<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>typosquattage &#8211; Réseau CERTA</title>
	<atom:link href="https://www.reseaucerta.org/tag/typosquattage/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.reseaucerta.org</link>
	<description>Des ressources pour enseigner le numérique</description>
	<lastBuildDate>Thu, 12 Jun 2025 15:56:32 +0000</lastBuildDate>
	<language>fr-FR</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.reseaucerta.org/wp-content/uploads/cours/cropped-favicon-certa-32x32.png</url>
	<title>typosquattage &#8211; Réseau CERTA</title>
	<link>https://www.reseaucerta.org</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Utilisation de la distribution Kali dans le cadre du bloc 3 sur la cybersécurité avec les laboratoires sur Docker (v3)</title>
		<link>https://www.reseaucerta.org/utilisation-de-la-distribution-kali-dans-le-cadre-du-bloc-3-sur-la-cyberscurit-avec-les-laboratoires-sur-docker-v3/</link>
					<comments>https://www.reseaucerta.org/utilisation-de-la-distribution-kali-dans-le-cadre-du-bloc-3-sur-la-cyberscurit-avec-les-laboratoires-sur-docker-v3/#respond</comments>
		
		<dc:creator><![CDATA[Administrateur Certa]]></dc:creator>
		<pubDate>Mon, 18 Sep 2023 19:42:00 +0000</pubDate>
				<category><![CDATA[_BTS SIO]]></category>
		<category><![CDATA[Bloc 3 - Cybersécurité des services informatiques]]></category>
		<category><![CDATA[Côté labo 🧪]]></category>
		<category><![CDATA[analyse trames]]></category>
		<category><![CDATA[certificat]]></category>
		<category><![CDATA[chiffrement]]></category>
		<category><![CDATA[cryptographie]]></category>
		<category><![CDATA[dns spoofing]]></category>
		<category><![CDATA[empoisonnement arp]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[exploitation de vulnérabilités]]></category>
		<category><![CDATA[hameçonnage]]></category>
		<category><![CDATA[hygiène numérique]]></category>
		<category><![CDATA[ingénierie sociale]]></category>
		<category><![CDATA[Kali]]></category>
		<category><![CDATA[metasploit]]></category>
		<category><![CDATA[metasploitable]]></category>
		<category><![CDATA[mutillidae]]></category>
		<category><![CDATA[payloads]]></category>
		<category><![CDATA[remédiations]]></category>
		<category><![CDATA[respect des bonnes pratiques.]]></category>
		<category><![CDATA[scanner de vulnérabilités]]></category>
		<category><![CDATA[typosquating]]></category>
		<category><![CDATA[typosquattage]]></category>
		<guid isPermaLink="false">https://www.reseaucerta.org/?p=2008</guid>

