{"id":128,"date":"2021-09-03T14:30:35","date_gmt":"2021-09-03T12:30:35","guid":{"rendered":"https:\/\/arnaques-location-vacances.com\/?page_id=128"},"modified":"2023-07-24T14:29:47","modified_gmt":"2023-07-24T12:29:47","slug":"elements-techniques","status":"publish","type":"page","link":"https:\/\/www.arnaques-location-vacances.com\/index.php\/elements-techniques\/","title":{"rendered":"D\u00e9tecter le phishing et la fraude sur Internet"},"content":{"rendered":"\n<p><br> Le &#8220;phishing&#8221; est utilis\u00e9 dans de tr\u00e8s nombreux cas d&#8217;arnaques sur internet. <strong>Il est en particulier exploit\u00e9 pour contourner les syst\u00e8mes de paiements des sites de locations de vacances. <\/strong>Typiquement, un annonceur cr\u00e9e une fausse annonces et indique aux potentiels locataires qu&#8217;il recevront &#8220;un email du site&#8221;. Un email est bien envoy\u00e9 &#8230;mais par le fraudeur, imitant ceux de la plate-forme et invitant \u00e0 cliquer sur un lien frauduleux ou \u00e0 faire un paiement par virement sur son compte bancaire. <\/p>\n\n\n\n<h2>A. Qu&#8217;est-ce que le &#8220;phishing&#8221; ? <\/h2>\n\n\n\n<p>Pour rappel le &#8220;phishing&#8221; (d\u00e9riv\u00e9 de l&#8217;anglais &#8220;fishing&#8221;, p\u00eache) est une technique qui vise \u00e0 imiter une entit\u00e9 l\u00e9gitime (institution, banque, site e-commerce, etc.) sur diff\u00e9rents supports de communication, en particulier les emails, les SMS et les sites internet. La technique consiste \u00e0 leurrer l&#8217;internaute en imitant l&#8217;entit\u00e9 l\u00e9gitime pour obtenir des donn\u00e9es personnelles : identifiants d&#8217;acc\u00e8s \u00e0 un site, num\u00e9ro de carte bancaire, etc. <strong>Le phishing est \u00e0 l&#8217;origine de 90% des arnaques sur internet. <\/strong><\/p>\n\n\n\n<h2>B. D\u00e9tection du nom de domaine dans une adresse web<\/h2>\n\n\n\n<p><strong>Heureusement d\u00e9tecter les tentatives de phishing est facile &#8230;\u00e0 condition de savoir identifier le &#8220;nom de domaine&#8221; d&#8217;une adresse web<\/strong>.<\/p>\n\n\n\n<p>En effet, un <strong>nom de domaine <\/strong>appartient \u00e0 une entit\u00e9 (personne physique, entreprise, association, gouvernement). Il est tr\u00e8s difficile d&#8217;exploiter de fa\u00e7on frauduleuse le nom de domaine d&#8217;une entit\u00e9 l\u00e9gitime pour cr\u00e9er un site ou une page.<br><br>Dans l&#8217;immense majorit\u00e9 des cas, le fraudeur va donc devoir utiliser des <strong>noms de domaines alternatifs<\/strong>, ressemblant g\u00e9n\u00e9ralement au nom de domaine l\u00e9gitime. <br><br>Un coup d\u2019\u0153il sur le <strong>nom de domaine<\/strong> permet donc de savoir rapidement <strong>si un site ou une adresse e-mail est frauduleux.<\/strong><br><br>Lisez attentivement ce qui suit pour apprendre \u00e0 reconna\u00eetre et distinguer les noms de domaines, sous-domaines et paths (chemins). <\/p>\n\n\n\n<section id=\"f2b409\" class=\"section-f2b409 gutentor-module gutentor-module-accordion\"><div class=\"grid-container\">\n<div id=\"6a30d6\" class=\"wp-block-gutentor-m6-item section-6a30d6 gutentor-module gutentor-module-accordion-item\"><div class=\"gutentor-module-accordion-panel g-a-panel-f2b409\"><div class=\"gm-ah-f2b409 gutentor-module-accordion-item-heading gutentor-module-icon-position-right\"><span class=\"gutentor-module-accordion-panel-handler\" role=\"button\"><span class=\"gutentor-module-accordion-panel-handler-label\"><strong>a. Le nom de domaine<\/strong><\/span><span class=\"gutentor-module-accordion-icon\"><i class=\"gm-aio-f2b409 gutentor-module-accordion-icon-open fas fa-angle-down\"><\/i><i class=\"gm-aic-f2b409 gutentor-module-accordion-icon-close fas fa-angle-up\"><\/i><\/span><\/span><\/div><div class=\"gm-ab-f2b409 gutentor-module-accordion-body\">\n<div id=\"section-g4907b1\" class=\"wp-block-gutentor-e0 section-g4907b1 gutentor-element gutentor-element-advanced-text\"><div class=\"gutentor-text-wrap\"><p class=\"gutentor-text\">Un nom de domaine est un <strong>nom<\/strong> suivi par un <strong>point<\/strong> &#8220;.