{"id":183719,"date":"2011-06-30T18:40:01","date_gmt":"2011-06-30T16:40:01","guid":{"rendered":"https:\/\/cms.galaxiemedia.fr\/tomshardware\/2011\/06\/30\/une-souris-modifiee-pour-hacker-un-ordinateur\/"},"modified":"2023-06-22T19:43:01","modified_gmt":"2023-06-22T17:43:01","slug":"une-souris-modifiee-pour-hacker-un-ordinateur","status":"publish","type":"post","link":"https:\/\/www.tomshardware.fr\/une-souris-modifiee-pour-hacker-un-ordinateur\/","title":{"rendered":"Une souris modifi\u00e9e pour hacker un ordinateur"},"content":{"rendered":"

\"Image<\/span><\/span><\/p>\n<\/p>\n

Comment hacker une soci\u00e9t\u00e9 de fa\u00e7on efficace sans p\u00e9n\u00e9trer par le r\u00e9seau ? Avec un peu de social-engineering et une souris modifi\u00e9e. L’id\u00e9e est assez simple : la soci\u00e9t\u00e9 Netragard a int\u00e9gr\u00e9 un hub USB et un microcontr\u00f4leur dans la coque d’une souris. La modification est \u00e9videmment invisible \u00e0 l’oeil nu et la souris modifi\u00e9e a \u00e9t\u00e9 envoy\u00e9e \u00e0 un employ\u00e9 sous la forme d’un \u00ab cadeau \u00bb.<\/p>\n<\/p>\n

La souris, une fois connect\u00e9e, fonctionne comme une souris classique, mais le microcontr\u00f4leur, 1 minute apr\u00e8s son \u00ab activation \u00bb, est capable d’\u00e9muler un clavier, via le protocole HID (Human Devices Interface). Et il est capable de \u00ab taper \u00bb des commandes comme s’il \u00e9tait l’utilisateur et la version de test est m\u00eame capable de passer outre certains antivirus qui d\u00e9tecteraient le comportement suspect. La fa\u00e7on dont l’attaque s’effectue ensuite n’est pas claire, mais visiblement le microcontr\u00f4leur stocke un malware dans une m\u00e9moire flash et est capable de l’envoyer \u00e0 l’ordinateur sans passer par les canaux classiques et donc \u00e9viter la d\u00e9tection.<\/p>\n<\/p>\n

Cette technique montre qu’un objet en apparence anodin, une souris, peut \u00eatre un vecteur pour une attaque. Rappelons qu’il existe des claviers int\u00e9grant un keylogger mat\u00e9riel, plac\u00e9 entre le clavier et l’ordinateur, et que des hackers avaient montr\u00e9, il y a quelques ann\u00e9es, comment pirater une machine en utilisant le firmware du clavier. Et avec la multiplication des objets int\u00e9grant un firmware (adaptateur vid\u00e9o, disque dur, etc.) modifiable, ce type d’attaques pourrait se g\u00e9n\u00e9raliser dans le futur.<\/p>\n","protected":false},"excerpt":{"rendered":"

Comment hacker une soci\u00e9t\u00e9 de fa\u00e7on efficace sans p\u00e9n\u00e9trer par le r\u00e9seau ? Avec un peu de social-engineering et une souris modifi\u00e9e.<\/p>","protected":false},"author":36,"featured_media":183720,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":""},"categories":[487,4068,4111,4079,4082],"tags":[],"hubs":[],"acf":{"post_show_excerpt":false,"post_source":{"title":"Netragard","url":"http:\/\/pentest.snosoft.com\/2011\/06\/24\/netragards-hacker-interface-device-hid\/","target":""}},"yoast_head":"\nUne souris modifi\u00e9e pour hacker un ordinateur<\/title>\n<meta name=\"description\" content=\"Comment hacker une soci\u00e9t\u00e9 de fa\u00e7on efficace sans p\u00e9n\u00e9trer par le r\u00e9seau ? Avec un peu de social-engineering et une souris modifi\u00e9e.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tomshardware.fr\/une-souris-modifiee-pour-hacker-un-ordinateur\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Une souris modifi\u00e9e pour hacker un ordinateur\" \/>\n<meta property=\"og:description\" content=\"Comment hacker une soci\u00e9t\u00e9 de fa\u00e7on efficace sans p\u00e9n\u00e9trer par le r\u00e9seau ? Avec un peu de social-engineering et une souris modifi\u00e9e.