					<description><![CDATA[Activités en laboratoire permettant d'exploiter la distribution Kali Linux dans le cadre du bloc 3 sur la cybersécurité. Deux laboratoires composés de conteneurs Docker sont fournis. Les activités suivantes utilisant ces laboratoires sont proposées : • Activité 1 : attaque MITM d'un s...]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="6211" class="elementor elementor-6211">
				<div class="elementor-element elementor-element-1dbff715 e-con-full e-flex e-con e-parent" data-id="1dbff715" data-element_type="container" data-e-type="container">
		<div class="elementor-element elementor-element-6a9688ca e-con-full e-flex e-con e-child" data-id="6a9688ca" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
				<div class="elementor-element elementor-element-566fdb94 elementor-widget elementor-widget-heading" data-id="566fdb94" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h1 class="elementor-heading-title elementor-size-default">Utilisation de la distribution Kali dans le cadre du bloc 3 sur la cybersécurité avec les laboratoires sur Docker (v3)</h1>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-194278ff e-con-full e-flex e-con e-child" data-id="194278ff" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
		<div class="elementor-element elementor-element-5c97a0cc e-con-full e-flex e-con e-child" data-id="5c97a0cc" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-1f8167cf elementor-widget elementor-widget-heading" data-id="1f8167cf" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Public concerné <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f393.png" alt="🎓" class="wp-smiley" style="height: 1em; max-height: 1em;" /></h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-58c14bd6 e-con-full e-flex e-con e-child" data-id="58c14bd6" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-5228b330 elementor-widget elementor-widget-text-editor" data-id="5228b330" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									BTS Services Informatiques aux Organisations								</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-256bdd03 e-con-full e-flex e-con e-child" data-id="256bdd03" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-fa536cc elementor-widget elementor-widget-heading" data-id="fa536cc" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Matière <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4da.png" alt="📚" class="wp-smiley" style="height: 1em; max-height: 1em;" /></h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-ba30799 e-con-full e-flex e-con e-child" data-id="ba30799" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-119f6587 elementor-widget elementor-widget-text-editor" data-id="119f6587" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									Bloc 3 &#8211; Cybersécurité des services informatiques								</div>
				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-3a4160ca e-con-full e-flex e-con e-child" data-id="3a4160ca" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
		<div class="elementor-element elementor-element-65ae97da e-con-full e-flex e-con e-child" data-id="65ae97da" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-53de58f0 elementor-widget elementor-widget-heading" data-id="53de58f0" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Présentation <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4cb.png" alt="📋" class="wp-smiley" style="height: 1em; max-height: 1em;" /></h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-62f424b9 e-con-full e-flex e-con e-child" data-id="62f424b9" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-4e06afea elementor-widget elementor-widget-text-editor" data-id="4e06afea" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p><strong>Activit&eacute;s en laboratoire </strong>permettant d&rsquo;exploiter la distribution Kali Linux dans le cadre du bloc 3 sur la cybers&eacute;curit&eacute;.<br />
Deux laboratoires compos&eacute;s de conteneurs Docker sont fournis.</p>

<p><strong>Les activit&eacute;s suivantes</strong> utilisant ces laboratoires sont propos&eacute;es :</p>

<ul>
	<li>Activit&eacute; 1&nbsp;: attaque MITM d&rsquo;un service SSH et mise en place de contre-mesures</li>
	<li>Activit&eacute; 2&nbsp;: attaque MITM d&rsquo;un service HTTP et mise en place de contre-mesures</li>
	<li>Activit&eacute; 3&nbsp;: attaque de type injection SQL et mise en place de contre-mesures</li>
	<li>Activit&eacute; 4&nbsp;: attaque par ing&eacute;nierie sociale (hame&ccedil;onnage associ&eacute; &agrave; du typosquattage)</li>
	<li>Activit&eacute; 5&nbsp;: exploitation d&rsquo;une faille applicative du service FTP via l&rsquo;outil &laquo;&nbsp;Metasploit&nbsp;&raquo;</li>
	<li>Activit&eacute; 6&nbsp;: analyse des failles de s&eacute;curit&eacute; avec Nessus</li>
	<li>Activit&eacute; 7&nbsp;: attaque de type DNS SPOOFING et propositions de contre-mesures</li>
</ul>

<p>Les activit&eacute;s peuvent se traiter de mani&egrave;re ind&eacute;pendante. La progression propos&eacute;e peut donc &ecirc;tre modifi&eacute;e et adapt&eacute;e en fonction des outils disponibles et des sp&eacute;cificit&eacute;s de chaque &eacute;tablissement.<br />
Les professeurs peuvent reprendre en l&rsquo;&eacute;tat ces activit&eacute;s ou les modifier pour les int&eacute;grer dans leurs travaux en laboratoire.</p>