&#8221; et une <strong>extension<\/strong>, utilis\u00e9 pour nommer un site, par exemple :<\/p><\/div><\/div>\n\n\n\n<div id=\"section-g319a96\" class=\"wp-block-gutentor-e7 section-g319a96 gutentor-element gutentor-element-list\"><ul class=\"grid-row gutentor-grid-item-wrap list-indicator-icon\"><li class=\"gutentor-list-item grid-lg-12 grid-md-12 grid-12\"><span class=\"gutentor-single-item gutentor-single-item-0\"><span class=\"gutentor-list-item-wrap g-s-list-wrap g-s-list-i-icon\"><span class=\"gutentor-single-list-item-icon\"><i class=\"list-item-icon fas fa-arrow-circle-right\"><\/i><\/span><span class=\"gutentor-list-item\"><p class=\"gutentor-single-item-title\"><span class=\"has-inline-color has-black-color\">&#8220;<strong>med<strong>iavacances<\/strong>.<strong>com<\/strong><\/strong>&#8220;<\/span><\/p><\/span><\/span><\/span><\/li><\/ul><\/div>\n<\/div><\/div><\/div>\n\n\n\n<div id=\"d93720\" class=\"wp-block-gutentor-m6-item section-d93720 gutentor-module gutentor-module-accordion-item\"><div class=\"gutentor-module-accordion-panel g-a-panel-f2b409\"><div class=\"gm-ah-f2b409 gutentor-module-accordion-item-heading gutentor-module-icon-position-right\"><span class=\"gutentor-module-accordion-panel-handler\" role=\"button\"><span class=\"gutentor-module-accordion-panel-handler-label\"><strong>b. Les sous-domaines <\/strong><\/span><span class=\"gutentor-module-accordion-icon\"><i class=\"gm-aio-f2b409 gutentor-module-accordion-icon-open fas fa-angle-down\"><\/i><i class=\"gm-aic-f2b409 gutentor-module-accordion-icon-close fas fa-angle-up\"><\/i><\/span><\/span><\/div><div class=\"gm-ab-f2b409 gutentor-module-accordion-body\">\n<div id=\"section-g67ac2b\" class=\"wp-block-gutentor-e0 section-g67ac2b gutentor-element gutentor-element-advanced-text\"><div class=\"gutentor-text-wrap\"><p class=\"gutentor-text\">Un <strong>sous-domaine<\/strong> peut \u00eatre plac\u00e9 <strong>devant le nom<\/strong> de domaine, obligatoirement s\u00e9par\u00e9 par un point &#8220;<strong>.<\/strong>&#8221; comme  :<\/p><\/div><\/div>\n\n\n\n<div id=\"section-g35e486\" class=\"wp-block-gutentor-e7 section-g35e486 gutentor-element gutentor-element-list\"><ul class=\"grid-row gutentor-grid-item-wrap list-indicator-icon\"><li class=\"gutentor-list-item grid-lg-12 grid-md-12 grid-12\"><span class=\"gutentor-single-item gutentor-single-item-0\"><span class=\"gutentor-list-item-wrap g-s-list-wrap g-s-list-i-icon\"><span class=\"gutentor-single-list-item-icon\"><i class=\"list-item-icon fas fa-arrow-circle-right\"><\/i><\/span><span class=\"gutentor-list-item\"><p class=\"gutentor-single-item-title\"><em><span class=\"has-inline-color has-black-color\">&#8220;<strong>pay<\/strong>.mediavacances.com&#8221;<\/span><\/em><\/p><\/span><\/span><\/span><\/li><li class=\"gutentor-list-item grid-lg-12 grid-md-12 grid-12\"><span class=\"gutentor-single-item gutentor-single-item-1\"><span class=\"gutentor-list-item-wrap g-s-list-wrap g-s-list-i-icon\"><span class=\"gutentor-single-list-item-icon\"><i class=\"list-item-icon fas fa-arrow-circle-right\"><\/i><\/span><span class=\"gutentor-list-item\"><p class=\"gutentor-single-item-title\"><em><span class=\"has-inline-color has-black-color\">&#8220;<strong>www.<\/strong>mediavacances.com&#8221;<\/span><\/em><\/p><\/span><\/span><\/span><\/li><\/ul><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p>Les sous-domaines peuvent en contenir d&#8217;autres, toujours s\u00e9par\u00e9s par des points &#8220;.