{"id":2761,"date":"2012-12-26T11:46:41","date_gmt":"2012-12-26T10:46:41","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=2761"},"modified":"2019-12-31T12:00:56","modified_gmt":"2019-12-31T11:00:56","slug":"clickjacking-mais-qui-a-vole-ma-souris","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/12\/clickjacking-mais-qui-a-vole-ma-souris\/","title":{"rendered":"Clickjacking, mais qui a vol\u00e9 ma souris ?"},"content":{"rendered":"<p>Le <em>clickjacking, <\/em>ou<em> \u00ab\u00a0d\u00e9tournement de clic\u00a0\u00bb,<\/em> est un terme apparu en 2008 pour d\u00e9signer un type d\u2019attaque ciblant les applications web. Ces attaques visent \u00e0 tromper l\u2019utilisateur sur l\u2019\u00e9l\u00e9ment sur lequel il clique, permettant <em>in fine<\/em> de lui faire r\u00e9aliser des actions \u00e0 son insu.<\/p>\n<h2>Comment se fait-on <em>clickjacker<\/em>\u00a0?<\/h2>\n<p>Pour mener une attaque par <em>clickjacking<\/em>, un attaquant va proc\u00e9der de la mani\u00e8re suivante\u00a0:<\/p>\n<p>1- Il identifie sa cible, une page non-prot\u00e9g\u00e9e contre ce type d\u2019attaque, qui permet de r\u00e9aliser une action en cliquant sur un lien ou un bouton.<\/p>\n<p>2- Il int\u00e8gre cette page dans une page malveillante qu\u2019il ma\u00eetrise<\/p>\n<p>3- Il s\u2019arrange pour que, lorsque la victime clique sur un \u00e9l\u00e9ment de la page, elle clique en r\u00e9alit\u00e9 sur un bouton ou un lien provenant du site vuln\u00e9rable<\/p>\n<p><a href=\"http:\/\/www.solucominsight.fr\/2012\/12\/clickjacking-mais-qui-a-vole-ma-souris\/clickjacking-image\/\" rel=\"attachment wp-att-2767\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft  wp-image-2767\" title=\"clickjacking image\" src=\"http:\/\/www.solucominsight.fr\/wp-content\/uploads\/2012\/12\/clickjacking-image.jpg\" alt=\"\" width=\"429\" height=\"291\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/12\/clickjacking-image.jpg 453w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/12\/clickjacking-image-282x191.jpg 282w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/12\/clickjacking-image-58x39.jpg 58w\" sizes=\"auto, (max-width: 429px) 100vw, 429px\" \/><\/a><\/p>\n<p>Par exemple, il peut utiliser les propri\u00e9t\u00e9s de style offerte par HTML\/CSS pour rendre transparente la page vuln\u00e9rable. Dans l\u2019exemple ci-dessus, l\u2019utilisateur verra le bouton \u00ab\u00a0Jouer\u00a0!\u00a0\u00bb mais cliquera en r\u00e9alit\u00e9 sur le \u00ab\u00a0Bouton 1\u00a0\u00bb, provenant d\u2019un site diff\u00e9rent\u00a0!<\/p>\n<p>Les exemples les plus fr\u00e9quents d\u2019attaque par <em>clickjacking<\/em> sont les \u201c<em>likejacking<\/em>\u201d et \u201c<em>tweetbomb<\/em>\u201d. La premi\u00e8re, ciblant le r\u00e9seau social, a pour objectif de faire \u00ab\u00a0<em>liker<\/em>\u00a0\u00bb une page, c\u2019est-\u00e0-dire d\u2019augmenter sa popularit\u00e9. La seconde vise \u00e0 diffuser sur Twitter un message, la plupart du temps publicitaire.<\/p>\n<h2>Les risques se limitent-ils aux r\u00e9seaux sociaux\u00a0?<\/h2>\n<p>Mais non\u00a0! Il est important de noter que les enjeux li\u00e9s \u00e0 ce type d\u2019attaques ne s\u2019arr\u00eatent pas \u00e0 la pollution de r\u00e9seaux sociaux. De m\u00eame que les attaques par <a href=\"https:\/\/www.owasp.org\/index.php\/Cross-Site_Request_Forgery_%28CSRF%29\">rejeu de requ\u00eate (XSRF),<\/a>\u00a0 les attaques par <em>clickjacking<\/em> permettent d\u2019ex\u00e9cuter des actions \u00e0 l\u2019insu de la victime.<\/p>\n<p>Il est donc tout \u00e0 fait imaginable d\u2019employer ce type d\u2019attaque afin, par exemple, d\u2019ajouter des articles dans le panier des clients d\u2019un site de e-commerce. Pour cela, il suffirait \u00e0 l\u2019attaquant de reprendre le sc\u00e9nario pr\u00e9c\u00e9dent, mais de remplacer les boutons \u00ab\u00a0<em>like<\/em>\u00a0\u00bb de Facebook par le bouton \u00ab\u00a0Ajouter au panier\u00a0\u00bb du site e-commerce. L\u2019attaquant pourrait augmenter grandement les ventes de son produit !