<p>D&rsquo;autres activit&eacute;s ont vocation &agrave; &ecirc;tre ajout&eacute;es.</p>
								</div>
				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-6a2bf15b e-con-full e-flex e-con e-child" data-id="6a2bf15b" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
		<div class="elementor-element elementor-element-3b21d465 e-con-full e-flex e-con e-child" data-id="3b21d465" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-35909b0a elementor-widget elementor-widget-heading" data-id="35909b0a" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Prérequis <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/26a1.png" alt="⚡" class="wp-smiley" style="height: 1em; max-height: 1em;" /></h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-21c893af e-con-full e-flex e-con e-child" data-id="21c893af" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-357a666e elementor-widget elementor-widget-text-editor" data-id="357a666e" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									Connaissances de base concernant l’administration d’un système GNU/Linux, fondamentaux en matière de cryptographie, de certificat, fondamentaux réseaux (Ethernet, IP, TCP).								</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-2468b14c e-con-full e-flex e-con e-child" data-id="2468b14c" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-50002e0b elementor-widget elementor-widget-heading" data-id="50002e0b" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Savoirs <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f393.png" alt="🎓" class="wp-smiley" style="height: 1em; max-height: 1em;" /></h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-24511f59 e-con-full e-flex e-con e-child" data-id="24511f59" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-709d0cf2 elementor-widget elementor-widget-text-editor" data-id="709d0cf2" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Typologie des risques et leurs impacts.<br />
Principe de la s&eacute;curit&eacute; : disponibilit&eacute;, int&eacute;grit&eacute; et confidentialit&eacute;.<br />
Chiffrement, authentification et preuve : principes et techniques.<br />
S&eacute;curit&eacute; des applications Web : risques, menaces et protocoles.<br />
Cybers&eacute;curit&eacute; : bonnes pratiques, normes et standards.<br />
S&eacute;curit&eacute; du d&eacute;veloppement d&rsquo;application.<br />
Vuln&eacute;rabilit&eacute;s et contre-mesures sur les probl&egrave;mes courants de d&eacute;veloppement.</p>								</div>
				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-1684513d e-con-full e-flex e-con e-child" data-id="1684513d" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
		<div class="elementor-element elementor-element-2a81585b e-con-full e-flex e-con e-child" data-id="2a81585b" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-57dfdb65 elementor-widget elementor-widget-heading" data-id="57dfdb65" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Compétences <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4aa.png" alt="💪" class="wp-smiley" style="height: 1em; max-height: 1em;" /></h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-27636038 e-con-full e-flex e-con e-child" data-id="27636038" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-7582c6ed elementor-widget elementor-widget-text-editor" data-id="7582c6ed" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Prot&eacute;ger les donn&eacute;es &agrave; caract&egrave;re personnel.<br />
Garantir la disponibilit&eacute;, l&rsquo;int&eacute;grit&eacute; et la confidentialit&eacute; des services informatiques et des donn&eacute;es de l&rsquo;organisation face &agrave; des cyberattaques.<br />
Assurer la cybers&eacute;curit&eacute; d&rsquo;une infrastructure r&eacute;seau, d&rsquo;un syst&egrave;me, d&rsquo;un service.<br />
Assurer la cybers&eacute;curit&eacute; d&rsquo;une solution applicative.</p>
								</div>
				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-476f5b46 e-con-full e-flex e-con e-child" data-id="476f5b46" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
		<div class="elementor-element elementor-element-57f68725 e-con-full e-flex e-con e-child" data-id="57f68725" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-7f9fd83f elementor-widget elementor-widget-heading" data-id="7f9fd83f" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Outils <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f6e0.png" alt="🛠" class="wp-smiley" style="height: 1em; max-height: 1em;" /></h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-8afa5d4 e-con-full e-flex e-con e-child" data-id="8afa5d4" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-13fc501f elementor-widget elementor-widget-text-editor" data-id="13fc501f" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Kali avec le framework metasploit, metasploitable, mutillidae, conteneurs sur Docker.<br />
Laboratoires 1 et 2 fournis</p>

<ul>
	<li>Laboratoire 1 : https://forge.apps.education.fr/reseau-certa/bts-sio/labos-kali-docker/lab1/</li>
	<li>Laboratoire 2 : https://forge.apps.education.fr/reseau-certa/bts-sio/labos-kali-docker/lab2/</li>
</ul>