&#8221;.<\/p>\n\n\n\n<p>Exemple :<\/p>\n\n\n\n<div id=\"section-gfa13a5\" class=\"wp-block-gutentor-e7 section-gfa13a5 gutentor-element gutentor-element-list\"><ul class=\"grid-row gutentor-grid-item-wrap list-indicator-icon\"><li class=\"gutentor-list-item grid-lg-12 grid-md-12 grid-12\"><span class=\"gutentor-single-item gutentor-single-item-0\"><span class=\"gutentor-list-item-wrap g-s-list-wrap g-s-list-i-icon\"><span class=\"gutentor-single-list-item-icon\"><i class=\"list-item-icon fas fa-arrow-circle-right\"><\/i><\/span><span class=\"gutentor-list-item\"><p class=\"gutentor-single-item-title\"><span class=\"has-inline-color has-black-color\">&#8220;<em>https:\/\/<strong>console<\/strong>.<strong>cloud<\/strong>.google.com<\/em>&#8220;<\/span><\/p><\/span><\/span><\/span><\/li><\/ul><\/div>\n\n\n\n<p><\/p>\n\n\n\n<section id=\"gmaa29cf2\" class=\"wp-block-gutentor-m3 section-gmaa29cf2 gutentor-module gutentor-container-cover has-color-bg has-custom-bg\"><div class=\"grid-container\">\n<p><i class=\"fas fa-circle-info\"><\/i><strong> Relation d&#8217;appartenance <\/strong><br><br>Les noms de domaines et sous-domaines se lisent de <strong>gauche \u00e0 droite<\/strong> avec une <strong>signification d&#8217;appartenance<\/strong> donn\u00e9e par le point &#8220;<strong>.<\/strong>&#8220;. Ainsi l&#8217;exemple ci-dessus doit se lire : &#8220;console&#8221; appartient \u00e0 &#8220;cloud&#8221; qui appartient \u00e0 &#8220;google,&#8221; qui appartient aux domaines en &#8220;.com&#8221;.<br><br><strong>Puisque les sous-domaines appartiennent au nom de domaine, si ce dernier est l\u00e9gitime, les sous-domaines le sont aussi. <\/strong><\/p>\n<\/div><\/section>\n\n\n\n<p>  <\/p>\n<\/div><\/div><\/div>\n\n\n\n<div id=\"e9c794\" class=\"wp-block-gutentor-m6-item section-e9c794 gutentor-module gutentor-module-accordion-item\"><div class=\"gutentor-module-accordion-panel g-a-panel-f2b409\"><div class=\"gm-ah-f2b409 gutentor-module-accordion-item-heading gutentor-module-icon-position-right\"><span class=\"gutentor-module-accordion-panel-handler\" role=\"button\"><span class=\"gutentor-module-accordion-panel-handler-label\"><strong>c. Le chemin (&#8220;path&#8221;)<\/strong><\/span><span class=\"gutentor-module-accordion-icon\"><i class=\"gm-aio-f2b409 gutentor-module-accordion-icon-open fas fa-angle-down\"><\/i><i class=\"gm-aic-f2b409 gutentor-module-accordion-icon-close fas fa-angle-up\"><\/i><\/span><\/span><\/div><div class=\"gm-ab-f2b409 gutentor-module-accordion-body\">\n<div id=\"section-g030484\" class=\"wp-block-gutentor-e0 section-g030484 gutentor-element gutentor-element-advanced-text\"><div class=\"gutentor-text-wrap\"><p class=\"gutentor-text\">Le chemin (&#8220;path&#8221; en anglais), c&#8217;est-\u00e0-dire le reste de l&#8217;adresse qui suit le nom de domaine et commence par un &#8220;\/&#8221;, indique <strong>le chemin pr\u00e9cis de la page<\/strong> au sein du domaine et \u00e9ventuellement du sous-domaine.<br><br>Par exemple :<\/p><\/div><\/div>\n\n\n\n<div id=\"section-g5439eb\" class=\"wp-block-gutentor-e7 section-g5439eb gutentor-element gutentor-element-list\"><ul class=\"grid-row gutentor-grid-item-wrap list-indicator-icon\"><li class=\"gutentor-list-item grid-lg-12 grid-md-12 grid-12\"><span class=\"gutentor-single-item gutentor-single-item-0\"><span class=\"gutentor-list-item-wrap g-s-list-wrap g-s-list-i-icon\"><span class=\"gutentor-single-list-item-icon\"><i class=\"list-item-icon fas fa-arrow-alt-circle-right\"><\/i><\/span><span class=\"gutentor-list-item\"><p class=\"gutentor-single-item-title\">&#8220;<em><span class=\"has-inline-color has-black-color\">https:\/\/www.mediavacances.com\/<strong>locations-vacances-promotion.php<\/strong><\/span>&#8220;<\/em><\/p><\/span><\/span><\/span><\/li><\/ul><\/div>\n\n\n\n<p><br>indique que le navigateur doit trouver la page &#8220;<strong>locations-vacances-promotion.php<\/strong>&#8221; dans &#8220;<strong>www<\/strong>&#8221; qui appartient \u00e0 &#8220;<strong>mediavacances.com<\/strong>&#8220;.