<\/p>\n<h2>\u00a0Comment se prot\u00e9ger efficacement\u00a0?<\/h2>\n<p>La protection contre ce type d\u2019attaques est \u00e0 consid\u00e9rer du double point de vue de l\u2019utilisateur et du responsable du site internet qui sert &#8211; involontairement &#8211; de support \u00e0 l\u2019attaque. La protection id\u00e9ale n\u00e9cessite donc sensibilisation et moyens techniques.<\/p>\n<p>Pour les utilisateurs finaux en effet, se prot\u00e9ger implique d\u2019avoir conscience du risque et de faire preuve de vigilance en surveillant ses fr\u00e9quentations sur le web\u00a0! Il convient de rester m\u00e9fiant \u00e0 l\u2019\u00e9gard des liens commerciaux et des jeux ou concours qui promettent monts et merveilles.<\/p>\n<p>Pour les \u00e9quipes en charge de la s\u00e9curit\u00e9 des applications web, deux \u00e9l\u00e9ments sont \u00e0 consid\u00e9rer pour mitiger le risque li\u00e9 au <em>clickjacking\u00a0<\/em>: l\u2019utilisation d\u2019en-t\u00eates http sp\u00e9cifiques, et l\u2019emploi de protections en JavaScript.<\/p>\n<h4>\u00a0Utiliser les en-t\u00eates http appropri\u00e9s pour se prot\u00e9ger<\/h4>\n<p>Il est d\u2019une part possible d\u2019utiliser l\u2019en-t\u00eate http<a href=\"http:\/\/tools.ietf.org\/html\/draft-ietf-websec-x-frame-options-01\" target=\"_blank\" rel=\"noopener noreferrer\"> \u00ab\u00a0X-FRAME-OPTIONS\u00a0\u00bb<\/a>, qui va indiquer au navigateur \u00e0 quelles conditions le contenu du site peut \u00eatre int\u00e9gr\u00e9 dans une iframe. Il est possible de lui sp\u00e9cifier trois valeurs\u00a0:<\/p>\n<ul>\n<li>\u00ab\u00a0DENY\u00a0\u00bb, qui va interdire l\u2019inclusion de la page ;<\/li>\n<li>\u00ab\u00a0SAMEORIGIN\u00a0\u00bb, qui va autoriser uniquement les sites du m\u00eame domaine \u00e0 inclure la page ;<\/li>\n<li>\u00ab\u00a0ALLOW-FROM\u00a0\u00bb, qui permet de sp\u00e9cifier le ou les domaines autoris\u00e9s \u00e0 inclure la page.<\/li>\n<\/ul>\n<h4>Utiliser JavaScript pour s\u2019assurer que ses pages ne sont pas dissimul\u00e9es<\/h4>\n<p>En compl\u00e9ment, il est possible d\u2019utiliser du code JavaScript pour se prot\u00e9ger. Pour cela, ces codes vont par exemple s\u2019assurer que la page est bien au niveau sup\u00e9rieur et qu\u2019elle sera visible. Il faut n\u00e9anmoins reconna\u00eetre qu\u2019aucun de ces codes n\u2019est totalement fiable.<\/p>\n<p>Pour des informations d\u00e9taill\u00e9es sur les impl\u00e9mentations de ces protections, <a href=\"https:\/\/www.owasp.org\/index.php\/Clickjacking_Defense_Cheat_Sheet\" target=\"_blank\" rel=\"noopener noreferrer\">le site de l\u2019OWASP propose une page d\u00e9di\u00e9e <\/a>\u00e0 ce sujet.<\/p>\n<h4>La r\u00e9authentification, meilleure arme de protection pour les actions sensibles<\/h4>\n<p>La solution la plus efficace reste de r\u00e9-authentifier l\u2019utilisateur pour les actions sensibles, par exemple en lui redemandant son mot de passe ou en utilisant un second facteur d\u2019authentification, comme cela est l\u2019usage sur les sites de banque en ligne.<\/p>\n<h2>Ces protections sont-elles couramment d\u00e9ploy\u00e9es ?<\/h2>\n<p>En un mot\u00a0: non. Malheureusement, ce type d\u2019attaque n\u2019est toujours pas, 4 ans apr\u00e8s leur d\u00e9couverte, pris au s\u00e9rieux par la plupart des d\u00e9veloppeurs \/ testeurs \/ \u00e9quipes de s\u00e9curit\u00e9, sans doute car elles n\u2019ont pour l\u2019instant pas \u00e9t\u00e9 exploit\u00e9es \u00e0 grande \u00e9chelle en dehors des r\u00e9seaux sociaux.