<p><strong>Le temps d&#39;installation de chaque laboratoire peut prendre un peu de temps, notamment lors du t&eacute;l&eacute;chargement de l&#39;image Kali.</strong></p>
								</div>
				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-5f9a8b1c e-con-full e-flex e-con e-child" data-id="5f9a8b1c" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
		<div class="elementor-element elementor-element-6e2c4d8a e-con-full e-flex e-con e-child" data-id="6e2c4d8a" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-7b5e9f2d elementor-widget elementor-widget-heading" data-id="7b5e9f2d" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Téléchargements <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4e5.png" alt="📥" class="wp-smiley" style="height: 1em; max-height: 1em;" /></h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-8c1f3e6b e-con-full e-flex e-con e-child" data-id="8c1f3e6b" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-9d4a7c5e elementor-widget elementor-widget-text-editor" data-id="9d4a7c5e" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p><strong><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4ce.png" alt="📎" class="wp-smiley" style="height: 1em; max-height: 1em;" /> labo-kali.pdf</strong><br>Fichier libre &#8211; <a href="/wp-content/uploads/laboratoires/labo-kali.pdf" target="_blank">Télécharger</a> (77.16 KB)</p><p><strong><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4ce.png" alt="📎" class="wp-smiley" style="height: 1em; max-height: 1em;" /> labo-kali-docker-situations_et_laboratoires_v3.zip</strong><br>Fichier libre &#8211; <a href="/wp-content/uploads/laboratoires/labo-kali-docker-situations_et_laboratoires_v3.zip" target="_blank">Télécharger</a> (20.49 MB)</p><p><strong><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> labo-kali-docker-corriges_des_situations_v3.zip</strong><br>Corrigé disponible &#8211; <a href="/wp-content/uploads/laboratoires/private/labo-kali-docker-corriges_des_situations_v3.zip" target="_blank">Télécharger</a></p>								</div>
				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-7012ba46 e-con-full e-flex e-con e-child" data-id="7012ba46" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
		<div class="elementor-element elementor-element-574718d6 e-con-full e-flex e-con e-child" data-id="574718d6" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-73863dd9 elementor-widget elementor-widget-heading" data-id="73863dd9" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Mots-clés ﹟</h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-3683f1b4 e-con-full e-flex e-con e-child" data-id="3683f1b4" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-6115401d elementor-widget elementor-widget-text-editor" data-id="6115401d" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									Kali, cryptographie, chiffrement, certificat, analyse trames, empoisonnement arp, scanner de vulnérabilités, exploitation de vulnérabilités, exploit, metasploit, metasploitable, mutillidae, payloads, hameçonnage, typosquattage, typosquating, ingénierie sociale, dns spoofing, remédiations, hygiène numérique, respect des bonnes pratiques.								</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-56867941 e-con-full e-flex e-con e-child" data-id="56867941" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-562116c1 elementor-widget elementor-widget-heading" data-id="562116c1" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Version <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4dd.png" alt="📝" class="wp-smiley" style="height: 1em; max-height: 1em;" /></h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-1cbb70b2 e-con-full e-flex e-con e-child" data-id="1cbb70b2" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-2fb0a8a4 elementor-widget elementor-widget-text-editor" data-id="2fb0a8a4" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									V3.0								</div>
				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-733aa9fd e-con-full e-flex e-con e-child" data-id="733aa9fd" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
		<div class="elementor-element elementor-element-480ddade e-con-full e-flex e-con e-child" data-id="480ddade" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-6463db97 elementor-widget elementor-widget-heading" data-id="6463db97" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Date de publication <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4c5.png" alt="📅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-4e6d85c5 e-con-full e-flex e-con e-child" data-id="4e6d85c5" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-6bf9fe6d elementor-widget elementor-widget-text-editor" data-id="6bf9fe6d" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									18/09/2023								</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-4a1a1e4c e-con-full e-flex e-con e-child" data-id="4a1a1e4c" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-3485285a elementor-widget elementor-widget-heading" data-id="3485285a" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Auteur.e(s) <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/270d.png" alt="✍" class="wp-smiley" style="height: 1em; max-height: 1em;" /></h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-4f21a5e7 e-con-full e-flex e-con e-child" data-id="4f21a5e7" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-36af1b3c elementor-widget elementor-widget-text-editor" data-id="36af1b3c" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									Quentin Demoulières, Patrice Dignan, Apollonie Raffalli, Patrizio Valente, Cécile Nivaggioni avec la relecture de Valérie Martinez et les tests de Christelle Thiry.								</div>
				</div>
				</div>
				</div>
				</div>
				</div>
		]]></content:encoded>
					
