{"id":12050,"date":"2019-08-31T09:48:07","date_gmt":"2019-08-31T08:48:07","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=12050"},"modified":"2020-01-03T09:04:37","modified_gmt":"2020-01-03T08:04:37","slug":"le-dorking-ou-la-peche-aux-informations-sensibles-via-les-moteurs-de-recherche","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/08\/le-dorking-ou-la-peche-aux-informations-sensibles-via-les-moteurs-de-recherche\/","title":{"rendered":"Le Dorking ou la p\u00eache aux informations sensibles via les moteurs de recherche"},"content":{"rendered":"<p>Les <strong>moteurs de recherche publics ou internes <\/strong>aux organisations offrent un moyen de \u00ab p\u00eacher \u00bb des <strong>informations sensibles et techniquement accessibles \u00e0 tous<\/strong> via des <strong>mots clefs bien choisis<\/strong> \u2013 les \u00ab <strong>Dorks<\/strong> \u00bb.<\/p>\n<figure id=\"post-12055 media-12055\" class=\"align-center\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-12055\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/09\/Image-1.png\" alt=\"\" width=\"335\" height=\"196\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/09\/Image-1.png 774w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/09\/Image-1-120x70.png 120w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/09\/Image-1-326x191.png 326w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/09\/Image-1-768x449.png 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/09\/Image-1-67x39.png 67w\" sizes=\"auto, (max-width: 335px) 100vw, 335px\" \/><\/figure>\n<p>Deux actes m\u00e9diatis\u00e9s ces derni\u00e8res ann\u00e9es l\u2019illustrent parmi bien d\u2019autres : la fuite des <strong>donn\u00e9es d\u2019un parti politique fran\u00e7ais <\/strong>retrouv\u00e9es sur le site de son h\u00e9bergeur, en utilisant un Dork du type \u00ab <em>Index of \/<\/em>\u00bb, ou la d\u00e9couverte, par des services de contre-espionnage, de <strong>sites internet servant pour la communication entre une agence \u00e9tatique et ses informateurs<\/strong>, entra\u00eenant la mort de plusieurs dizaines d\u2019entre eux.<\/p>\n<p>Sur Internet, la p\u00eache aux \u00ab Dorks \u00bb s\u2019exerce via des <strong>moteurs de recherche tels que Google et Bing<\/strong> mais \u00e9galement sur <strong>des moteurs hors US\/EU<\/strong> qui, tout comme les <strong>sites d\u2019archivage <\/strong>de pages web, sont<strong> susceptibles de conserver des informations retir\u00e9es <\/strong>des bases d\u2019index <strong>des moteurs de recherche classiques<\/strong>.<\/p>\n<p>A titre illustratif, la recherche suivante : \u00ab <em>inurl:files intext:nationalit\u00e9 filetype:xls intext:&lt;un pr\u00e9nom ou un nom de famille type&gt;<\/em> \u00bb entr\u00e9e sur un moteur de recherche largement utilis\u00e9, est susceptible de retrouver des fichiers Excel o\u00f9 figurent des informations nominatives mentionnant la nationalit\u00e9 de personnes. Cependant <strong>un seul mot bien choisi<\/strong>, par exemple le nom d\u2019une <strong>application m\u00e9tier <\/strong>recherch\u00e9 sur Internet ou le mot \u00ab <strong>salaire<\/strong> \u00bb recherch\u00e9 sur l\u2019intranet, peut <strong>suffire \u00e0<\/strong> <strong>p\u00eacher des informations tr\u00e8s sensibles<\/strong>.<\/p>\n<figure id=\"post-12057 media-12057\" class=\"align-center\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-12057\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/09\/image-2.png\" alt=\"\" width=\"201\" height=\"173\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/09\/image-2.png 604w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/09\/image-2-222x191.png 222w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/09\/image-2-45x39.png 45w\" sizes=\"auto, (max-width: 201px) 100vw, 201px\" \/><\/figure>\n<p>Les moteurs de recherche internes \u00e0 certains sites peuvent \u00eatre \u00e9galement exploit\u00e9s. C\u2019est le cas, par exemple, <strong>des sites sp\u00e9cialis\u00e9s dans la mise en ligne de codes sources<\/strong> (ex : GitHub) ou de <strong>morceaux de textes<\/strong> (ex : PasteBin), des sites de <strong>forums techniques<\/strong> d\u2019\u00e9diteurs de logiciels, ou de <strong>sites de CV <\/strong>en ligne contenant des descriptions parfois tr\u00e8s pr\u00e9cises sur des environnements techniques sensibles.