<\/p>\n<p>Selon un article publi\u00e9 r\u00e9cemment sur <a href=\"https:\/\/community.qualys.com\/blogs\/securitylabs\/2012\/11\/29\/clickjacking-an-overlooked-web-security-hole\" target=\"_blank\" rel=\"noopener noreferrer\">le blog de Qualys<\/a>, les protections standards d\u00e9crites ci-dessus ne sont ainsi pas encore d\u00e9ploy\u00e9es syst\u00e9matiquement\u00a0: pr\u00e8s de 70% des 20 sites bancaires les plus fr\u00e9quent\u00e9s n\u2019impl\u00e9mentent pas de protection efficace contre ce type d\u2019attaque.<\/p>\n<p>Il est fort \u00e0 parier que l\u2019emploi de ce type d\u2019attaque va augmenter et se diversifier \u00e0 l\u2019avenir. \u00a0En effet, les mesures de protection contre les attaques par <a href=\"https:\/\/www.owasp.org\/index.php\/Cross-Site_Request_Forgery_%28CSRF%29\">rejeu de requ\u00eate (XSRF)<\/a> se g\u00e9n\u00e9ralisant, notamment par leur int\u00e9gration dans les frameworks de d\u00e9veloppement, les attaquants se tourneront m\u00e9caniquement vers d\u2019autres vuln\u00e9rabilit\u00e9s, dont le <em>clickjacking<\/em>. Anticiper d\u00e8s \u00e0 pr\u00e9sent\u00a0 reste le moyen le plus s\u00fbr d\u2019\u00e9viter d\u2019en \u00eatre la victime.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Le clickjacking, ou \u00ab\u00a0d\u00e9tournement de clic\u00a0\u00bb, est un terme apparu en 2008 pour d\u00e9signer un type d\u2019attaque ciblant les applications web. Ces attaques visent \u00e0 tromper l\u2019utilisateur sur l\u2019\u00e9l\u00e9ment sur lequel il clique, permettant in fine de lui faire r\u00e9aliser&#8230;<\/p>\n","protected":false},"author":20,"featured_media":2763,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[36,3225],"tags":[183,3320,67,106],"coauthors":[780],"class_list":["post-2761","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-ethical-hacking-indicent-response","tag-cybercriminalite","tag-incident-response-cert-w","tag-internet","tag-reseaux-sociaux"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Clickjacking, mais qui a vol\u00e9 ma souris ?<\/title>\n<meta name=\"description\" content=\"Le clickjacking, ou \u00ab d\u00e9tournement de clic \u00bb, est un terme apparu en 2008 pour d\u00e9signer un type d\u2019attaque ciblant les applications web. Ces attaquent visent \u00e0 tromper l\u2019utilisateur sur l\u2019\u00e9l\u00e9ment sur lequel il clique, permettant in fine de lui faire r\u00e9aliser des actions \u00e0 son insu.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2012\/12\/clickjacking-mais-qui-a-vole-ma-souris\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Clickjacking, mais qui a vol\u00e9 ma souris ?\" \/>\n<meta property=\"og:description\" content=\"Le clickjacking, ou \u00ab d\u00e9tournement de clic \u00bb, est un terme apparu en 2008 pour d\u00e9signer un type d\u2019attaque ciblant les applications web. Ces attaquent visent \u00e0 tromper l\u2019utilisateur sur l\u2019\u00e9l\u00e9ment sur lequel il clique, permettant in fine de lui faire r\u00e9aliser des actions \u00e0 son insu.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2012\/12\/clickjacking-mais-qui-a-vole-ma-souris\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2012-12-26T10:46:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T11:00:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/12\/Fotolia_42688016_S.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"693\" \/>\n\t<meta property=\"og:image:height\" content=\"693\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Arnaud Soulli\u00e9\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Arnaud Soulli\u00e9\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/12\/clickjacking-mais-qui-a-vole-ma-souris\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/12\/clickjacking-mais-qui-a-vole-ma-souris\/\"},\"author\":{\"name\":\"Arnaud Soulli\u00e9\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8ba5826fcf8223b1c6c350c1d1fffc79\"},\"headline\":\"Clickjacking, mais qui a vol\u00e9 ma souris ?