					<wfw:commentRss>https://www.reseaucerta.org/utilisation-de-la-distribution-kali-dans-le-cadre-du-bloc-3-sur-la-cyberscurit-avec-les-laboratoires-sur-docker-v3/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Utilisation de la distribution Kali dans le cadre du bloc 3 sur la cybersécurité v2 + MITM</title>
		<link>https://www.reseaucerta.org/utilisation-de-la-distribution-kali-dans-le-cadre-du-bloc-3-sur-la-cyberscurit-v2-mitm/</link>
					<comments>https://www.reseaucerta.org/utilisation-de-la-distribution-kali-dans-le-cadre-du-bloc-3-sur-la-cyberscurit-v2-mitm/#respond</comments>
		
		<dc:creator><![CDATA[Administrateur Certa]]></dc:creator>
		<pubDate>Mon, 07 Nov 2022 19:42:00 +0000</pubDate>
				<category><![CDATA[_BTS SIO]]></category>
		<category><![CDATA[Bloc 3 - Cybersécurité des services informatiques]]></category>
		<category><![CDATA[Bloc 3 - Cybersécurité des services informatiques - SISR]]></category>
		<category><![CDATA[Côté labo 🧪]]></category>
		<category><![CDATA[analyse trames]]></category>
		<category><![CDATA[certificat]]></category>
		<category><![CDATA[chiffrement]]></category>
		<category><![CDATA[cryptographie]]></category>
		<category><![CDATA[dns spoofing]]></category>
		<category><![CDATA[empoisonnement arp]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[exploitation de vulnérabilités]]></category>
		<category><![CDATA[hameçonnage]]></category>
		<category><![CDATA[hygiène numérique]]></category>
		<category><![CDATA[ingénierie sociale]]></category>
		<category><![CDATA[Kali]]></category>
		<category><![CDATA[metasploit]]></category>
		<category><![CDATA[payloads]]></category>
		<category><![CDATA[remédiations]]></category>
		<category><![CDATA[respect des bonnes pratiques.]]></category>
		<category><![CDATA[scanner de vulnérabilités]]></category>
		<category><![CDATA[typosquating]]></category>
		<category><![CDATA[typosquattage]]></category>
		<guid isPermaLink="false">https://www.reseaucerta.org/?p=2009</guid>

					<description><![CDATA[Activités en laboratoire permettant d'exploiter la distribution Kali Linux dans le cadre du bloc 3 sur la cybersécurité. Deux laboratoires composés de machines virtuelles sur VirtualBox sont fournis (connexion requise) &#8595;&#8595; . Les activités suivantes utilisant ces laboratoires sont p...]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="6212" class="elementor elementor-6212">
				<div class="elementor-element elementor-element-1dbff715 e-con-full e-flex e-con e-parent" data-id="1dbff715" data-element_type="container" data-e-type="container">
		<div class="elementor-element elementor-element-6a9688ca e-con-full e-flex e-con e-child" data-id="6a9688ca" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
				<div class="elementor-element elementor-element-566fdb94 elementor-widget elementor-widget-heading" data-id="566fdb94" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h1 class="elementor-heading-title elementor-size-default">Utilisation de la distribution Kali dans le cadre du bloc 3 sur la cybersécurité - Activités MITM</h1>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-194278ff e-con-full e-flex e-con e-child" data-id="194278ff" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
		<div class="elementor-element elementor-element-5c97a0cc e-con-full e-flex e-con e-child" data-id="5c97a0cc" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-1f8167cf elementor-widget elementor-widget-heading" data-id="1f8167cf" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Public concerné <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f393.png" alt="🎓" class="wp-smiley" style="height: 1em; max-height: 1em;" /></h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-58c14bd6 e-con-full e-flex e-con e-child" data-id="58c14bd6" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-5228b330 elementor-widget elementor-widget-text-editor" data-id="5228b330" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									BTS Services Informatiques aux Organisations								</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-256bdd03 e-con-full e-flex e-con e-child" data-id="256bdd03" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-fa536cc elementor-widget elementor-widget-heading" data-id="fa536cc" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Matière <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4da.png" alt="📚" class="wp-smiley" style="height: 1em; max-height: 1em;" /></h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-ba30799 e-con-full e-flex e-con e-child" data-id="ba30799" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-119f6587 elementor-widget elementor-widget-text-editor" data-id="119f6587" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									Bloc 3 &#8211; Cybersécurité des services informatiques								</div>
				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-3a4160ca e-con-full e-flex e-con e-child" data-id="3a4160ca" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
		<div class="elementor-element elementor-element-65ae97da e-con-full e-flex e-con e-child" data-id="65ae97da" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-53de58f0 elementor-widget elementor-widget-heading" data-id="53de58f0" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Présentation <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4cb.png" alt="📋" class="wp-smiley" style="height: 1em; max-height: 1em;" /></h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-62f424b9 e-con-full e-flex e-con e-child" data-id="62f424b9" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-4e06afea elementor-widget elementor-widget-text-editor" data-id="4e06afea" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p><strong>Activit&eacute;s en laboratoire </strong>permettant d&rsquo;exploiter la distribution Kali Linux dans le cadre du bloc 3 sur la cybers&eacute;curit&eacute;.<br />
Deux laboratoires compos&eacute;s de machines virtuelles sur VirtualBox sont fournis (connexion requise) &darr;&darr; .</p>

