&egrave;re ind&eacute;pendante. La progression propos&eacute;e peut donc &ecirc;tre modifi&eacute;e et adapt&eacute;e en fonction des outils disponibles et des sp&eacute;cificit&eacute;s de chaque &eacute;tablissement.<br />
Les professeurs peuvent reprendre en l&rsquo;&eacute;tat ces activit&eacute;s ou les modifier pour les int&eacute;grer dans leurs travaux en laboratoire.</p>

<p>D&rsquo;autres activit&eacute;s ont vocation &agrave; &ecirc;tre ajout&eacute;es.</p>
								</div>
				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-6a2bf15b e-con-full e-flex e-con e-child" data-id="6a2bf15b" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
		<div class="elementor-element elementor-element-3b21d465 e-con-full e-flex e-con e-child" data-id="3b21d465" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-35909b0a elementor-widget elementor-widget-heading" data-id="35909b0a" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Prérequis <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/26a1.png" alt="⚡" class="wp-smiley" style="height: 1em; max-height: 1em;" /></h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-21c893af e-con-full e-flex e-con e-child" data-id="21c893af" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-357a666e elementor-widget elementor-widget-text-editor" data-id="357a666e" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									Connaissances de base concernant l’administration d’un système GNU/Linux, fondamentaux en matière de cryptographie, de certificat, fondamentaux réseaux (Ethernet, IP, TCP).								</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-2468b14c e-con-full e-flex e-con e-child" data-id="2468b14c" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-50002e0b elementor-widget elementor-widget-heading" data-id="50002e0b" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Savoirs <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f393.png" alt="🎓" class="wp-smiley" style="height: 1em; max-height: 1em;" /></h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-24511f59 e-con-full e-flex e-con e-child" data-id="24511f59" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-709d0cf2 elementor-widget elementor-widget-text-editor" data-id="709d0cf2" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Typologie des risques et leurs impacts.<br />
Principe de la s&eacute;curit&eacute; : disponibilit&eacute;, int&eacute;grit&eacute; et confidentialit&eacute;.<br />
Chiffrement, authentification et preuve : principes et techniques.<br />
S&eacute;curit&eacute; des applications Web : risques, menaces et protocoles.<br />
Cybers&eacute;curit&eacute; : bonnes pratiques, normes et standards.<br />
S&eacute;curit&eacute; du d&eacute;veloppement d&rsquo;application.<br />
Vuln&eacute;rabilit&eacute;s et contre-mesures sur les probl&egrave;mes courants de d&eacute;veloppement</p>								</div>
				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-1684513d e-con-full e-flex e-con e-child" data-id="1684513d" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
		<div class="elementor-element elementor-element-2a81585b e-con-full e-flex e-con e-child" data-id="2a81585b" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-57dfdb65 elementor-widget elementor-widget-heading" data-id="57dfdb65" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Compétences <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4aa.png" alt="💪" class="wp-smiley" style="height: 1em; max-height: 1em;" /></h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-27636038 e-con-full e-flex e-con e-child" data-id="27636038" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-7582c6ed elementor-widget elementor-widget-text-editor" data-id="7582c6ed" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Prot&eacute;ger les donn&eacute;es &agrave; caract&egrave;re personnel.<br />
Garantir la disponibilit&eacute;, l&rsquo;int&eacute;grit&eacute; et la confidentialit&eacute; des services informatiques et des donn&eacute;es de l&rsquo;organisation face &agrave; des cyberattaques.<br />
Assurer la cybers&eacute;curit&eacute; d&rsquo;une infrastructure r&eacute;seau, d&rsquo;un syst&egrave;me, d&rsquo;un service.<br />
Assurer la cybers&eacute;curit&eacute; d&rsquo;une solution applicative.</p>
								</div>
				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-476f5b46 e-con-full e-flex e-con e-child" data-id="476f5b46" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
		<div class="elementor-element elementor-element-57f68725 e-con-full e-flex e-con e-child" data-id="57f68725" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-7f9fd83f elementor-widget elementor-widget-heading" data-id="7f9fd83f" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Outils <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f6e0.png" alt="🛠" class="wp-smiley" style="height: 1em; max-height: 1em;" /></h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-8afa5d4 e-con-full e-flex e-con e-child" data-id="8afa5d4" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-13fc501f elementor-widget elementor-widget-text-editor" data-id="13fc501f" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Kali avec le framework metasploit, metasploitable, mutillidae, VM sur VirtualBox.<br />