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tomshardware.fr\/une-souris-modifiee-pour-hacker-un-ordinateur\/\" \/>\n<meta property=\"og:site_name\" content=\"Tom\u2019s Hardware\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TomsHardwareFrance\/\" \/>\n<meta property=\"article:published_time\" content=\"2011-06-30T16:40:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-22T17:43:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tomshardware.fr\/content\/uploads\/sites\/3\/2011\/06\/mouse-guts.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"669\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pierre Dandumont\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@tomshardware_fr\" \/>\n<meta name=\"twitter:site\" content=\"@tomshardware_fr\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.tomshardware.fr\/une-souris-modifiee-pour-hacker-un-ordinateur\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.tomshardware.fr\/une-souris-modifiee-pour-hacker-un-ordinateur\/\"},\"author\":{\"name\":\"Pierre Dandumont\",\"@id\":\"https:\/\/www.tomshardware.fr\/#\/schema\/person\/17966383cb6059d95d48bbdb852df076\"},\"headline\":\"Une souris modifi\u00e9e pour hacker un ordinateur\",\"datePublished\":\"2011-06-30T16:40:01+00:00\",\"dateModified\":\"2023-06-22T17:43:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.tomshardware.fr\/une-souris-modifiee-pour-hacker-un-ordinateur\/\"},\"wordCount\":287,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.tomshardware.fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.tomshardware.fr\/une-souris-modifiee-pour-hacker-un-ordinateur\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tomshardware.fr\/content\/uploads\/sites\/3\/2011\/06\/mouse-guts.jpg\",\"articleSection\":[\"Actualit\u00e9\",\"Informatique\",\"Internet & Telecom\",\"P\u00e9riph\u00e9riques\",\"Souris\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.tomshardware.fr\/une-souris-modifiee-pour-hacker-un-ordinateur\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tomshardware.fr\/une-souris-modifiee-pour-hacker-un-ordinateur\/\",\"url\":\"https:\/\/www.tomshardware.fr\/une-souris-modifiee-pour-hacker-un-ordinateur\/\",\"name\":\"Une souris modifi\u00e9e pour hacker un ordinateur\",\"isPartOf\":{\"@id\":\"https:\/\/www.tomshardware.fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tomshardware.fr\/une-souris-modifiee-pour-hacker-un-ordinateur\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tomshardware.fr\/une-souris-modifiee-pour-hacker-un-ordinateur\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tomshardware.fr\/content\/uploads\/sites\/3\/2011\/06\/mouse-guts.jpg\",\"datePublished\":\"2011-06-30T16:40:01+00:00\",\"dateModified\":\"2023-06-22T17:43:01+00:00\",\"description\":\"Comment hacker une soci\u00e9t\u00e9 de fa\u00e7on efficace sans p\u00e9n\u00e9trer par le r\u00e9seau ? Avec un peu de social-engineering et une souris modifi\u00e9e.\",\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tomshardware.fr\/une-souris-modifiee-pour-hacker-un-ordinateur\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.tomshardware.fr\/une-souris-modifiee-pour-hacker-un-ordinateur\/#primaryimage\",\"url\":\"https:\/\/www.tomshardware.fr\/content\/uploads\/sites\/3\/2011\/06\/mouse-guts.jpg\",\"contentUrl\":\"https:\/\/www.tomshardware.fr\/content\/uploads\/sites\/3\/2011\/06\/mouse-guts.jpg\",\"width\":500,\"height\":669},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tomshardware.fr\/#website\",\"url\":\"https:\/\/www.tomshardware.fr\/\",\"name\":\"Tom\u2019s Hardware\",\"description\":\"Toute l'info hardware et gaming !