<p><strong>Les activit&eacute;s suivantes</strong> utilisant ces laboratoires sont propos&eacute;es :</p>

<ul>
	<li>Activit&eacute; 1&nbsp;: attaque MITM d&rsquo;un service SSH et mise en place de contre-mesures</li>
	<li>Activit&eacute; 2&nbsp;: attaque MITM d&rsquo;un service HTTP et mise en place de contre-mesures</li>
	<li>Activit&eacute; 3&nbsp;: attaque de type injection SQL et mise en place de contre-mesures</li>
	<li>Activit&eacute; 4&nbsp;: attaque par ing&eacute;nierie sociale (hame&ccedil;onnage associ&eacute; &agrave; du typosquattage)</li>
	<li>Activit&eacute; 5&nbsp;: exploitation d&rsquo;une faille applicative du service FTP via l&rsquo;outil &laquo;&nbsp;Metasploit&nbsp;&raquo;</li>
	<li>Activit&eacute; 6&nbsp;: analyse des failles de s&eacute;curit&eacute; avec Nessus</li>
	<li>Activit&eacute; 7&nbsp;: attaque de type DNS SPOOFING et propositions de contre-mesures</li>
</ul>

<p>Les activit&eacute;s peuvent se traiter de mani&egrave;re ind&eacute;pendante. La progression propos&eacute;e peut donc &ecirc;tre modifi&eacute;e et adapt&eacute;e en fonction des outils disponibles et des sp&eacute;cificit&eacute;s de chaque &eacute;tablissement.<br />
Les professeurs peuvent reprendre en l&rsquo;&eacute;tat ces activit&eacute;s ou les modifier pour les int&eacute;grer dans leurs travaux en laboratoire.</p>

