Mathart

SOURCES : COMMENT HACKER UN MOT DE PASSE EN 2020 ?

Oct 28th, 2020 (edited)
797
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 7.59 KB | None | 0 0
  1. COMMENT HACKER UN MOT DE PASSE EN 2020 ?
  2.  
  3. Partie 1 : Peut-on encore hacker un mot de passe par force brute ?
  4.  
  5. https://lifars.com/2016/02/brute-force-attacks-affects-millions-of-alibaba-accounts/
  6. https://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/hack-attempt-on-taobao-accessed-20m-accounts
  7. https://www.theguardian.com/business/2016/feb/04/hackers-in-china-attack-20m-accounts-on-alibaba-taobao-shopping-site
  8. https://www.reuters.com/article/us-alibaba-cyber-idUSKCN0VD14X
  9. https://resources.infosecinstitute.com/popular-tools-for-brute-force-attacks/
  10. https://www.vpncrew.com/passwords-facts-and-statistics/
  11. https://www.eset.com/fileadmin/ESET/BLOG/brute_force_attack_protection_pr_1.png
  12. https://www.eset.com/int/about/newsroom/press-releases/products/brute-force-attacks-targeting-remote-access-increased-during-the-covid-19-pandemic-eset-confirms/
  13. https://www.cloudflare.com/fr-fr/learning/bots/brute-force-attack/
  14. https://www.wired.com/story/universal-health-services-ransomware-attack/
  15. https://www.eset.com/int/about/newsroom/press-releases/products/brute-force-attacks-targeting-remote-access-increased-during-the-covid-19-pandemic-eset-confirms/
  16. https://chrome.google.com/webstore/detail/buster-captcha-solver-for/mpbjkejclgfgadiemmefgebjfooflfhl
  17. https://datadome.co/fr/bot-management-protection/comment-detecter-les-fermes-de-captcha-et-bloquer-les-captcha-bots/
  18. https://datadome.co/fr/bot-management-protection/captcha-obsolete/
  19. https://www.cloudflare.com/fr-fr/learning/bots/brute-force-attack/
  20. https://www.ouest-france.fr/leditiondusoir/data/73635/reader/reader.html#!preferred/1/package/73635/pub/104600/page/9
  21. https://www.vpncrew.com/passwords-facts-and-statistics/
  22. https://www.cloudflare.com/img/learning/security/threats/brute-force-attack/brute-force-cracking-time.png
  23. https://www.journaldunet.com/solutions/dsi/1441966-52-secondes-le-temps-necessaire-pour-pirater-le-mot-de-passe-d-un-employe-et-entrer-dans-le-reseau-de-son-entreprise/
  24. https://www.vpncrew.com/passwords-facts-and-statistics/
  25. https://www.phonandroid.com/internet-internautes-possedent-moyenne-150-comptes-seul-mot-passe.html
  26. https://www.20minutes.fr/high-tech/2806571-20200624-google-veut-empecher-ses-utilisateurs-de-reutiliser-les-memes-mots-de-passe
  27. https://www.zdnet.fr/actualites/cybersecurite-les-utilisateurs-changent-rarement-leur-mot-de-passe-a-la-suite-d-un-piratage-39904557.htm
  28.  
  29. Partie 2 : Comment casser un chiffrage moderne de mot de passe ?
  30.  
  31. https://www.venafi.com/fr/blog/comment-fonctionnent-les-chaines-de-certificats-0
  32. https://developer.mozilla.org/fr/docs/Glossaire/D%C3%A9tournement_de_session
  33. https://www.commentcamarche.net/contents/72-vol-de-session-tcp-tcp-session-hijacking
  34. https://i.kinja-img.com/gawker-media/image/upload/pd9ydcfniybawxnecv5e.jpg
  35. https://www.youtube.com/watch?v=5eKbAVhlXko
  36. https://www.youtube.com/watch?v=6H_9l9N3IXU
  37. https://fr.wikipedia.org/wiki/Qubit
  38. https://en.wikipedia.org/wiki/Timeline_of_quantum_computing_and_communication
  39. https://www.youtube.com/watch?v=oVfxrxlIu-4
  40. https://www.iflscience.com/technology/scientists-can-now-do-quantum-hacking/
  41. https://quantum-computing.ibm.com/
  42. https://www.youtube.com/watch?v=6H_9l9N3IXU
  43. https://www.technologyreview.com/2018/12/03/138821/quantum-computers-encryption-threat/
  44. https://www.fidelity.com/security/how-two-factor-authentication-works#:~:text=With%202-factor%20authentication%2C%20an,you%20attempt%20to%20log%20in.