<\/p>\n\n\n\n<p>Le chemin appartient au nom de domaine. Il ne permet pas de d\u00e9finir la l\u00e9gitimit\u00e9 d&#8217;une adresse web.<\/p>\n<\/div><\/div><\/div>\n<\/div><\/section>\n\n\n\n<p><\/p>\n\n\n\n<h2>C. Seul le nom de domaine permet d&#8217;identifier un site frauduleux<\/h2>\n\n\n\n<p>Il faut se souvenir <strong>que seul le nom de domaine permet de d\u00e9tecter un site frauduleux<\/strong>. Le reste de l&#8217;url (les sous-domaines et le chemin) n&#8217;ont pas de valeur discriminante. N\u00e9anmoins, nous expliquons plus bas qu&#8217;ils peuvent \u00eatre utilis\u00e9s par les cybercriminels pour induire leurs victimes en erreur. <br><br><\/p>\n\n\n\n<section id=\"gmca615bd\" class=\"wp-block-gutentor-m3 section-gmca615bd gutentor-module gutentor-container-cover has-color-bg has-custom-bg\"><div class=\"grid-container\">\n<p>Avant de cliquer sur un lien contenu dans un email ou une page web, v\u00e9rifiez syst\u00e9matiquement le nom de domaine dans l&#8217;url du lien. Il suffit de passer la souris sur le lien sans cliquer, l&#8217;adresse apparait alors en bas du navigateur. <br><br>Lorsque vous \u00eates sur un site web, v\u00e9rifiez le nom de domaine dans la barre d&#8217;adresse du navigateur. <\/p>\n<\/div><\/section>\n\n\n\n<p><\/p>\n\n\n\n<h2>D. La cr\u00e9ation de noms de domaines frauduleux<\/h2>\n\n\n\n<p>Comme nous l&#8217;avons vu, les fraudeurs <strong>ne peuvent pas<\/strong> utiliser les <strong>noms de domaine l\u00e9gitimes<\/strong> comme<strong> &#8220;<a href=\"https:\/\/www.mediavacancs.com\">mediavacances.com<\/a><\/strong>&#8220;, &#8220;<strong><a href=\"http:\/\/airbnb.com\">airbnb.com<\/a><\/strong>&#8221; ou encore &#8220;<strong>societegenerale.fr<\/strong>&#8221; pour cr\u00e9er un site web. Ils doivent donc utiliser des noms de domaines diff\u00e9rents tout en induisant en erreur l&#8217;utilisateur \u00e0 l&#8217;aide de certaines techniques list\u00e9es ci-dessous :<\/p>\n\n\n\n<section id=\"3f330b\" class=\"section-3f330b gutentor-module gutentor-module-accordion\"><div class=\"grid-container\">\n<div id=\"956539\" class=\"wp-block-gutentor-m6-item section-956539 gutentor-module gutentor-module-accordion-item\"><div class=\"gutentor-module-accordion-panel g-a-panel-3f330b\"><div class=\"gm-ah-3f330b gutentor-module-accordion-item-heading gutentor-module-icon-position-right\"><span class=\"gutentor-module-accordion-panel-handler\" role=\"button\"><span class=\"gutentor-module-accordion-panel-handler-label\"><strong> 1. <\/strong> Nom de domaine ressemblant au nom de domaine l\u00e9gitime<\/span><span class=\"gutentor-module-accordion-icon\"><i class=\"gm-aio-3f330b gutentor-module-accordion-icon-open fas fa-angle-down\"><\/i><i class=\"gm-aic-3f330b gutentor-module-accordion-icon-close fas fa-angle-up\"><\/i><\/span><\/span><\/div><div class=\"gm-ab-3f330b gutentor-module-accordion-body\">\n<div id=\"section-gb07464\" class=\"wp-block-gutentor-e0 section-gb07464 gutentor-element gutentor-element-advanced-text\"><div class=\"gutentor-text-wrap\"><p class=\"gutentor-text\">Les cybercriminels utiliseront les techniques suivantes pour imiter le nom de domaine l\u00e9gitime :<\/p><\/div><\/div>\n\n\n\n<div id=\"section-ga51648\" class=\"wp-block-gutentor-e7 section-ga51648 gutentor-element gutentor-element-list\"><ul class=\"grid-row gutentor-grid-item-wrap list-indicator-icon\"><li class=\"gutentor-list-item