<\/p>\n<p>Le \u00ab <strong>Dorking<\/strong> \u00bb est <strong>\u00e0 la port\u00e9e du plus grand nombre<\/strong>, gr\u00e2ce aux nombreux <strong>tutoriels<\/strong> accessibles sur Internet, aux <strong>formulaires de recherches \u00e9tendues<\/strong> (ex : celui de startpage.com) et surtout aux <strong>sites r\u00e9f\u00e9ren\u00e7ant des milliers de Dorks<\/strong> (ex : Google Hacking Database) organis\u00e9s en fonction de l\u2019usage attendu tel que retrouver des \u00ab Fichiers contenant des mots de passe \u00bb.<\/p>\n<p>Le Dorking s\u2019effectue plus commun\u00e9ment \u00e0 l\u2019aide de <strong>recherches manuelles<\/strong> mais est susceptible d\u2019\u00eatre <strong>industrialis\u00e9<\/strong> gr\u00e2ce \u00e0 des \u00ab <strong>Dork scanners<\/strong> \u00bb comme Zeus-scanner ou \u00e0 l\u2019aide d<strong>\u2019outils PowerShell<\/strong> (PnP-PowerShell) pour les recherches dans Office365.<\/p>\n<p>Pour <strong>se pr\u00e9munir de l\u2019exploitation malveillante du Dorking<\/strong>, les organisations peuvent notamment :<\/p>\n<ul>\n<li>\u00catre en capacit\u00e9 de <strong>d\u00e9tecter les fuites d\u2019informations<\/strong> sensibles sur le SI interne ou sur Internet, en examinant par exemple l\u2019opportunit\u00e9 de recourir sur le SI interne \u00e0 des <strong>produits de type DLP<\/strong> et sur internet \u00e0 un <strong>service de veille des fuites d\u2019informations<\/strong>, qui pourra \u00e9galement surveiller l\u2019<strong>internet non-index\u00e9<\/strong>, voire<strong> le Dark-Web<\/strong>.<\/li>\n<li>Mettre en place une <strong>classification des donn\u00e9es et une gouvernance des partages internes<\/strong> (ex : les Groups Office 365) en commen\u00e7ant par les activit\u00e9s les plus sensibles (ex : groupes m\u00e9tiers sensibles, donn\u00e9es clients, RH\u2026).<\/li>\n<li><strong>Encadrer contractuellement et op\u00e9rationnellement<\/strong> les missions confi\u00e9es aux <strong>prestataires<\/strong> via un <strong>Plan d\u2019Assurance S\u00e9curit\u00e9<\/strong> et les sensibiliser \u00e0 la protection et \u00e0 la non-divulgation des informations auxquelles ils peuvent acc\u00e9der ; lorsque c\u2019est possible, pr\u00e9voir un <strong>PV de destruction de donn\u00e9es<\/strong>.<\/li>\n<li>Encadrer la communication d\u2019informations sensibles aux partenaires sociaux, aux associations, etc. qui ne disposent pas toujours sur leur SI et sites Internet d\u00e9di\u00e9s, de moyens de protection SSI \u00e9quivalents \u00e0 ceux de l\u2019organisation ou de l\u2019entreprise \u00e0 laquelle ils sont li\u00e9s.<\/li>\n<\/ul>\n<p>Les organisations peuvent \u00e9galement prendre des <strong>mesures<\/strong> visant \u00e0 <strong>limiter l\u2019impact d\u2019une fuite de donn\u00e9es<\/strong> av\u00e9r\u00e9e :<\/p>\n<ul>\n<li>Disposer d\u2019une <strong>fiche r\u00e9flexe <\/strong>pour traiter la fuite, incluant la <strong>conduite \u00e0 tenir vis-\u00e0-vis des moteurs de recherche <\/strong>et des sites l\u2019ayant index\u00e9e (ex : gestion du r\u00e9f\u00e9rencement Google, etc \u2026)<\/li>\n<li>Disposer d\u2019un processus de gestion des incidents de s\u00e9curit\u00e9, de <strong>data-breach<\/strong> (GDPR), de gestion de crise\u2026 incluant la <strong>notification potentielle aux autorit\u00e9s et personnes concern\u00e9es<\/strong>.<\/li>\n<li>Disposer d\u2019un processus et d\u2019outils de <strong>veille sur les r\u00e9seaux sociaux <\/strong>et media avec des r\u00e9ponses pr\u00e9par\u00e9es.