\",\"publisher\":{\"@id\":\"https:\/\/www.tomshardware.fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tomshardware.fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.tomshardware.fr\/#organization\",\"name\":\"Tom\u2019s Hardware\",\"url\":\"https:\/\/www.tomshardware.fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.tomshardware.fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.tomshardware.fr\/content\/uploads\/sites\/3\/2023\/06\/th.png\",\"contentUrl\":\"https:\/\/www.tomshardware.fr\/content\/uploads\/sites\/3\/2023\/06\/th.png\",\"width\":1000,\"height\":1000,\"caption\":\"Tom\u2019s Hardware\"},\"image\":{\"@id\":\"https:\/\/www.tomshardware.fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/TomsHardwareFrance\/\",\"https:\/\/x.com\/tomshardware_fr\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tomshardware.fr\/#\/schema\/person\/17966383cb6059d95d48bbdb852df076\",\"name\":\"Pierre Dandumont\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.tomshardware.fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a08bb358c2a9fc36265e8f3225c5de08?s=64&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a08bb358c2a9fc36265e8f3225c5de08?s=64&d=mm&r=g\",\"caption\":\"Pierre Dandumont\"},\"url\":\"https:\/\/www.tomshardware.fr\/author\/pierre-dandumont\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Une souris modifi\u00e9e pour hacker un ordinateur","description":"Comment hacker une soci\u00e9t\u00e9 de fa\u00e7on efficace sans p\u00e9n\u00e9trer par le r\u00e9seau ? Avec un peu de social-engineering et une souris modifi\u00e9e.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tomshardware.fr\/une-souris-modifiee-pour-hacker-un-ordinateur\/","og_locale":"fr_FR","og_type":"article","og_title":"Une souris modifi\u00e9e pour hacker un ordinateur","og_description":"Comment hacker une soci\u00e9t\u00e9 de fa\u00e7on efficace sans p\u00e9n\u00e9trer par le r\u00e9seau ? Avec un peu de social-engineering et une souris modifi\u00e9e.","og_url":"https:\/\/www.tomshardware.fr\/une-souris-modifiee-pour-hacker-un-ordinateur\/","og_site_name":"Tom\u2019s Hardware","article_publisher":"https:\/\/www.facebook.com\/TomsHardwareFrance\/","article_published_time":"2011-06-30T16:40:01+00:00","article_modified_time":"2023-06-22T17:43:01+00:00","og_image":[{"width":500,"height":669,"url":"https:\/\/www.tomshardware.fr\/content\/uploads\/sites\/3\/2011\/06\/mouse-guts.jpg","type":"image\/jpeg"}],"author":"Pierre Dandumont","twitter_card":"summary_large_image","twitter_creator":"@tomshardware_fr","twitter_site":"@tomshardware_fr","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.tomshardware.fr\/une-souris-modifiee-pour-hacker-un-ordinateur\/#article","isPartOf":{"@id":"https:\/\/www.tomshardware.fr\/une-souris-modifiee-pour-hacker-un-ordinateur\/"},"author":{"name":"Pierre Dandumont","@id":"https:\/\/www.tomshardware.fr\/#\/schema\/person\/17966383cb6059d95d48bbdb852df076"},"headline":"Une souris modifi\u00e9e pour hacker un ordinateur","datePublished":"2011-06-30T16:40:01+00:00","dateModified":"2023-06-22T17:43:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.tomshardware.fr\/une-souris-modifiee-pour-hacker-un-ordinateur\/"},"wordCount":287,"commentCount":0,"publisher":{"@id":"https:\/\/www.tomshardware.fr\/#organization"},"image":{"@id":"https:\/\/www.tomshardware.fr\/une-souris-modifiee-pour-hacker-un-ordinateur\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tomshardware.fr\/content\/uploads\/sites\/3\/2011\/06\/mouse-guts.jpg","articleSection":["Actualit\u00e9","Informatique","Internet & Telecom","P\u00e9riph\u00e9riques","Souris"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.tomshardware.fr\/une-souris-modifiee-pour-hacker-un-ordinateur\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.tomshardware.fr\/une-souris-modifiee-pour-hacker-un-ordinateur\/","url":"https:\/\/www.tomshardware.fr\/une-souris-modifiee-pour-hacker-un-ordinateur\/","name":"Une souris modifi\u00e9e pour hacker un ordinateur","isPartOf":{"@id":"https:\/\/www.tomshardware.