grid-lg-12 grid-md-12 grid-12\"><span class=\"gutentor-single-item gutentor-single-item-0\"><span class=\"gutentor-list-item-wrap g-s-list-wrap\"><span class=\"gutentor-single-list-item-icon\"><i class=\"list-item-icon fas fa-arrow-alt-circle-right\"><\/i><\/span><span class=\"gutentor-list-item\"><p class=\"gutentor-single-item-title\">Un <strong>tiret<\/strong> <strong>&#8220;-&#8220;<\/strong> (seul caract\u00e8re sp\u00e9cial autoris\u00e9 dans un nom de domaine) : &#8220;media<strong>&#8211;<\/strong>vacances.com&#8221; ou &#8220;societe<strong>&#8211;<\/strong>generale.fr&#8221;<\/p><\/span><\/span><\/span><\/li><li class=\"gutentor-list-item grid-lg-12 grid-md-12 grid-12\"><span class=\"gutentor-single-item gutentor-single-item-1\"><span class=\"gutentor-list-item-wrap g-s-list-wrap\"><span class=\"gutentor-single-list-item-icon\"><i class=\"list-item-icon fas fa-arrow-alt-circle-right\"><\/i><\/span><span class=\"gutentor-list-item\"><p class=\"gutentor-single-item-title\">Une <strong>autre extension<\/strong> : &#8220;mediavacances.<strong>net<\/strong>&#8221; ou &#8220;airbnb.<strong>travel<\/strong>&#8220;,<\/p><\/span><\/span><\/span><\/li><li class=\"gutentor-list-item grid-lg-12 grid-md-12 grid-12\"><span class=\"gutentor-single-item gutentor-single-item-2\"><span class=\"gutentor-list-item-wrap g-s-list-wrap\"><span class=\"gutentor-single-list-item-icon\"><i class=\"list-item-icon fas fa-arrow-alt-circle-right\"><\/i><\/span><span class=\"gutentor-list-item\"><p class=\"gutentor-single-item-title\">Des <strong>chiffres<\/strong> : &#8220;mediavacances<strong>2<\/strong>.com&#8221;<\/p><\/span><\/span><\/span><\/li><li class=\"gutentor-list-item grid-lg-12 grid-md-12 grid-12\"><span class=\"gutentor-single-item gutentor-single-item-3\"><span class=\"gutentor-list-item-wrap g-s-list-wrap\"><span class=\"gutentor-single-list-item-icon\"><i class=\"list-item-icon fas fa-arrow-alt-circle-right\"><\/i><\/span><span class=\"gutentor-list-item\"><p class=\"gutentor-single-item-title\">\u00e9ventuellement des caract\u00e8res accentu\u00e9s<\/p><\/span><\/span><\/span><\/li><li class=\"gutentor-list-item grid-lg-12 grid-md-12 grid-12\"><span class=\"gutentor-single-item gutentor-single-item-4\"><span class=\"gutentor-list-item-wrap g-s-list-wrap\"><span class=\"gutentor-single-list-item-icon\"><i class=\"list-item-icon fas fa-arrow-alt-circle-right\"><\/i><\/span><span class=\"gutentor-list-item\"><p class=\"gutentor-single-item-title\">Ou en <strong>supprimant\/ajoutant\/rempla\u00e7ant<\/strong> certaines lettres :<strong>&#8220;airbandb<\/strong>.com&#8221;, &#8220;<strong>airbb<\/strong>.com&#8221;, &#8220;<strong>mediavacance<\/strong>.com&#8221;, etc<\/p><\/span><\/span><\/span><\/li><\/ul><\/div>\n<\/div><\/div><\/div>\n\n\n\n<div id=\"cce6bb\" class=\"wp-block-gutentor-m6-item section-cce6bb gutentor-module gutentor-module-accordion-item\"><div class=\"gutentor-module-accordion-panel g-a-panel-3f330b\"><div class=\"gm-ah-3f330b gutentor-module-accordion-item-heading gutentor-module-icon-position-right\"><span class=\"gutentor-module-accordion-panel-handler\" role=\"button\"><span class=\"gutentor-module-accordion-panel-handler-label\"><strong>2.  <\/strong>Utilisation de sous-domaines <\/span><span class=\"gutentor-module-accordion-icon\"><i class=\"gm-aio-3f330b gutentor-module-accordion-icon-open fas fa-angle-down\"><\/i><i class=\"gm-aic-3f330b gutentor-module-accordion-icon-close fas fa-angle-up\"><\/i><\/span><\/span><\/div><div class=\"gm-ab-3f330b gutentor-module-accordion-body\">\n<div id=\"section-gc39c85\" class=\"wp-block-gutentor-e0 section-gc39c85 gutentor-element gutentor-element-advanced-text\"><div class=\"gutentor-text-wrap\"><p class=\"gutentor-text\">Pour rappel, les sous-domaines  appartiennent au nom de domaine. Si ce dernier est frauduleux, les sous-domaines le seront aussi. Les sous-domaines sont souvent utilis\u00e9s pour introduire une r\u00e9f\u00e9rence au nom de domaine l\u00e9gitime.  <br><br>Prenons cet exemple :<\/p><\/div><\/div>\n\n\n\n<div id=\"section-g74cadf\" class=\"wp-block-gutentor-e7 section-g74cadf gutentor-element gutentor-element-list\"><ul class=\"grid-row gutentor-grid-item-wrap list-indicator-icon\"><li class=\"gutentor-list-item grid-lg-12 grid-md-12 grid-12\"><span class=\"gutentor-single-item gutentor-single-item-0\"><span class=\"gutentor-list-item-wrap g-s-list-wrap\"><span class=\"gutentor-single-list-item-icon\"><i class=\"list-item-icon fas fa-arrow-alt-circle-right\"><\/i><\/span><span class=\"gutentor-list-item\"><p class=\"gutentor-single-item-title\">&#8220;<em>https:\/\/<span class=\"has-inline-color has-vivid-red-color\"><strong>societegenerale<\/strong>.<strong>fr<\/strong><\/span>.euro-bankin.ru\/login.html<\/em>&#8220;<\/p><\/span><\/span><\/span><\/li><\/ul><\/div>\n\n\n\n<p><br>Le nom de domaine russe &#8220;euro-bankin.ru&#8221; est vraisemblablement frauduleux. Les sous-domaines &#8220;<strong>fr<\/strong>&#8221; et &#8220;<strong>societegenerale<\/strong>&#8221; ont \u00e9t\u00e9 cr\u00e9\u00e9s par son propri\u00e9taire pour afficher &#8220;societegenerale.fr&#8221; et faire croire \u00e0 un site internet l\u00e9gitime.<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div id=\"94b87e\" class=\"wp-block-gutentor-m6-item section-94b87e gutentor-module gutentor-module-accordion-item\"><div class=\"gutentor-module-accordion-panel g-a-panel-3f330b\"><div class=\"gm-ah-3f330b gutentor-module-accordion-item-heading gutentor-module-icon-position-right\"><span class=\"gutentor-module-accordion-panel-handler\" role=\"button\"><span class=\"gutentor-module-accordion-panel-handler-label\"><strong>3. <\/strong>Utilisation du &#8220;chemin&#8221; <\/span><span class=\"gutentor-module-accordion-icon\"><i class=\"gm-aio-3f330b gutentor-module-accordion-icon-open fas fa-angle-down\"><\/i><i class=\"gm-aic-3f330b gutentor-module-accordion-icon-close fas fa-angle-up\"><\/i><\/span><\/span><\/div><div class=\"gm-ab-3f330b gutentor-module-accordion-body\">\n<div id=\"section-g35691c\" class=\"wp-block-gutentor-e0 section-g35691c gutentor-element gutentor-element-advanced-text\"><div class=\"gutentor-text-wrap\"><p class=\"gutentor-text\">Ici c&#8217;est le <strong>chemin,<\/strong> c&#8217;est-\u00e0-dire la partie de l&#8217;adresse <strong>qui est \u00e0 droite du nom de domaine<\/strong> apr\u00e8s le premier slash &#8220;\/&#8221;, qui est utilis\u00e9e pour induire l&#8217;internaute en erreur :<\/p><\/div><\/div>\n\n\n\n<div id=\"section-ga3ff02\" class=\"wp-block-gutentor-e7 section-ga3ff02 gutentor-element gutentor-element-list\"><ul class=\"grid-row gutentor-grid-item-wrap list-indicator-icon\"><li class=\"gutentor-list-item grid-lg-12 grid-md-12 grid-12\"><span class=\"gutentor-single-item gutentor-single-item-0\"><span class=\"gutentor-list-item-wrap g-s-list-wrap\"><span class=\"gutentor-single-list-item-icon\"><i class=\"list-item-icon fas fa-arrow-alt-circle-right\"><\/i><\/span><span class=\"gutentor-list-item\"><p class=\"gutentor-single-item-title\">&#8220;<em>http:\/\/euro-bankin.ru\/<strong><span class=\"has-inline-color has-vivid-red-color\">societegenerale_fr<\/span><\/strong>\/login.html<\/em>&#8220;<\/p><\/span><\/span><\/span><\/li><\/ul><\/div>\n<\/div><\/div><\/div>\n<\/div><\/section>\n\n\n\n<p><span class=\"has-inline-color has-black-color\"><span class=\"has-inline-color has-black-color\"><\/span><\/span><\/p>\n\n\n\n<section id=\"gm90581dc\" class=\"wp-block-gutentor-m3 section-gm90581dc gutentor-module gutentor-container-cover has-color-bg has-custom-bg\"><div class=\"grid-container\">\n<p><strong><i class=\"fas fa-bell\"><\/i> Rappel <\/strong><br><br><strong>Pour se pr\u00e9munir efficacement contre les sites de phishing, il suffit de s&#8217;assurer que le nom de domaine du site (ou du lien qui y pointe) est exactement celui du site l\u00e9gitime.