<\/li>\n<\/ul>\n<p>Cette pr\u00e9vention peut en outre conduire \u00e0 <strong>recourir \u00e0 la technique du Dorking \u00e0 des fins \u00e9thiques<\/strong>, tels que des <strong>audits de s\u00e9curit\u00e9<\/strong>, ou des <strong>activit\u00e9s \u00ab Red Team \u00bb<\/strong> qui visent \u00e0 se mettre \u00e0 la place d\u2019un acteur malveillant pour d\u00e9couvrir \u2013 avant lui \u2013 les failles et les informations qui permettraient de porter atteinte \u00e0 l\u2019organisation. N\u00e9anmoins, en fonction du contexte, il peut \u00eatre pr\u00e9f\u00e9rable de <strong>bien encadrer en amont la communication des r\u00e9sultats de la mise en \u0153uvre de techniques de Dorking<\/strong>, lesquelles peuvent donner lieu \u00e0 la <strong>d\u00e9couverte d\u2019informations personnelles ou\/et sensibles<\/strong>, sur des ressources <strong>li\u00e9es \u00e0 l\u2019entreprise ou \u00e0 des acteurs externes<\/strong>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Les moteurs de recherche publics ou internes aux organisations offrent un moyen de \u00ab p\u00eacher \u00bb des informations sensibles et techniquement accessibles \u00e0 tous via des mots clefs bien choisis \u2013 les \u00ab Dorks \u00bb. Deux actes m\u00e9diatis\u00e9s ces derni\u00e8res&#8230;<\/p>\n","protected":false},"author":1285,"featured_media":12060,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3223,36],"tags":[3259,59,3377,3376],"coauthors":[2841],"class_list":["post-12050","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-next-gen-it-security","category-cybersecurity-digital-trust","tag-data-protection-2","tag-donnees","tag-dorking","tag-moteur-de-recherche"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Le Dorking ou la p\u00eache aux informations sensibles via les moteurs de recherche - RiskInsight<\/title>\n<meta name=\"description\" content=\"Les moteurs de recherche offrent un moyen de \u00ab p\u00eacher \u00bb des informations sensibles et techniquement accessibles \u00e0 tous via des mots clefs \u2013 les \u00ab Dorks \u00bb.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2019\/08\/le-dorking-ou-la-peche-aux-informations-sensibles-via-les-moteurs-de-recherche\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Le Dorking ou la p\u00eache aux informations sensibles via les moteurs de recherche - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Les moteurs de recherche offrent un moyen de \u00ab p\u00eacher \u00bb des informations sensibles et techniquement accessibles \u00e0 tous via des mots clefs \u2013 les \u00ab Dorks \u00bb.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2019\/08\/le-dorking-ou-la-peche-aux-informations-sensibles-via-les-moteurs-de-recherche\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-31T08:48:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-01-03T08:04:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/09\/Fotolia_71195707_Subscription_Monthly_XXL.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"3873\" \/>\n\t<meta property=\"og:image:height\" content=\"3873\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Axel Petersen\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Axel Petersen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2019\/08\/le-dorking-ou-la-peche-aux-informations-sensibles-via-les-moteurs-de-recherche\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2019\/08\/le-dorking-ou-la-peche-aux-informations-sensibles-via-les-moteurs-de-recherche\/\"},\"author\":{\"name\":\"Axel Petersen\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/3544c8184dc9a23e6ca7ad0da430b274\"},\"headline\":\"Le Dorking ou la p\u00eache aux informations sensibles via les moteurs de recherche\",\"datePublished\":\"2019-08-31T08:48:07+00:00\",\"dateModified\":\"2020-01-03T08:04:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2019\/08\/le-dorking-ou-la-peche-aux-informations-sensibles-via-les-moteurs-de-recherche\/\"},\"wordCount\":843,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2019\/08\/le-dorking-ou-la-peche-aux-informations-sensibles-via-les-moteurs-de-recherche\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/09\/Fotolia_71195707_Subscription_Monthly_XXL.jpg\",\"keywords\":[\"data