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tomshardware.fr\/une-souris-modifiee-pour-hacker-un-ordinateur\/#primaryimage"},"image":{"@id":"https:\/\/www.tomshardware.fr\/une-souris-modifiee-pour-hacker-un-ordinateur\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tomshardware.fr\/content\/uploads\/sites\/3\/2011\/06\/mouse-guts.jpg","datePublished":"2011-06-30T16:40:01+00:00","dateModified":"2023-06-22T17:43:01+00:00","description":"Comment hacker une soci\u00e9t\u00e9 de fa\u00e7on efficace sans p\u00e9n\u00e9trer par le r\u00e9seau ? Avec un peu de social-engineering et une souris modifi\u00e9e.","inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tomshardware.fr\/une-souris-modifiee-pour-hacker-un-ordinateur\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.tomshardware.fr\/une-souris-modifiee-pour-hacker-un-ordinateur\/#primaryimage","url":"https:\/\/www.tomshardware.fr\/content\/uploads\/sites\/3\/2011\/06\/mouse-guts.jpg","contentUrl":"https:\/\/www.tomshardware.fr\/content\/uploads\/sites\/3\/2011\/06\/mouse-guts.jpg","width":500,"height":669},{"@type":"WebSite","@id":"https:\/\/www.tomshardware.fr\/#website","url":"https:\/\/www.tomshardware.fr\/","name":"Tom\u2019s Hardware","description":"Toute l'info hardware et gaming !","publisher":{"@id":"https:\/\/www.tomshardware.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tomshardware.fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.tomshardware.fr\/#organization","name":"Tom\u2019s Hardware","url":"https:\/\/www.tomshardware.fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.tomshardware.fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.tomshardware.fr\/content\/uploads\/sites\/3\/2023\/06\/th.png","contentUrl":"https:\/\/www.tomshardware.fr\/content\/uploads\/sites\/3\/2023\/06\/th.png","width":1000,"height":1000,"caption":"Tom\u2019s Hardware"},"image":{"@id":"https:\/\/www.tomshardware.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/TomsHardwareFrance\/","https:\/\/x.com\/tomshardware_fr"]},{"@type":"Person","@id":"https:\/\/www.tomshardware.fr\/#\/schema\/person\/17966383cb6059d95d48bbdb852df076","name":"Pierre Dandumont","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.tomshardware.fr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a08bb358c2a9fc36265e8f3225c5de08?s=64&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a08bb358c2a9fc36265e8f3225c5de08?s=64&d=mm&r=g","caption":"Pierre Dandumont"},"url":"https:\/\/www.tomshardware.fr\/author\/pierre-dandumont\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tomshardware.fr\/wp-json\/wp\/v2\/posts\/183719"}],"collection":[{"href":"https:\/\/www.tomshardware.fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tomshardware.fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tomshardware.fr\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tomshardware.fr\/wp-json\/wp\/v2\/comments?post=183719"}],"version-history":[{"count":1,"href":"https:\/\/www.tomshardware.fr\/wp-json\/wp\/v2\/posts\/183719\/revisions"}],"predecessor-version":[{"id":818285,"href":"https:\/\/www.tomshardware.fr\/wp-json\/wp\/v2\/posts\/183719\/revisions\/818285"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tomshardware.fr\/wp-json\/wp\/v2\/media\/183720"}],"wp:attachment":[{"href":"https:\/\/www.tomshardware.fr\/wp-json\/wp\/v2\/media?parent=183719"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tomshardware.fr\/wp-json\/wp\/v2\/categories?post=183719"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tomshardware.fr\/wp-json\/wp\/v2\/tags?post=183719"},{"taxonomy":"hubs","embeddable":true,"href":"https:\/\/www.tomshardware.fr\/wp-json\/wp\/v2\/hubs?post=183719"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}