<\/strong><\/p>\n<\/div><\/section>\n\n\n\n<h2>E. Utiliser le nom de domaine pour \u00e9valuer la l\u00e9gitimit\u00e9 d&#8217;un email <\/h2>\n\n\n\n<div class=\"wp-block-columns\">\n<div class=\"wp-block-column\" style=\"flex-basis:100%\">\n<p>Savoir identifier un nom de domaine sert aussi \u00e0 se pr\u00e9munir contre les <strong>emails de phishing<\/strong>. <\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<section id=\"fc2b20\" class=\"section-fc2b20 gutentor-module gutentor-module-accordion\"><div class=\"grid-container\">\n<div id=\"b08ee0\" class=\"wp-block-gutentor-m6-item section-b08ee0 gutentor-module gutentor-module-accordion-item\"><div class=\"gutentor-module-accordion-panel g-a-panel-fc2b20\"><div class=\"gm-ah-fc2b20 gutentor-module-accordion-item-heading gutentor-module-icon-position-right\"><span class=\"gutentor-module-accordion-panel-handler\" role=\"button\"><span class=\"gutentor-module-accordion-panel-handler-label\">1. Les \u00e9l\u00e9ments de l&#8217;exp\u00e9diteur<\/span><span class=\"gutentor-module-accordion-icon\"><i class=\"gm-aio-fc2b20 gutentor-module-accordion-icon-open fas fa-angle-down\"><\/i><i class=\"gm-aic-fc2b20 gutentor-module-accordion-icon-close fas fa-angle-up\"><\/i><\/span><\/span><\/div><div class=\"gm-ab-fc2b20 gutentor-module-accordion-body\">\n<div id=\"section-g0c6e1c\" class=\"wp-block-gutentor-e0 section-g0c6e1c gutentor-element gutentor-element-advanced-text\"><div class=\"gutentor-text-wrap\"><p class=\"gutentor-text\">L&#8217;adresse de l&#8217;exp\u00e9diteur est compos\u00e9e de 2 \u00e9l\u00e9ments : <\/p><\/div><\/div>\n\n\n\n<div id=\"section-gf10940\" class=\"wp-block-gutentor-e7 section-gf10940 gutentor-element gutentor-element-list\"><ul class=\"grid-row gutentor-grid-item-wrap list-indicator-icon\"><li class=\"gutentor-list-item grid-lg-12 grid-md-12 grid-12\"><span class=\"gutentor-single-item gutentor-single-item-0\"><span class=\"gutentor-list-item-wrap g-s-list-wrap\"><span class=\"gutentor-single-list-item-icon\"><i class=\"list-item-icon fas fa-arrow-alt-circle-right\"><\/i><\/span><span class=\"gutentor-list-item\"><p class=\"gutentor-single-item-title\">Le <strong>nom<\/strong> de l&#8217;exp\u00e9diteur, par ex. &#8220;<strong>Locations Airbnb<\/strong>&#8220;,<br><br>C&#8217;est souvent la seule donn\u00e9e affich\u00e9e par d\u00e9faut dans les boite de r\u00e9ception des logiciels de messagerie. Ce nom peut \u00eatre librement d\u00e9fini par l&#8217;exp\u00e9diteur. Ces deux caract\u00e9ristiques font qu&#8217;il est syst\u00e9matiquement utilis\u00e9 pour tromper l&#8217;internaute. <\/p><\/span><\/span><\/span><\/li><li class=\"gutentor-list-item grid-lg-12 grid-md-12 grid-12\"><span class=\"gutentor-single-item gutentor-single-item-1\"><span class=\"gutentor-list-item-wrap g-s-list-wrap\"><span class=\"gutentor-single-list-item-icon\"><i class=\"list-item-icon fas fa-arrow-alt-circle-right\"><\/i><\/span><span class=\"gutentor-list-item\"><p class=\"gutentor-single-item-title\">L&#8217;<strong>adresse email<\/strong> par ex. &#8220;<strong><strong>airbnb-booking<\/strong>@<strong>gmail.com<\/strong><\/strong>&#8220;<br><br>C&#8217;est la partie la plus int\u00e9ressante. Elle s&#8217;affichera souvent que lorsque l&#8217;on clique sur le sujet de l&#8217;email dans la boite de r\u00e9ception. <br><br> L&#8217;adresse email est compos\u00e9 de deux parties : <br><br>&#8211; Le <strong>nom de l&#8217;utilisateur<\/strong> (user) avant le @,  &#8220;<strong><strong>airbnb-booking<\/strong><\/strong>&#8221; dans l&#8217;exemple ci-dessus,<br>&#8211; Le <strong>nom de domaine<\/strong> apr\u00e8s le @, &#8221; <strong><strong>mail.com<\/strong><\/strong>&#8221; dans l&#8217;exemple ci-dessus.