<p>D&rsquo;autres activit&eacute;s ont vocation &agrave; &ecirc;tre ajout&eacute;es.</p>
								</div>
				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-6a2bf15b e-con-full e-flex e-con e-child" data-id="6a2bf15b" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
		<div class="elementor-element elementor-element-3b21d465 e-con-full e-flex e-con e-child" data-id="3b21d465" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-35909b0a elementor-widget elementor-widget-heading" data-id="35909b0a" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Prérequis <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/26a1.png" alt="⚡" class="wp-smiley" style="height: 1em; max-height: 1em;" /></h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-21c893af e-con-full e-flex e-con e-child" data-id="21c893af" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-357a666e elementor-widget elementor-widget-text-editor" data-id="357a666e" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									Connaissances de base concernant l’administration d’un système GNU/Linux, fondamentaux en matière de cryptographie, de certificat, fondamentaux réseaux (Ethernet, IP, TCP).								</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-2468b14c e-con-full e-flex e-con e-child" data-id="2468b14c" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-50002e0b elementor-widget elementor-widget-heading" data-id="50002e0b" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Savoirs <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f393.png" alt="🎓" class="wp-smiley" style="height: 1em; max-height: 1em;" /></h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-24511f59 e-con-full e-flex e-con e-child" data-id="24511f59" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-709d0cf2 elementor-widget elementor-widget-text-editor" data-id="709d0cf2" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Typologie des risques et leurs impacts.<br />
Principe de la s&eacute;curit&eacute; : disponibilit&eacute;, int&eacute;grit&eacute; et confidentialit&eacute;.<br />
Chiffrement, authentification et preuve : principes et techniques.<br />
S&eacute;curit&eacute; des applications Web : risques, menaces et protocoles.<br />
Cybers&eacute;curit&eacute; : bonnes pratiques, normes et standards.<br />
S&eacute;curit&eacute; du d&eacute;veloppement d&rsquo;application.<br />
Vuln&eacute;rabilit&eacute;s et contre-mesures sur les probl&egrave;mes courants de d&eacute;veloppement</p>								</div>
				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-1684513d e-con-full e-flex e-con e-child" data-id="1684513d" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
		<div class="elementor-element elementor-element-2a81585b e-con-full e-flex e-con e-child" data-id="2a81585b" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-57dfdb65 elementor-widget elementor-widget-heading" data-id="57dfdb65" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Compétences <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4aa.png" alt="💪" class="wp-smiley" style="height: 1em; max-height: 1em;" /></h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-27636038 e-con-full e-flex e-con e-child" data-id="27636038" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-7582c6ed elementor-widget elementor-widget-text-editor" data-id="7582c6ed" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Prot&eacute;ger les donn&eacute;es &agrave; caract&egrave;re personnel.<br />
Garantir la disponibilit&eacute;, l&rsquo;int&eacute;grit&eacute; et la confidentialit&eacute; des services informatiques et des donn&eacute;es de l&rsquo;organisation face &agrave; des cyberattaques.<br />
Assurer la cybers&eacute;curit&eacute; d&rsquo;une infrastructure r&eacute;seau, d&rsquo;un syst&egrave;me, d&rsquo;un service.<br />
Assurer la cybers&eacute;curit&eacute; d&rsquo;une solution applicative.</p>
								</div>
				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-476f5b46 e-con-full e-flex e-con e-child" data-id="476f5b46" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
		<div class="elementor-element elementor-element-57f68725 e-con-full e-flex e-con e-child" data-id="57f68725" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-7f9fd83f elementor-widget elementor-widget-heading" data-id="7f9fd83f" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Outils <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f6e0.png" alt="🛠" class="wp-smiley" style="height: 1em; max-height: 1em;" /></h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-8afa5d4 e-con-full e-flex e-con e-child" data-id="8afa5d4" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-13fc501f elementor-widget elementor-widget-text-editor" data-id="13fc501f" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Kali avec le framework metasploit, metasploitable, mutillidae, VM sur VirtualBox.<br />
Laboratoires 1 et 2 fournis (connexion requise) :</p>