Laboratoires 1 et 2 fournis (connexion requise) :</p>

<ul>
	<li>Laboratoire 1</li>
	<li>Laboratoire 2&nbsp;&darr;&darr;</li>
</ul>

<p><strong>Le temps de t&eacute;l&eacute;chargement peut &ecirc;tre long (notamment pour le deuxi&egrave;me laboratoire). Il est conseill&eacute; de les t&eacute;l&eacute;charger et de les mettre &agrave; disposition des &eacute;tudiants dans l&rsquo;environnement num&eacute;rique de travail du lyc&eacute;e.</strong></p>
								</div>
				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-5f9a8b1c e-con-full e-flex e-con e-child" data-id="5f9a8b1c" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
		<div class="elementor-element elementor-element-6e2c4d8a e-con-full e-flex e-con e-child" data-id="6e2c4d8a" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-7b5e9f2d elementor-widget elementor-widget-heading" data-id="7b5e9f2d" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Téléchargements <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4e5.png" alt="📥" class="wp-smiley" style="height: 1em; max-height: 1em;" /></h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-8c1f3e6b e-con-full e-flex e-con e-child" data-id="8c1f3e6b" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-9d4a7c5e elementor-widget elementor-widget-text-editor" data-id="9d4a7c5e" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p><strong><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4ce.png" alt="📎" class="wp-smiley" style="height: 1em; max-height: 1em;" /> labo-kali.pdf</strong><br>Fichier libre &#8211; <a href="/wp-content/uploads/laboratoires/labo-kali.pdf" target="_blank">Télécharger</a> (79.85 KB)</p><p><strong><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4ce.png" alt="📎" class="wp-smiley" style="height: 1em; max-height: 1em;" /> labo-kali-v2.0-situations_et_laboratoires.zip</strong><br>Fichier libre &#8211; <a href="/wp-content/uploads/laboratoires/labo-kali-v2.0-situations_et_laboratoires.zip" target="_blank">Télécharger</a> (13.38 MB)</p><p><strong><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> labo-kali-v2.0-corriges_des_situations.zip</strong><br>Corrigé disponible &#8211; <a href="/wp-content/uploads/laboratoires/private/labo-kali-v2.0-corriges_des_situations.zip" target="_blank">Télécharger</a></p>								</div>
				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-7012ba46 e-con-full e-flex e-con e-child" data-id="7012ba46" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
		<div class="elementor-element elementor-element-574718d6 e-con-full e-flex e-con e-child" data-id="574718d6" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-73863dd9 elementor-widget elementor-widget-heading" data-id="73863dd9" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Mots-clés ﹟</h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-3683f1b4 e-con-full e-flex e-con e-child" data-id="3683f1b4" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-6115401d elementor-widget elementor-widget-text-editor" data-id="6115401d" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									Kali, cryptographie, chiffrement, certificat, analyse trames, empoisonnement arp, scanner de vulnérabilités, exploitation de vulnérabilités, exploit, metasploit, payloads, hameçonnage, typosquattage, typosquating, ingénierie sociale, dns spoofing, remédiations, hygiène numérique, respect des bonnes pratiques.								</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-56867941 e-con-full e-flex e-con e-child" data-id="56867941" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-562116c1 elementor-widget elementor-widget-heading" data-id="562116c1" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Version <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4dd.png" alt="📝" class="wp-smiley" style="height: 1em; max-height: 1em;" /></h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-1cbb70b2 e-con-full e-flex e-con e-child" data-id="1cbb70b2" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-2fb0a8a4 elementor-widget elementor-widget-text-editor" data-id="2fb0a8a4" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									V2.0								</div>
				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-733aa9fd e-con-full e-flex e-con e-child" data-id="733aa9fd" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