  45. https://www.intego.com/mac-security-blog/two-factor-authentication-how-it-works-and-why-you-should-use-it/
  46. https://en.wikipedia.org/wiki/Multi-factor_authentication
  47. https://techcrunch.com/2018/12/25/cybersecurity-101-guide-two-factor/?guccounter=1&guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&guce_referrer_sig=AQAAAKKiaLGAFVp7f_TKz4igZIJGh36Wp94uoZ59Wc5V7QPrr8ezclUjl-2gPWWSNEKSCC21v5SKp-RJDJtzBa_ryyPl3CewyU_BODuC9dcDQ9l0yLWNdx7YeUotwCedpoIoUeLjsbvS09C_BTkJwrKlf5UAL4iOgKC3uB9aLO-dwult
  48. https://www.secureworldexpo.com/industry-news/12-ways-how-to-hack-multi-factor-authentication-mfa
  49. https://www.mentalfloss.com/article/584235/5-ways-hacking-will-evolve-future
  50. https://www.securitymagazine.com/gdpr-policy?url=https%3A%2F%2Fwww.securitymagazine.com%2Farticles%2F93086-the-future-of-hacking-covid-19-shifting-the-way-hackers-work-and-who-they-target
  51. https://www.drchaos.com/post/the-future-of-hacking-what-hackers-will-be-targeting-next
  52. https://www.zdnet.com/article/icloud-accounts-breach-gets-bigger-here-is-what-we-know/
  53. https://www.cnet.com/news/wikileaks-cia-hacking-tools-phones-apple-samsung-microsoft-google/
  54.  
  55. Partie 3 : Trouver votre mot de passe en utilisant vos vices
  56.  
  57. https://fr.wikipedia.org/wiki/Zeus_(cheval_de_Troie)
  58. https://ukdiss.com/examples/phishing-prevention-methods-evaluation.php
  59. https://www.researchgate.net/publication/269949159_A_survey_of_Learning_Based_Techniques_of_Phishing_Email_Filtering
  60. https://www.proofpoint.com/sites/default/files/gtd-pfpt-uk-tr-state-of-the-phish-2020-a4_final.pdf
  61. https://www.tessian.com/blog/phishing-statistics-2020/
  62. https://fr.wikipedia.org/wiki/Cyberattaque_contre_TV5_Monde
  63. https://www.larevuedudigital.com/simulation-dune-attaque-par-phishing-120-employes-du-pmu-pieges/
  64. https://hitek.fr/actualite/ministere-finances-bercy-phishing-mail-piege-agents_14213
  65. https://www.liberation.fr/france/2017/10/03/30-000-agents-de-bercy_1600718
  66. https://www.eweek.com/security/things-not-to-do-when-job-hunting
  67. https://lutte-contre-la-fraude-en-entreprise.eu/histoires-de-fraudes-en-entreprise/ingenierie-sociale/techniques-ingenierie-sociale-piratage-informatique.html
  68. https://www.bbc.com/news/technology-12891182
  69. https://www.securityweek.com/spotify-falls-victim-malvertising-attack
  70. https://www.globalsign.com/fr/blog/ingenierie-sociale-jouer-sur-la-confiance
  71. https://www.dataprint.fr/actualite/publicite-en-ligne-larnaque-a-la-fenetre-extensible-sabat-sur-les-internautes
  72. https://www.zdnet.fr/actualites/publicite-en-ligne-l-arnaque-a-la-fenetre-extensible-s-abat-sur-les-internautes-39882821.htm
  73. https://twitter.com/i/status/1112417736951562241
  74. https://www.bbc.com/news/world-us-canada-11088658
  75. https://fr.wikipedia.org/wiki/Cyberattaque_de_2008_contre_les_%C3%89tats-Unis
  76. https://www.theverge.com/2019/8/15/20807854/apple-mac-lightning-cable-hack-mike-grover-mg-omg-cables-defcon-cybersecurity
  77. https://www.globalsign.com/fr/blog/ingenierie-sociale-jouer-sur-la-confiance
  78. https://www.springcard.com/en/learning/how-to-avoid-the-hack-into-a-nfc-communication
  79. https://www.globalsign.com/fr/blog/ingenierie-sociale-jouer-sur-la-confiance
  80. https://www.proofpoint.com/fr/threat-reference/business-email-compromise
  81. https://www.globalsign.com/fr/blog/ingenierie-sociale-jouer-sur-la-confiance
  82. https://en.wikipedia.org/wiki/Business_email_compromise
  83.  
  84. Partie 4 : COMMENT les hackers réussissent à récupérer les mots de passe sur vos téléphones ?
  85.  
  86. https://www.youtube.com/watch?v=5eKbAVhlXko
  87. https://www.theverge.com/2019/8/15/20807854/apple-mac-lightning-cable-hack-mike-grover-mg-omg-cables-defcon-cybersecurity
  88. https://www.globalsign.com/fr/blog/ingenierie-sociale-jouer-sur-la-confiance
  89. https://www.springcard.com/en/learning/how-to-avoid-the-hack-into-a-nfc-communication
  90. https://www.youtube.com/watch?v=cxkSk0f4KGw
  91. https://www.youtube.com/watch?v=FhbMLmsCax0
  92. https://hitek.fr/actualite/iphone-x-hack-face-id-masque_14583
  93. https://www.youtube.com/watch?v=i4YQRLQVixM
  94. https://i.blackhat.com/USA-19/Wednesday/us-19-Chen-Biometric-Authentication-Under-Threat-Liveness-Detection-Hacking.pdf
  95. https://i.kinja-img.com/gawker-media/image/upload/pd9ydcfniybawxnecv5e.jpg
  96. https://www.youtube.com/watch?v=gtQ4yzbsi-c
  97. https://youtu.be/Z3YSDbFeIaI?t=174
  98. https://thecyberwire.com/newsletters/research-briefing/2/39
Add Comment
Please, Sign In to add comment