{"id":935,"date":"2023-01-19T16:04:53","date_gmt":"2023-01-19T16:04:53","guid":{"rendered":"https:\/\/guide.trustvalley.swiss\/?post_type=chapter&#038;p=935"},"modified":"2023-07-25T07:50:41","modified_gmt":"2023-07-25T07:50:41","slug":"le-mode-operatoire-classique-des-cyberattaques","status":"publish","type":"chapter","link":"https:\/\/guide.trustvalley.swiss\/fr\/chapitre\/le-mode-operatoire-classique-des-cyberattaques\/","title":{"rendered":"Le mode op\u00e9ratoire classique des cyberattaques"},"content":{"rendered":"\n<figure class=\"wp-block-kadence-image kb-image_a248fe-8f size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"722\" src=\"https:\/\/guide.trustvalley.swiss\/wp-content\/uploads\/2023\/07\/trust4smes-cybersecurity-attack-lifecycle-1024x722.jpg\" alt=\"\" class=\"kb-img wp-image-2019\" srcset=\"https:\/\/guide.trustvalley.swiss\/wp-content\/uploads\/2023\/07\/trust4smes-cybersecurity-attack-lifecycle-1024x722.jpg 1024w, https:\/\/guide.trustvalley.swiss\/wp-content\/uploads\/2023\/07\/trust4smes-cybersecurity-attack-lifecycle-300x211.jpg 300w, https:\/\/guide.trustvalley.swiss\/wp-content\/uploads\/2023\/07\/trust4smes-cybersecurity-attack-lifecycle-768x541.jpg 768w, https:\/\/guide.trustvalley.swiss\/wp-content\/uploads\/2023\/07\/trust4smes-cybersecurity-attack-lifecycle.jpg 1500w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption>Le mode op\u00e9ratoire classique des cyberattaques<\/figcaption><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Il y a 2 phases qui sont g\u00e9n\u00e9ralement communes \u00e0 toutes les cyberattaques :<br><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>1.  <span style=\"text-decoration: underline;\"><strong>L\u2019acc\u00e8s initial<\/strong><\/span> : dans cette phase, les attaquants cherchent \u00e0 s\u2019introduire dans le syst\u00e8me ou le p\u00e9rim\u00e8tre. Il existe 4 mani\u00e8res courantes :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Phishing<\/li>\n\n\n\n<li>Craquage de mot de passe<\/li>\n\n\n\n<li>Exploitation d\u2019une vuln\u00e9rabilit\u00e9 logicielle<\/li>\n\n\n\n<li>Diffusion de logiciels malveillants par courrier \u00e9lectronique<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>2. <strong><span style=\"text-decoration: underline;\">La post-exploitation<\/span><\/strong> : dans cette deuxi\u00e8me phase, l\u2019attaquant cherche \u00e0 acc\u00e9der \u00e0 tous les appareils pertinents de l&rsquo;environnement, y compris les serveurs et les postes de travail, pour prendre le contr\u00f4le et d\u00e9ployer des outils et scripts suppl\u00e9mentaires, notamment afin d&rsquo;escalader les privil\u00e8ges et se d\u00e9placer lat\u00e9ralement dans le r\u00e9seau. Ceci est entreprit dans le but d&rsquo;acc\u00e9der au plus de ressources possibles (donn\u00e9e, informations, etc.) de l&rsquo;entreprise.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"featured_media":0,"template":"","categories":[],"searchablecategory":[],"class_list":["post-935","chapter","type-chapter","status-publish","hentry"],"taxonomy_info":[],"featured_image_src_large":false,"author_info":[],"comment_info":"","_links":{"self":[{"href":"https:\/\/guide.trustvalley.swiss\/fr\/wp-json\/wp\/v2\/chapter\/935","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/guide.trustvalley.swiss\/fr\/wp-json\/wp\/v2\/chapter"}],"about":[{"href":"https:\/\/guide.trustvalley.swiss\/fr\/wp-json\/wp\/v2\/types\/chapter"}],"wp:attachment":[{"href":"https:\/\/guide.trustvalley.swiss\/fr\/wp-json\/wp\/v2\/media?parent=935"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/guide.trustvalley.swiss\/fr\/wp-json\/wp\/v2\/categories?post=935"},{"taxonomy":"searchablecategory","embeddable":true,"href":"https:\/\/guide.trustvalley.swiss\/fr\/wp-json\/wp\/v2\/searchablecategory?post=935"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}