		<div class="elementor-element elementor-element-480ddade e-con-full e-flex e-con e-child" data-id="480ddade" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-6463db97 elementor-widget elementor-widget-heading" data-id="6463db97" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Date de publication <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4c5.png" alt="📅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-4e6d85c5 e-con-full e-flex e-con e-child" data-id="4e6d85c5" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-6bf9fe6d elementor-widget elementor-widget-text-editor" data-id="6bf9fe6d" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									07/11/2022								</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-4a1a1e4c e-con-full e-flex e-con e-child" data-id="4a1a1e4c" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-3485285a elementor-widget elementor-widget-heading" data-id="3485285a" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Auteur.e(s) <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/270d.png" alt="✍" class="wp-smiley" style="height: 1em; max-height: 1em;" /></h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-4f21a5e7 e-con-full e-flex e-con e-child" data-id="4f21a5e7" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-36af1b3c elementor-widget elementor-widget-text-editor" data-id="36af1b3c" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									Quentin Demoulières, Patrice Dignan, Apollonie Raffalli, Patrizio Valente, Cécile Nivaggioni avec la relecture de Valérie Martinez.								</div>
				</div>
				</div>
				</div>
				</div>
				</div>
		]]></content:encoded>
					
					<wfw:commentRss>https://www.reseaucerta.org/utilisation-de-la-distribution-kali-dans-le-cadre-du-bloc-3-sur-la-cyberscurit-v2-mitm/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Attaque MITM d’un service SSH et mise en place de contre-mesures</title>
		<link>https://www.reseaucerta.org/attaque-mitm-dun-service-ssh-et-mise-en-place-de-contre-mesures/</link>
					<comments>https://www.reseaucerta.org/attaque-mitm-dun-service-ssh-et-mise-en-place-de-contre-mesures/#respond</comments>
		
		<dc:creator><![CDATA[Administrateur Certa]]></dc:creator>
		<pubDate>Wed, 31 Mar 2021 21:59:02 +0000</pubDate>
				<category><![CDATA[_BTS SIO]]></category>
		<category><![CDATA[Bloc 3 - Cybersécurité des services informatiques - SISR]]></category>
		<category><![CDATA[Côté labo 🧪]]></category>
		<category><![CDATA[chiffrement]]></category>
		<category><![CDATA[cryptographie]]></category>
		<category><![CDATA[exploitation de vulnérabilités]]></category>
		<category><![CDATA[hygiène numérique]]></category>
		<category><![CDATA[remédiations]]></category>
		<category><![CDATA[respect des bonnes pratiques de sécurité.]]></category>
		<guid isPermaLink="false">https://www.reseaucerta.org/?p=2021</guid>

					<description><![CDATA[Après avoir remobilisé les savoirs fondamentaux en matière de cryptographie, ce TP permet de mettre en évidence certaines vulnérabilités du service SSH. À travers l’exploitation de ces vulnérabilités, l’étudiant sera amené à approfondir le fonctionnement de certains protocoles réseaux et de certa...]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="2021" class="elementor elementor-2021">
				<div class="elementor-element elementor-element-7490f3bc e-con-full e-flex e-con e-parent" data-id="7490f3bc" data-element_type="container" data-e-type="container">
		<div class="elementor-element elementor-element-a26c695 e-grid e-con-full e-con e-child" data-id="a26c695" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
				<div class="elementor-element elementor-element-3f58867c elementor-widget elementor-widget-heading" data-id="3f58867c" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Ce TP a pour but de simuler une attaque de l’homme du milieu sur un service SSH afin de pointer différentes vulnérabilités et de proposer des contre-mesures.</h2>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-6fdc1801 e-con-full e-flex e-con e-child" data-id="6fdc1801" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
		<div class="elementor-element elementor-element-15ac507b e-con-full e-flex e-con e-child" data-id="15ac507b" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-4f5cc91 elementor-widget elementor-widget-heading" data-id="4f5cc91" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Public concerné </h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-6c720b27 e-con-full e-flex e-con e-child" data-id="6c720b27" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-2cd03a52 elementor-widget elementor-widget-text-editor" data-id="2cd03a52" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>BTS SIO</p>								</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-700a72cb e-con-full e-flex e-con e-child" data-id="700a72cb" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-13015f8c elementor-widget elementor-widget-heading" data-id="13015f8c" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Matière</h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-26c025b4 e-con-full e-flex e-con e-child" data-id="26c025b4" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-5a1f43f0 elementor-widget elementor-widget-text-editor" data-id="5a1f43f0" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Bloc 3 &#8211; Cybersécurité des services informatiques &#8211; SISR</p>								</div>
				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-2dcc698d e-con-full e-flex e-con e-child" data-id="2dcc698d" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