protection\",\"donn\u00e9es\",\"Dorking\",\"moteur de recherche\"],\"articleSection\":[\"Cloud &amp; Next-Gen IT Security\",\"Cybersecurity &amp; Digital Trust\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2019\/08\/le-dorking-ou-la-peche-aux-informations-sensibles-via-les-moteurs-de-recherche\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2019\/08\/le-dorking-ou-la-peche-aux-informations-sensibles-via-les-moteurs-de-recherche\/\",\"name\":\"Le Dorking ou la p\u00eache aux informations sensibles via les moteurs de recherche - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2019\/08\/le-dorking-ou-la-peche-aux-informations-sensibles-via-les-moteurs-de-recherche\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2019\/08\/le-dorking-ou-la-peche-aux-informations-sensibles-via-les-moteurs-de-recherche\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/09\/Fotolia_71195707_Subscription_Monthly_XXL.jpg\",\"datePublished\":\"2019-08-31T08:48:07+00:00\",\"dateModified\":\"2020-01-03T08:04:37+00:00\",\"description\":\"Les moteurs de recherche offrent un moyen de \u00ab p\u00eacher \u00bb des informations sensibles et techniquement accessibles \u00e0 tous via des mots clefs \u2013 les \u00ab Dorks \u00bb.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2019\/08\/le-dorking-ou-la-peche-aux-informations-sensibles-via-les-moteurs-de-recherche\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2019\/08\/le-dorking-ou-la-peche-aux-informations-sensibles-via-les-moteurs-de-recherche\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2019\/08\/le-dorking-ou-la-peche-aux-informations-sensibles-via-les-moteurs-de-recherche\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/09\/Fotolia_71195707_Subscription_Monthly_XXL.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/09\/Fotolia_71195707_Subscription_Monthly_XXL.jpg\",\"width\":3873,\"height\":3873,\"caption\":\"Vector illustration of iceberg and clouds\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2019\/08\/le-dorking-ou-la-peche-aux-informations-sensibles-via-les-moteurs-de-recherche\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Le Dorking ou la p\u00eache aux informations sensibles via les moteurs de recherche\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/3544c8184dc9a23e6ca7ad0da430b274\",\"name\":\"Axel Petersen\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/axel-petersen\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Le Dorking ou la p\u00eache aux informations sensibles via les moteurs de recherche - RiskInsight","description":"Les moteurs de recherche offrent un moyen de \u00ab p\u00eacher \u00bb des informations sensibles et techniquement accessibles \u00e0 tous via des mots clefs \u2013 les \u00ab Dorks \u00bb.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2019\/08\/le-dorking-ou-la-peche-aux-informations-sensibles-via-les-moteurs-de-recherche\/","og_locale":"en_US","og_type":"article","og_title":"Le Dorking ou la p\u00eache aux informations sensibles via les moteurs de recherche - RiskInsight","og_description":"Les moteurs de recherche offrent un moyen de \u00ab p\u00eacher \u00bb des informations sensibles et techniquement accessibles \u00e0 tous via des mots clefs \u2013 les \u00ab Dorks \u00bb.","og_url":"https:\/\/www.riskinsight-wavestone.com\/2019\/08\/le-dorking-ou-la-peche-aux-informations-sensibles-via-les-moteurs-de-recherche\/","og_site_name":"RiskInsight","article_published_time":"2019-08-31T08:48:07+00:00","article_modified_time":"2020-01-03T08:04:37+00:00","og_image":[{"width":3873,"height":3873,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/09\/Fotolia_71195707_Subscription_Monthly_XXL.jpg","type":"image\/jpeg"}],"author":"Axel Petersen","twitter_misc":{"Written by":"Axel