\",\"datePublished\":\"2012-12-26T10:46:41+00:00\",\"dateModified\":\"2019-12-31T11:00:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/12\/clickjacking-mais-qui-a-vole-ma-souris\/\"},\"wordCount\":953,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/12\/clickjacking-mais-qui-a-vole-ma-souris\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/12\/Fotolia_42688016_S.jpg\",\"keywords\":[\"Cybercriminalit\u00e9\",\"incident response CERT-W\",\"internet\",\"r\u00e9seaux sociaux\"],\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"Ethical Hacking &amp; Incident Response\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/12\/clickjacking-mais-qui-a-vole-ma-souris\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/12\/clickjacking-mais-qui-a-vole-ma-souris\/\",\"name\":\"Clickjacking, mais qui a vol\u00e9 ma souris ?\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/12\/clickjacking-mais-qui-a-vole-ma-souris\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/12\/clickjacking-mais-qui-a-vole-ma-souris\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/12\/Fotolia_42688016_S.jpg\",\"datePublished\":\"2012-12-26T10:46:41+00:00\",\"dateModified\":\"2019-12-31T11:00:56+00:00\",\"description\":\"Le clickjacking, ou \u00ab d\u00e9tournement de clic \u00bb, est un terme apparu en 2008 pour d\u00e9signer un type d\u2019attaque ciblant les applications web. Ces attaquent visent \u00e0 tromper l\u2019utilisateur sur l\u2019\u00e9l\u00e9ment sur lequel il clique, permettant in fine de lui faire r\u00e9aliser des actions \u00e0 son insu.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/12\/clickjacking-mais-qui-a-vole-ma-souris\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2012\/12\/clickjacking-mais-qui-a-vole-ma-souris\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/12\/clickjacking-mais-qui-a-vole-ma-souris\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/12\/Fotolia_42688016_S.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/12\/Fotolia_42688016_S.jpg\",\"width\":693,\"height\":693},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/12\/clickjacking-mais-qui-a-vole-ma-souris\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Clickjacking, mais qui a vol\u00e9 ma souris ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8ba5826fcf8223b1c6c350c1d1fffc79\",\"name\":\"Arnaud Soulli\u00e9\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/arnaud-soullie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Clickjacking, mais qui a vol\u00e9 ma souris ?","description":"Le clickjacking, ou \u00ab d\u00e9tournement de clic \u00bb, est un terme apparu en 2008 pour d\u00e9signer un type d\u2019attaque ciblant les applications web. Ces attaquent visent \u00e0 tromper l\u2019utilisateur sur l\u2019\u00e9l\u00e9ment sur lequel il clique, permettant in fine de lui faire r\u00e9aliser des actions \u00e0 son insu.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2012\/12\/clickjacking-mais-qui-a-vole-ma-souris\/","og_locale":"en_US","og_type":"article","og_title":"Clickjacking, mais qui a vol\u00e9 ma souris ?","og_description":"Le clickjacking, ou \u00ab d\u00e9tournement de clic \u00bb, est un terme apparu en 2008 pour d\u00e9signer un type d\u2019attaque ciblant les applications web. Ces attaquent visent \u00e0 tromper l\u2019utilisateur sur l\u2019\u00e9l\u00e9ment sur lequel il clique, permettant in fine de lui faire r\u00e9aliser des actions \u00e0 son