{"id":4352,"date":"2005-01-07T19:48:00","date_gmt":"2005-01-07T18:48:00","guid":{"rendered":"https:\/\/destinationcyber.com\/?p=4352"},"modified":"2005-01-07T19:48:00","modified_gmt":"2005-01-07T18:48:00","slug":"les-hackers-a-la-peche-aux-serveurs-windows-vulnerables","status":"publish","type":"post","link":"https:\/\/destinationcyber.com\/?p=4352","title":{"rendered":"Les hackers \u00e0 la p\u00eache aux serveurs Windows vuln\u00e9rables"},"content":{"rendered":"<p class=\"post_excerpt\">Une faille &#8211; corrig\u00e9e &#8211; dans un composant des environnements Windows Server attire les hackers, qui &lsquo;sniffent&rsquo; \u00e0 la recherche des serveurs vuln\u00e9rables <\/p>\n<p>A peine Microsoft a-t-il publi\u00e9 un patch, \u00e0 mi d\u00e9cembre &#8211; visant \u00e0 corriger une faille sur le composant WINS (Windows Internet Naming Service) de ses syst\u00e8mes Windows Server, dont la version 2003 &#8211; que les hackers de tous poils semblent s&rsquo;\u00eatre pr\u00e9cipit\u00e9 \u00e0 la recherche de la faille.<\/p>\n<p>De nombreux observateurs ont constat\u00e9 la multiplication des sondages externes (sniff) visant les services WINS : TCP et UDP ports 42. Cette pratique courante consiste \u00e0 tester automatiquement et en ligne les ports vuln\u00e9rables afin de rep\u00e9rer ceux qui n&rsquo;ont pas \u00e9t\u00e9 corrig\u00e9s.<\/p>\n<p><strong>Et gare aux postes qui n&rsquo;ont pas \u00e9t\u00e9 mis \u00e0 jour !<\/strong><\/p>\n<p>Ces incidents d\u00e9montrent \u00e0 la fois la comp\u00e9tence et la r\u00e9activit\u00e9 des hackers, prompts \u00e0 exploiter le plus rapidement possible les failles qui sont r\u00e9v\u00e9l\u00e9es, et \u00e0 d\u00e9tecter les postes et serveurs qui ne sont pas prot\u00e9g\u00e9s afin de les infecter.<\/p>\n<p>Ils d\u00e9montrent surtout que la r\u00e9activit\u00e9 ne doit \u00eatre le seul apanage des pirates informatiques, mais une pr\u00e9occupation de tous les instants des responsables informatiques. Car la marge de man\u0153uvre entre la d\u00e9couverte ou la publication d&rsquo;une faille et les premi\u00e8res attaques en ligne ne cesse de se r\u00e9duire.<\/p>\n<p>[source &#8211; Silicon.fr]&nbsp;Yves Grandmontagne<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Une faille &#8211; corrig\u00e9e &#8211; dans un composant des environnements Windows Server attire les hackers, qui &lsquo;sniffent&rsquo; \u00e0 la recherche des serveurs vuln\u00e9rables <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_citadela_custom_class":"","footnotes":""},"categories":[15],"tags":[],"class_list":["post-4352","post","type-post","status-publish","format-standard","hentry","category-securite"],"_links":{"self":[{"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/posts\/4352","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4352"}],"version-history":[{"count":0,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/posts\/4352\/revisions"}],"wp:attachment":[{"href":"https:\/\/destinationcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4352"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4352"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4352"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}