
{"id":2417,"date":"2021-10-12T16:54:22","date_gmt":"2021-10-12T14:54:22","guid":{"rendered":"https:\/\/parlonstechs.com\/all\/?p=2417"},"modified":"2021-10-12T17:13:51","modified_gmt":"2021-10-12T15:13:51","slug":"le-piratage-sans-fil-et-sans-internet-cest-possible","status":"publish","type":"post","link":"https:\/\/parlonstechs.com\/all\/2021\/10\/12\/le-piratage-sans-fil-et-sans-internet-cest-possible\/","title":{"rendered":"Le piratage sans fil et sans Internet, c&rsquo;est possible !"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"682\" src=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/10\/image-11-1024x682.png\" alt=\"\" class=\"wp-image-2419\" srcset=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/10\/image-11-1024x682.png 1024w, https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/10\/image-11-300x200.png 300w, https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/10\/image-11-768x511.png 768w, https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/10\/image-11-180x120.png 180w, https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/10\/image-11.png 1400w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p style=\"font-size:24px\"><strong>En Isra\u00ebl, des chercheurs de l&rsquo;Universit\u00e9 Ben Gurion sont parvenus \u00e0 collecter des donn\u00e9es par la voie des ondes \u00e0 partir du champ \u00e9lectromagn\u00e9tique \u00e9mis par les c\u00e2bles Ethernet d&rsquo;un r\u00e9seau.<\/strong><\/p>\n\n\n\n<p>Dans les secteurs sensibles, pas question d&rsquo;utiliser des r\u00e9seaux sans-fil, ni m\u00eame de se connecter \u00e0 Internet directement. Les syst\u00e8mes doivent \u00eatre totalement \u00e9tanches au monde ext\u00e9rieur afin de garantir leur s\u00e9curit\u00e9 et leur fiabilit\u00e9. Les c\u00e2bles Ethernet et leurs prises RJ45 sont donc de mise\u00a0pour assurer la communication entre les machines. Un syst\u00e8me imparable pour lutter contre les pirates\u00a0? H\u00e9 bien, non !\u00a0Selon les chercheurs du Centre de recherche sur la cybers\u00e9curit\u00e9 de l&rsquo;Universit\u00e9 Ben Gourion en Isra\u00ebl, il reste possible de collecter des donn\u00e9es sensibles par la voie des ondes alors que les ordinateurs ne sont raccord\u00e9s que par des c\u00e2bles Ethernet.<\/p>\n\n\n\n<p>Comment\u00a0? En r\u00e9ceptionnant les ondes \u00e9lectromagn\u00e9tiques qu&rsquo;\u00e9mettent les c\u00e2bles. Les scientifiques ont baptis\u00e9 la man\u0153uvre <a href=\"https:\/\/arxiv.org\/pdf\/2110.00104.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">LANtenna Attack<\/a>. Avec cette attaques, les donn\u00e9es sont collect\u00e9es par un ordinateur sur lequel une simple antenne \u00e0 1 dollar est branch\u00e9e. Mais, pour parvenir \u00e0 r\u00e9aliser cette captation, il reste n\u00e9cessaire d&rsquo;acc\u00e9der physiquement \u00e0 l&rsquo;un des ordinateurs du r\u00e9seau pour lui injecter un logiciel malveillant. Le coup classique de l&rsquo;infection\u00a0<em>via<\/em> une cl\u00e9 USB peut \u00eatre tent\u00e9, mais la principale difficult\u00e9 est l&rsquo;acc\u00e8s \u00e0\u00a0cet ordinateur.<\/p>\n\n\n\n<p>Du c\u00f4t\u00e9 du c\u00e2ble qui devient une sorte d&rsquo;antenne, il faut savoir que ses \u00e9missions d&rsquo;ondes \u00e9lectromagn\u00e9tiques se situent dans bande de fr\u00e9quences de 125 MHz et ses harmoniques (par exemple, 250 MHz et 375 MHz). Ce rayonnement d\u00e9pend aussi du type de c\u00e2ble utilis\u00e9 et de son blindage. C&rsquo;est en collectant les variations de fr\u00e9quence de ces ondes que les chercheurs ont pu les transformer en donn\u00e9es num\u00e9riques. \u00c9videmment, cette transformation est assez lente, car les donn\u00e9es sont r\u00e9cup\u00e9r\u00e9es bit par bit.<\/p>\n\n\n\n<figure class=\"wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"LANTENNA ATTACK: Leaking Data from Air-Gapped Networks via Ethernet Cables\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/-X2Mb5HWE44?