{"id":2153,"date":"2018-10-03T17:22:17","date_gmt":"2018-10-03T15:22:17","guid":{"rendered":"https:\/\/www.identitycosmos.com\/?p=2153"},"modified":"2018-10-03T17:22:17","modified_gmt":"2018-10-03T15:22:17","slug":"dcshadow-attack-comprendre-les-bases","status":"publish","type":"post","link":"https:\/\/identitycosmos.com\/index.php\/2018\/10\/03\/dcshadow-attack-comprendre-les-bases\/","title":{"rendered":"DCShadow attack, comprendre les bases"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/www.identitycosmos.com\/http:\/www.identitycosmos.com\/technique\/dcshadow-attack-comprendre-les-bases\/attachment\/dcshadowattack\" rel=\"attachment wp-att-2154\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-medium wp-image-2154\" src=\"https:\/\/www.identitycosmos.com\/wp-content\/uploads\/2018\/10\/dcshadowattack-219x300.jpg\" alt=\"\" width=\"219\" height=\"300\" srcset=\"https:\/\/identitycosmos.com\/wp-content\/uploads\/2018\/10\/dcshadowattack-219x300.jpg 219w, https:\/\/identitycosmos.com\/wp-content\/uploads\/2018\/10\/dcshadowattack.jpg 500w\" sizes=\"auto, (max-width: 219px) 100vw, 219px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>Encore un mod\u00e8le d&#8217;attaque mis en \u00e9vidence par les fameux Benjamin DELPY et Vincent LE TOUX &#8211; et oui, ce sont des Fran\u00e7ais !<\/p>\n<p>Je vous conseille vivement de consulter cette page pour comprendre les bases de l&#8217;attaque:\u00a0<a href=\"https:\/\/www.dcshadow.com\/\">\u00a0https:\/\/www.dcshadow.com\/<\/a><\/p>\n<p>Microsoft a r\u00e9agi, en impl\u00e9mentant dans Azure Advanced Threat Protection une d\u00e9tection de l&#8217;attaque, plus d&#8217;informations ici:\u00a0<a href=\"https:\/\/techcommunity.microsoft.com\/t5\/Enterprise-Mobility-Security\/How-Azure-Advanced-Threat-Protection-detects-the-DCShadow-attack\/ba-p\/265740\">https:\/\/techcommunity.microsoft.com\/t5\/Enterprise-Mobility-Security\/How-Azure-Advanced-Threat-Protection-detects-the-DCShadow-attack\/ba-p\/265740<\/a><\/p>\n<p><a href=\"https:\/\/www.identitycosmos.com\/http:\/www.identitycosmos.com\/technique\/dcshadow-attack-comprendre-les-bases\/attachment\/shadow2\" rel=\"attachment wp-att-2155\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-2155\" src=\"https:\/\/www.identitycosmos.com\/wp-content\/uploads\/2018\/10\/shadow2-300x122.png\" alt=\"\" width=\"300\" height=\"122\" srcset=\"https:\/\/identitycosmos.com\/wp-content\/uploads\/2018\/10\/shadow2-300x122.png 300w, https:\/\/identitycosmos.com\/wp-content\/uploads\/2018\/10\/shadow2-1024x418.png 1024w, https:\/\/identitycosmos.com\/wp-content\/uploads\/2018\/10\/shadow2-768x314.png 768w, https:\/\/identitycosmos.com\/wp-content\/uploads\/2018\/10\/shadow2.png 1254w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>Comme tout le monde est concern\u00e9&#8230; bonne lecture !<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; &nbsp; Encore un mod\u00e8le d&#8217;attaque mis en \u00e9vidence par les fameux Benjamin DELPY et Vincent LE TOUX &#8211; et oui, ce sont des Fran\u00e7ais ! Je vous conseille vivement de consulter cette page pour comprendre les bases de l&#8217;attaque:\u00a0\u00a0https:\/\/www.dcshadow.com\/ Microsoft a r\u00e9agi, en impl\u00e9mentant dans Azure Advanced Threat Protection une d\u00e9tection de l&#8217;attaque, plus [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,7],"tags":[14,34,78,79],"class_list":["post-2153","post","type-post","status-publish","format-standard","hentry","category-cybersecurity","category-technique","tag-active-directory","tag-ata","tag-cybersecurity","tag-dcshadow"],"_links":{"self":[{"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/posts\/2153","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/comments?post=2153"}],"version-history":[{"count":0,"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/posts\/2153\/revisions"}],"wp:attachment":[{"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/media?parent=2153"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/categories?post=2153"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/tags?post=2153"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}