insu.","og_url":"https:\/\/www.riskinsight-wavestone.com\/2012\/12\/clickjacking-mais-qui-a-vole-ma-souris\/","og_site_name":"RiskInsight","article_published_time":"2012-12-26T10:46:41+00:00","article_modified_time":"2019-12-31T11:00:56+00:00","og_image":[{"width":693,"height":693,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/12\/Fotolia_42688016_S.jpg","type":"image\/jpeg"}],"author":"Arnaud Soulli\u00e9","twitter_misc":{"Written by":"Arnaud Soulli\u00e9","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/12\/clickjacking-mais-qui-a-vole-ma-souris\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/12\/clickjacking-mais-qui-a-vole-ma-souris\/"},"author":{"name":"Arnaud Soulli\u00e9","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8ba5826fcf8223b1c6c350c1d1fffc79"},"headline":"Clickjacking, mais qui a vol\u00e9 ma souris ?","datePublished":"2012-12-26T10:46:41+00:00","dateModified":"2019-12-31T11:00:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/12\/clickjacking-mais-qui-a-vole-ma-souris\/"},"wordCount":953,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/12\/clickjacking-mais-qui-a-vole-ma-souris\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/12\/Fotolia_42688016_S.jpg","keywords":["Cybercriminalit\u00e9","incident response CERT-W","internet","r\u00e9seaux sociaux"],"articleSection":["Cybersecurity &amp; Digital Trust","Ethical Hacking &amp; Incident Response"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/12\/clickjacking-mais-qui-a-vole-ma-souris\/","url":"https:\/\/www.riskinsight-wavestone.com\/2012\/12\/clickjacking-mais-qui-a-vole-ma-souris\/","name":"Clickjacking, mais qui a vol\u00e9 ma souris ?","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/12\/clickjacking-mais-qui-a-vole-ma-souris\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/12\/clickjacking-mais-qui-a-vole-ma-souris\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/12\/Fotolia_42688016_S.jpg","datePublished":"2012-12-26T10:46:41+00:00","dateModified":"2019-12-31T11:00:56+00:00","description":"Le clickjacking, ou \u00ab d\u00e9tournement de clic \u00bb, est un terme apparu en 2008 pour d\u00e9signer un type d\u2019attaque ciblant les applications web. Ces attaquent visent \u00e0 tromper l\u2019utilisateur sur l\u2019\u00e9l\u00e9ment sur lequel il clique, permettant in fine de lui faire r\u00e9aliser des actions \u00e0 son insu.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/12\/clickjacking-mais-qui-a-vole-ma-souris\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2012\/12\/clickjacking-mais-qui-a-vole-ma-souris\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/12\/clickjacking-mais-qui-a-vole-ma-souris\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/12\/Fotolia_42688016_S.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/12\/Fotolia_42688016_S.jpg","width":693,"height":693},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/12\/clickjacking-mais-qui-a-vole-ma-souris\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Clickjacking, mais qui a vol\u00e9 ma souris ?"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8ba5826fcf8223b1c6c350c1d1fffc79","name":"Arnaud Soulli\u00e9","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/arnaud-soullie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/2761","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=2761"}],"version-history":[{"count":17,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/2761\/revisions"}],"predecessor-version":[{"id":12461,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/2761\/revisions\/12461"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/2763"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=2761"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=2761"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=2761"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=2761"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}