Petersen","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2019\/08\/le-dorking-ou-la-peche-aux-informations-sensibles-via-les-moteurs-de-recherche\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2019\/08\/le-dorking-ou-la-peche-aux-informations-sensibles-via-les-moteurs-de-recherche\/"},"author":{"name":"Axel Petersen","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/3544c8184dc9a23e6ca7ad0da430b274"},"headline":"Le Dorking ou la p\u00eache aux informations sensibles via les moteurs de recherche","datePublished":"2019-08-31T08:48:07+00:00","dateModified":"2020-01-03T08:04:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2019\/08\/le-dorking-ou-la-peche-aux-informations-sensibles-via-les-moteurs-de-recherche\/"},"wordCount":843,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2019\/08\/le-dorking-ou-la-peche-aux-informations-sensibles-via-les-moteurs-de-recherche\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/09\/Fotolia_71195707_Subscription_Monthly_XXL.jpg","keywords":["data protection","donn\u00e9es","Dorking","moteur de recherche"],"articleSection":["Cloud &amp; Next-Gen IT Security","Cybersecurity &amp; Digital Trust"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2019\/08\/le-dorking-ou-la-peche-aux-informations-sensibles-via-les-moteurs-de-recherche\/","url":"https:\/\/www.riskinsight-wavestone.com\/2019\/08\/le-dorking-ou-la-peche-aux-informations-sensibles-via-les-moteurs-de-recherche\/","name":"Le Dorking ou la p\u00eache aux informations sensibles via les moteurs de recherche - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2019\/08\/le-dorking-ou-la-peche-aux-informations-sensibles-via-les-moteurs-de-recherche\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2019\/08\/le-dorking-ou-la-peche-aux-informations-sensibles-via-les-moteurs-de-recherche\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/09\/Fotolia_71195707_Subscription_Monthly_XXL.jpg","datePublished":"2019-08-31T08:48:07+00:00","dateModified":"2020-01-03T08:04:37+00:00","description":"Les moteurs de recherche offrent un moyen de \u00ab p\u00eacher \u00bb des informations sensibles et techniquement accessibles \u00e0 tous via des mots clefs \u2013 les \u00ab Dorks \u00bb.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2019\/08\/le-dorking-ou-la-peche-aux-informations-sensibles-via-les-moteurs-de-recherche\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2019\/08\/le-dorking-ou-la-peche-aux-informations-sensibles-via-les-moteurs-de-recherche\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2019\/08\/le-dorking-ou-la-peche-aux-informations-sensibles-via-les-moteurs-de-recherche\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/09\/Fotolia_71195707_Subscription_Monthly_XXL.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/09\/Fotolia_71195707_Subscription_Monthly_XXL.jpg","width":3873,"height":3873,"caption":"Vector illustration of iceberg and clouds"},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2019\/08\/le-dorking-ou-la-peche-aux-informations-sensibles-via-les-moteurs-de-recherche\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Le Dorking ou la p\u00eache aux informations sensibles via les moteurs de recherche"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/3544c8184dc9a23e6ca7ad0da430b274","name":"Axel Petersen","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/axel-petersen\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/12050","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1285"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=12050"}],"version-history":[{"count":6,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/12050\/revisions"}],"predecessor-version":[{"id":12070,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/12050\/revisions\/12070"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/12060"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=12050"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=12050"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=12050"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=12050"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}