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><figcaption>Sur cette vid\u00e9o, les chercheurs montrent qu\u2019ils peuvent r\u00e9cup\u00e9rer un petit message envoy\u00e9 par l\u2019ordinateur infect\u00e9, gr\u00e2ce aux variations des ondes \u00e9lectrom\u00e9triques \u00e9mises par le c\u00e2ble Ethernet du r\u00e9seau. \u00a9 Cyber Security Labs, @ Ben Gurion University<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Comment transformer le c\u00e2ble Ethernet en antenne<\/h2>\n\n\n\n<p>Une autre technique a \u00e9galement \u00e9t\u00e9 test\u00e9e. Les chercheurs ont utilis\u00e9 le\u00a0protocole UDP, un dinosaure d&rsquo;Internet, qui permet de transmettre des donn\u00e9es de fa\u00e7on basique. Ils ont donc fait envoyer un paquet UDP par la machine infect\u00e9e par le\u00a0truchement des \u00e9missions \u00e9lectromagn\u00e9tiques du c\u00e2ble. Dans les deux cas, l&rsquo;op\u00e9ration est longue, pas forc\u00e9ment tr\u00e8s fiable et ne permet certainement pas de collecter de grandes quantit\u00e9s de donn\u00e9es. En revanche, ce proc\u00e9d\u00e9 peut \u00eatre utile si l&rsquo;on cherche \u00e0 r\u00e9cup\u00e9rer une courte instruction ou une cl\u00e9 de s\u00e9curit\u00e9. De m\u00eame, la transmission de donn\u00e9es a \u00e9t\u00e9 r\u00e9alis\u00e9e \u00e0 proximit\u00e9 imm\u00e9diate\u00a0puisque l&rsquo;ordinateur r\u00e9cepteur se trouvait \u00e0 seulement deux m\u00e8tres de distance.<\/p>\n\n\n\n<p>En utilisant des antennes tr\u00e8s haut de gamme, il serait possible de collecter les donn\u00e9es sur des distances de plusieurs dizaines de m\u00e8tres<\/p>\n\n\n\n<p>Selon les chercheurs, en utilisant des antennes tr\u00e8s haut de gamme, il serait possible de collecter les donn\u00e9es sur des distances de plusieurs dizaines de m\u00e8tres. Dans tous les cas, il reste quand&nbsp;m\u00eame n\u00e9cessaire de se trouver tout pr\u00e8s des c\u00e2bles du r\u00e9seau et la pr\u00e9sence de l&rsquo;antenne n&rsquo;est pas des plus discr\u00e8te. Enfin, si le blindage des c\u00e2bles est renforc\u00e9, les \u00e9missions \u00e9lectromagn\u00e9tiques seront trop faibles pour pouvoir \u00eatre capt\u00e9es.<\/p>\n\n\n\n<p>Ce n&rsquo;est pas la premi\u00e8re fois que l&rsquo;\u00e9quipe de ce laboratoire dirig\u00e9 par le Dr Guri a d\u00e9montr\u00e9 des travaux de hacking improbables. Comme Futura l&rsquo;avait expliqu\u00e9 d\u00e9but 2020, le labo avait d\u00e9j\u00e0 pr\u00e9sent\u00e9 une technique qui permettait de transformer les petites variations de luminosit\u00e9 des LED d&rsquo;un \u00e9cran en informations binaires. Toujours en 2020, les chercheurs ont prouv\u00e9 qu&rsquo;il est possible de d\u00e9tourner le bloc d&rsquo;alimentation d&rsquo;un ordinateur pour l&rsquo;utiliser comme haut-parleur afin de transmettre des donn\u00e9es.<\/p>\n\n\n\n<p>avec Futura<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>En Isra\u00ebl, des chercheurs de l&rsquo;Universit\u00e9 Ben Gurion sont parvenus \u00e0 collecter des donn\u00e9es par la voie des ondes \u00e0 partir du champ \u00e9lectromagn\u00e9tique \u00e9mis par les c\u00e2bles Ethernet d&rsquo;un [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2421,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21,11],"tags":[],"class_list":["post-2417","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite","category-cybersecurite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Le piratage sans fil et sans Internet, c&#039;est possible ! - Parlons Techs - Store<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/parlonstechs.com\/all\/2021\/10\/12\/le-piratage-sans-fil-et-sans-internet-cest-possible\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Le piratage sans fil et sans Internet, c&#039;est possible ! - Parlons Techs - Store\" \/>\n<meta property=\"og:description\" content=\"En Isra\u00ebl, des chercheurs de l&rsquo;Universit\u00e9 Ben Gurion sont parvenus \u00e0 collecter des donn\u00e9es par la voie des ondes \u00e0 partir du champ \u00e9lectromagn\u00e9tique \u00e9mis par les c\u00e2bles Ethernet d&rsquo;un [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/parlonstechs.com\/all\/2021\/10\/12\/le-piratage-sans-fil-et-sans-internet-cest-possible\/\" \/>\n<meta property=\"og:site_name\" content=\"Parlons Techs - Store\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-12T14:54:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-12T15:13:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/10\/at-15.