		<div class="elementor-element elementor-element-4f4861e9 e-con-full e-flex e-con e-child" data-id="4f4861e9" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-42b2032 elementor-widget elementor-widget-heading" data-id="42b2032" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Présentation </h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-2e7e9978 e-con-full e-flex e-con e-child" data-id="2e7e9978" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-6485c15f elementor-widget elementor-widget-text-editor" data-id="6485c15f" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<div class=""><table border="0" width="100%" cellpadding="5"><tbody><tr><td class="reglageContenu"><p>Après avoir remobilisé les savoirs fondamentaux en matière de cryptographie, ce TP permet de mettre en évidence certaines vulnérabilités du service SSH. À travers l’exploitation de ces vulnérabilités, l’étudiant sera amené à approfondir le fonctionnement de certains protocoles réseaux et de certaines attaques informatiques puis à mettre en place des contre-mesures visant à améliorer son hygiène numérique et ses pratiques professionnelles.</p></td></tr></tbody></table></div>								</div>
				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-5a5d89a0 e-con-full e-flex e-con e-child" data-id="5a5d89a0" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
		<div class="elementor-element elementor-element-c131dbf e-con-full e-flex e-con e-child" data-id="c131dbf" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-3b6cdbba elementor-widget elementor-widget-heading" data-id="3b6cdbba" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Pré-requis</h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-5b7c8bd1 e-con-full e-flex e-con e-child" data-id="5b7c8bd1" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-e0be914 elementor-widget elementor-widget-text-editor" data-id="e0be914" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Connaissances de base concernant l’administration d’un système GNU/Linux, fondamentaux en matière de cryptographie, fondamentaux réseaux (Ethernet, IP, TCP).</p>								</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-98de72a e-con-full e-flex e-con e-child" data-id="98de72a" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-6e6441ca elementor-widget elementor-widget-heading" data-id="6e6441ca" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Savoirs <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f393.png" alt="🎓" class="wp-smiley" style="height: 1em; max-height: 1em;" /></h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-29ba747f e-con-full e-flex e-con e-child" data-id="29ba747f" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-3e4e62d5 elementor-widget elementor-widget-text-editor" data-id="3e4e62d5" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Sécurité des communications numériques : rôle des protocoles, segmentation, administration, restriction physique et logique.</p><p>Chiffrement, authentification et preuve : principes et techniques.</p><p>Chiffrement symétrique, asymétrique et fonction de hachage ; appliquer le principe de Kerckhoffs ; respecter l’état de l’art en matière de choix d’algorithmes cryptographiques ; authentification faible, authentification forte ; exploitation de vulnérabilité du protocole ARP ; analyse de trames.</p>								</div>
				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-7523f3ea e-con-full e-flex e-con e-child" data-id="7523f3ea" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
		<div class="elementor-element elementor-element-8191744 e-con-full e-flex e-con e-child" data-id="8191744" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-7e5f2bf elementor-widget elementor-widget-heading" data-id="7e5f2bf" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Compétences</h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-4343fc4f e-con-full e-flex e-con e-child" data-id="4343fc4f" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-6320561a elementor-widget elementor-widget-text-editor" data-id="6320561a" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>B3.4 Garantir la disponibilité, l’intégrité et la confidentialité des services informatiques et des données de l’organisation face à des cyberattaques</p><p>B3.5 A &#8211; Assurer la cybersécurité d’une infrastructure réseau, d’un système, d’un service</p>								</div>
				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-67250b8 e-con-full e-flex e-con e-child" data-id="67250b8" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
		<div class="elementor-element elementor-element-a0145c6 e-con-full e-flex e-con e-child" data-id="a0145c6" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-99145ab elementor-widget elementor-widget-heading" data-id="99145ab" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Transversalité <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f503.png" alt="🔃" class="wp-smiley" style="height: 1em; max-height: 1em;" /></h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-8f353f6 e-con-full e-flex e-con e-child" data-id="8f353f6" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-0146fa2 elementor-widget elementor-widget-text-editor" data-id="0146fa2" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>B2.2 SISR &#8211; Installer, tester et déployer une solution d’infrastructure réseau</p><p>B2.3 SISR &#8211; Exploiter, dépanner et superviser une solution d’infrastructure réseau</p>								</div>