<ul>
	<li>Laboratoire 1</li>
	<li>Laboratoire 2&nbsp;&darr;&darr;</li>
</ul>

<p><strong>Le temps de t&eacute;l&eacute;chargement peut &ecirc;tre long (notamment pour le deuxi&egrave;me laboratoire). Il est conseill&eacute; de les t&eacute;l&eacute;charger et de les mettre &agrave; disposition des &eacute;tudiants dans l&rsquo;environnement num&eacute;rique de travail du lyc&eacute;e.</strong></p>
								</div>
				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-5f9a8b1c e-con-full e-flex e-con e-child" data-id="5f9a8b1c" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
		<div class="elementor-element elementor-element-6e2c4d8a e-con-full e-flex e-con e-child" data-id="6e2c4d8a" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-7b5e9f2d elementor-widget elementor-widget-heading" data-id="7b5e9f2d" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Téléchargements <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4e5.png" alt="📥" class="wp-smiley" style="height: 1em; max-height: 1em;" /></h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-8c1f3e6b e-con-full e-flex e-con e-child" data-id="8c1f3e6b" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-9d4a7c5e elementor-widget elementor-widget-text-editor" data-id="9d4a7c5e" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p><strong><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4ce.png" alt="📎" class="wp-smiley" style="height: 1em; max-height: 1em;" /> labo-kali.pdf</strong><br>Fichier libre &#8211; <a href="/wp-content/uploads/laboratoires/labo-kali.pdf" target="_blank">Télécharger</a> (79.85 KB)</p><p><strong><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4ce.png" alt="📎" class="wp-smiley" style="height: 1em; max-height: 1em;" /> labo-kali-v2.0-situations_et_laboratoires.zip</strong><br>Fichier libre &#8211; <a href="/wp-content/uploads/laboratoires/labo-kali-v2.0-situations_et_laboratoires.zip" target="_blank">Télécharger</a> (13.38 MB)</p><p><strong><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> labo-kali-v2.0-corriges_des_situations.zip</strong><br>Corrigé disponible &#8211; <a href="/wp-content/uploads/laboratoires/private/labo-kali-v2.0-corriges_des_situations.zip" target="_blank">Télécharger</a></p>								</div>
				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-7012ba46 e-con-full e-flex e-con e-child" data-id="7012ba46" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
		<div class="elementor-element elementor-element-574718d6 e-con-full e-flex e-con e-child" data-id="574718d6" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-73863dd9 elementor-widget elementor-widget-heading" data-id="73863dd9" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Mots-clés ﹟</h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-3683f1b4 e-con-full e-flex e-con e-child" data-id="3683f1b4" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-6115401d elementor-widget elementor-widget-text-editor" data-id="6115401d" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									Kali, cryptographie, chiffrement, certificat, analyse trames, empoisonnement arp, scanner de vulnérabilités, exploitation de vulnérabilités, exploit, metasploit, payloads, hameçonnage, typosquattage, typosquating, ingénierie sociale, dns spoofing, remédiations, hygiène numérique, respect des bonnes pratiques.								</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-56867941 e-con-full e-flex e-con e-child" data-id="56867941" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-562116c1 elementor-widget elementor-widget-heading" data-id="562116c1" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Version <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4dd.png" alt="📝" class="wp-smiley" style="height: 1em; max-height: 1em;" /></h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-1cbb70b2 e-con-full e-flex e-con e-child" data-id="1cbb70b2" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-2fb0a8a4 elementor-widget elementor-widget-text-editor" data-id="2fb0a8a4" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									V2.0								</div>
				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-733aa9fd e-con-full e-flex e-con e-child" data-id="733aa9fd" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
		<div class="elementor-element elementor-element-480ddade e-con-full e-flex e-con e-child" data-id="480ddade" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-6463db97 elementor-widget elementor-widget-heading" data-id="6463db97" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Date de publication <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4c5.png" alt="📅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-4e6d85c5 e-con-full e-flex e-con e-child" data-id="4e6d85c5" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-6bf9fe6d elementor-widget elementor-widget-text-editor" data-id="6bf9fe6d" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									07/11/2022								</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-4a1a1e4c e-con-full e-flex e-con e-child" data-id="4a1a1e4c" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-3485285a elementor-widget elementor-widget-heading" data-id="3485285a" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Auteur.e(s) <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/270d.png" alt="✍" class="wp-smiley" style="height: 1em; max-height: 1em;" /></h4>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-4f21a5e7 e-con-full e-flex e-con e-child" data-id="4f21a5e7" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-36af1b3c elementor-widget elementor-widget-text-editor" data-id="36af1b3c" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									Quentin Demoulières, Patrice Dignan, Apollonie Raffalli, Patrizio Valente, Cécile Nivaggioni avec la relecture de Valérie Martinez.								</div>
				</div>
				</div>
				</div>
				</div>
				</div>
		]]></content:encoded>
					
					<wfw:commentRss>https://www.reseaucerta.org/utilisation-de-la-distribution-kali-dans-le-cadre-du-bloc-3-sur-la-cyberscurit-v2-mitm/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