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"265\" \/>\n\t<meta property=\"og:image:height\" content=\"119\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"wisdom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"wisdom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/10\\\/12\\\/le-piratage-sans-fil-et-sans-internet-cest-possible\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/10\\\/12\\\/le-piratage-sans-fil-et-sans-internet-cest-possible\\\/\"},\"author\":{\"name\":\"wisdom\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"headline\":\"Le piratage sans fil et sans Internet, c&rsquo;est possible !\",\"datePublished\":\"2021-10-12T14:54:22+00:00\",\"dateModified\":\"2021-10-12T15:13:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/10\\\/12\\\/le-piratage-sans-fil-et-sans-internet-cest-possible\\\/\"},\"wordCount\":754,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/10\\\/12\\\/le-piratage-sans-fil-et-sans-internet-cest-possible\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/at-15.jpg\",\"articleSection\":[\"Actualit\u00e9\",\"CyberS\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/10\\\/12\\\/le-piratage-sans-fil-et-sans-internet-cest-possible\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/10\\\/12\\\/le-piratage-sans-fil-et-sans-internet-cest-possible\\\/\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/10\\\/12\\\/le-piratage-sans-fil-et-sans-internet-cest-possible\\\/\",\"name\":\"Le piratage sans fil et sans Internet, c'est possible ! - Parlons Techs - Store\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/10\\\/12\\\/le-piratage-sans-fil-et-sans-internet-cest-possible\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/10\\\/12\\\/le-piratage-sans-fil-et-sans-internet-cest-possible\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/at-15.jpg\",\"datePublished\":\"2021-10-12T14:54:22+00:00\",\"dateModified\":\"2021-10-12T15:13:51+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/10\\\/12\\\/le-piratage-sans-fil-et-sans-internet-cest-possible\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/10\\\/12\\\/le-piratage-sans-fil-et-sans-internet-cest-possible\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/10\\\/12\\\/le-piratage-sans-fil-et-sans-internet-cest-possible\\\/#primaryimage\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/at-15.jpg\",\"contentUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/at-15.jpg\",\"width\":265,\"height\":119},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/10\\\/12\\\/le-piratage-sans-fil-et-sans-internet-cest-possible\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Le piratage sans fil et sans Internet, c&rsquo;est possible !\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\",\"name\":\"Parlons Techs - Store\",\"description\":\"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\",\"name\":\"wisdom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"caption\":\"wisdom\"},\"sameAs\":[\"https:\\\/\\\/parlonstechs.com\\\/all\"],\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/author\\\/wisdom\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Le piratage sans fil et sans Internet, c'est possible ! - Parlons Techs - Store","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/parlonstechs.com\/all\/2021\/10\/12\/le-piratage-sans-fil-et-sans-internet-cest-possible\/","og_locale":"fr_FR","og_type":"article","og_title":"Le piratage sans fil et sans Internet, c'est possible ! - Parlons Techs - Store","og_description":"En Isra\u00ebl, des chercheurs de l&rsquo;Universit\u00e9 Ben Gurion sont parvenus \u00e0 collecter des donn\u00e9es par la voie des ondes \u00e0 partir du champ \u00e9lectromagn\u00e9tique \u00e9mis par les c\u00e2bles Ethernet d&rsquo;un [&hellip;]","og_url":"https:\/\/parlonstechs.com\/all\/2021\/10\/12\/le-piratage-sans-fil-et-sans-internet-cest-possible\/","og_site_name":"Parlons Techs - Store","article_published_time":"2021-10-12T14:54:22+00:00","article_modified_time":"2021-10-12T15:13:51+00:00","og_image":[{"width":265,"height":119,"url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/10\/at-15.jpg","type":"image\/jpeg"}],"author":"wisdom","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"wisdom","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/parlonstechs.com\/all\/2021\/10\/12\/le-piratage-sans-fil-et-sans-internet-cest-possible\/#article","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/10\/12\/le-piratage-sans-fil-et-sans-internet-cest-possible\/"},"author":{"name":"wisdom","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"headline":"Le piratage sans fil et sans Internet, c&rsquo;est possible !","datePublished":"2021-10-12T14:54:22+00:00","dateModified":"2021-10-12T15:13:51+00:00","mainEntityOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/10\/12\/le-piratage-sans-fil-et-sans-internet-cest-possible\/"},"wordCount":754,"commentCount":0,"image":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/10\/12\/le-piratage-sans-fil-et-sans-internet-cest-possible\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/10\/at-15.jpg","articleSection":["Actualit\u00e9","CyberS\u00e9curit\u00e9"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/parlonstechs.com\/all\/2021\/10\/12\/le-piratage-sans-fil-et-sans-internet-cest-possible\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/parlonstechs.com\/all\/2021\/10\/12\/le-piratage-sans-fil-et-sans-internet-cest-possible\/","url":"https:\/\/parlonstechs.com\/all\/2021\/10\/12\/le-piratage-sans-fil-et-sans-internet-cest-possible\/","name":"Le piratage sans fil et sans Internet, c'est possible ! - Parlons Techs - Store","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/#website"},"primaryImageOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/10\/12\/le-piratage-sans-fil-et-sans-internet-cest-possible\/#primaryimage"},"image":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/10\/12\/le-piratage-sans-fil-et-sans-internet-cest-possible\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/10\/at-15.jpg","datePublished":"2021-10-12T14:54:22+00:00","dateModified":"2021-10-12T15:13:51+00:00","author":{"@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"breadcrumb":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/10\/12\/le-piratage-sans-fil-et-sans-internet-cest-possible\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/parlonstechs.com\/all\/2021\/10\/12\/le-piratage-sans-fil-et-sans-internet-cest-possible\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/parlonstechs.com\/all\/2021\/10\/12\/le-piratage-sans-fil-et-sans-internet-cest-possible\/#primaryimage","url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/10\/at-15.jpg","contentUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/10\/at-15.jpg","width":265,"height":119},{"@type":"BreadcrumbList","@id":"https:\/\/parlonstechs.com\/all\/2021\/10\/12\/le-piratage-sans-fil-et-sans-internet-cest-possible\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/parlonstechs.com\/all\/"},{"@type":"ListItem","position":2,"name":"Le piratage sans fil et sans Internet, c&rsquo;est possible !"}]},{"@type":"WebSite","@id":"https:\/\/parlonstechs.com\/all\/#website","url":"https:\/\/parlonstechs.com\/all\/","name":"Parlons Techs - Store","description":"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/parlonstechs.com\/all\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823","name":"wisdom","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","caption":"wisdom"},"sameAs":["https:\/\/parlonstechs.com\/all"],"url":"https:\/\/parlonstechs.com\/all\/author\/wisdom\/"}]}},"_links":{"self":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/2417","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/comments?post=2417"}],"version-history":[{"count":2,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/2417\/revisions"}],"predecessor-version":[{"id":2420,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/2417\/revisions\/2420"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media\/2421"}],"wp:attachment":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media?parent=2417"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/categories?post=2417"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/tags?post=2417"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}