				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-22972504 e-con-full e-flex e-con e-child" data-id="22972504" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
		<div class="elementor-element elementor-element-3d3beabe e-con-full e-flex e-con e-child" data-id="3d3beabe" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-403545fc elementor-widget elementor-widget-heading" data-id="403545fc" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Téléchargements <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4e5.png" alt="📥" class="wp-smiley" style="height: 1em; max-height: 1em;" /></h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-76b53e17 e-con-full e-flex e-con e-child" data-id="76b53e17" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-255ab4ac elementor-widget elementor-widget-text-editor" data-id="255ab4ac" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p><strong><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4ce.png" alt="📎" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <a href="https://www.reseaucerta.org/wp-content/uploads/laboratoires/tp-mitmSSH-v1.1_1.pdf" target="_blank" rel="noopener">tp-mitmSSH-v1.1</a></strong></p><p><strong><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4ce.png" alt="📎" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <a href="https://www.reseaucerta.org/wp-content/uploads/laboratoires/tp-mitmSSH-v1.1.docx">tp-mitmSSH-v1.1</a></strong></p><p><strong><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Corrigé <a href="https://www.reseaucerta.org/wp-content/uploads/sujets/private/tp-mitmSSH-v1.1-corrige.zip">tp-mitmSSH-v1.1-corrigé</a></strong></p><p>Téléchargement supplémentaire : Connexion requise</p>								</div>
				</div>
				<div class="elementor-element elementor-element-f4420bd elementor-widget elementor-widget-shortcode" data-id="f4420bd" data-element_type="widget" data-e-type="widget" data-widget_type="shortcode.default">
				<div class="elementor-widget-container">
							<div class="elementor-shortcode"><div style="padding:20px;background:#f5f5f5;border-left:4px solid #0073aa;margin:15px 0;">Ce contenu est réservé aux utilisateurs connectés.</div></div>
						</div>
				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-3f8338cc e-con-full e-flex e-con e-child" data-id="3f8338cc" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
		<div class="elementor-element elementor-element-49fc24eb e-con-full e-flex e-con e-child" data-id="49fc24eb" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-443f8efb elementor-widget elementor-widget-heading" data-id="443f8efb" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Mots-clés ﹟</h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-c2db25d e-con-full e-flex e-con e-child" data-id="c2db25d" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-38a5b2df elementor-widget elementor-widget-text-editor" data-id="38a5b2df" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>cryptographie, chiffrement, exploitation de vulnérabilités, remédiations, hygiène numérique, respect des bonnes pratiques de sécurité</p>								</div>
				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-63a1078d e-con-full e-flex e-con e-child" data-id="63a1078d" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
		<div class="elementor-element elementor-element-59680f6e e-con-full e-flex e-con e-child" data-id="59680f6e" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-3070493c elementor-widget elementor-widget-heading" data-id="3070493c" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Date de publication</h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-9341c29 e-con-full e-flex e-con e-child" data-id="9341c29" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-4f8e99ca elementor-widget elementor-widget-text-editor" data-id="4f8e99ca" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>3 septembre 2021</p>								</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-4b98b5bb e-con-full e-flex e-con e-child" data-id="4b98b5bb" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-20536875 elementor-widget elementor-widget-heading" data-id="20536875" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Auteur.e(s)</h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-72d83484 e-con-full e-flex e-con e-child" data-id="72d83484" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-34eabf97 elementor-widget elementor-widget-text-editor" data-id="34eabf97" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Quentin Demoulière avec les relectures de Valérie Martinez, David Duron et Gilles Loiseau</p>								</div>
				</div>
				</div>
				</div>
				</div>
				</div>
		]]></content:encoded>
					
					<wfw:commentRss>https://www.reseaucerta.org/attaque-mitm-dun-service-ssh-et-mise-en-place-de-contre-mesures/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