<br><br>C&#8217;est le nom de domaine qui nous int\u00e9resse. On verra plus bas comment il peut \u00eatre utilis\u00e9 pour d\u00e9tecter les emails de phishing. <\/p><\/span><\/span><\/span><\/li><\/ul><\/div>\n\n\n\n<p><br>Dans cet exemple, nous avons donc l&#8217;adresse compl\u00e8te suivante : <\/p>\n\n\n\n<div id=\"section-ge5062f\" class=\"wp-block-gutentor-e7 section-ge5062f gutentor-element gutentor-element-list\"><ul class=\"grid-row gutentor-grid-item-wrap list-indicator-icon\"><li class=\"gutentor-list-item grid-lg-12 grid-md-12 grid-12\"><span class=\"gutentor-single-item gutentor-single-item-0\"><span class=\"gutentor-list-item-wrap g-s-list-wrap\"><span class=\"gutentor-single-list-item-icon\"><i class=\"list-item-icon fas fa-arrow-alt-circle-right\"><\/i><\/span><span class=\"gutentor-list-item\"><p class=\"gutentor-single-item-title\">&#8220;Locations Airbnb&#8221;             <strong>airbnb-booking@gmail.com<\/strong><\/p><\/span><\/span><\/span><\/li><\/ul><\/div>\n\n\n\n<p><br>NB : Nous verrons plus bas que cet exp\u00e9diteur indique<strong> un e-mail<strong> frauduleux<\/strong>, <\/strong>car le nom de domaine du serveur (&#8220;gmail.com&#8221;) n&#8217;est pas celui de l&#8217;entit\u00e9 l\u00e9gitime (&#8220;airbnb.com&#8221;). <\/p>\n\n\n\n<p><\/p>\n\n\n\n<section id=\"gm7c1396e\" class=\"wp-block-gutentor-m3 section-gm7c1396e gutentor-module gutentor-container-cover has-color-bg has-custom-bg\"><div class=\"grid-container\">\n<p>Lorsque l&#8217;on \u00e9value la l\u00e9gitimit\u00e9 de l&#8217;exp\u00e9diteur d&#8217;un email, seul le nom de domaine de l&#8217;adresse email doit \u00eatre pris en compte. <\/p>\n<\/div><\/section>\n<\/div><\/div><\/div>\n\n\n\n<div id=\"0aac55\" class=\"wp-block-gutentor-m6-item section-0aac55 gutentor-module gutentor-module-accordion-item\"><div class=\"gutentor-module-accordion-panel g-a-panel-fc2b20\"><div class=\"gm-ah-fc2b20 gutentor-module-accordion-item-heading gutentor-module-icon-position-right\"><span class=\"gutentor-module-accordion-panel-handler\" role=\"button\"><span class=\"gutentor-module-accordion-panel-handler-label\">2. Comment utiliser le  nom de domaine pour d\u00e9tecter les emails de phishing ?<\/span><span class=\"gutentor-module-accordion-icon\"><i class=\"gm-aio-fc2b20 gutentor-module-accordion-icon-open fas fa-angle-down\"><\/i><i class=\"gm-aic-fc2b20 gutentor-module-accordion-icon-close fas fa-angle-up\"><\/i><\/span><\/span><\/div><div class=\"gm-ab-fc2b20 gutentor-module-accordion-body\">\n<div id=\"section-gab324e\" class=\"wp-block-gutentor-e0 section-gab324e gutentor-element gutentor-element-advanced-text\"><div class=\"gutentor-text-wrap\"><p class=\"gutentor-text\">Le nom de domaine des adresses email des exp\u00e9diteurs d&#8217;emails de phishing peuvent \u00eatre : <\/p><\/div><\/div>\n\n\n\n<div id=\"section-g5dfc97\" class=\"wp-block-gutentor-e7 section-g5dfc97 gutentor-element gutentor-element-list\"><ul class=\"grid-row gutentor-grid-item-wrap list-indicator-icon\"><li class=\"gutentor-list-item grid-lg-12 grid-md-12 grid-12\"><span class=\"gutentor-single-item gutentor-single-item-0\"><span class=\"gutentor-list-item-wrap g-s-list-wrap\"><span class=\"gutentor-single-list-item-icon\"><i class=\"list-item-icon fas fa-arrow-alt-circle-right\"><\/i><\/span><span class=\"gutentor-list-item\"><p class=\"gutentor-single-item-title\"><strong>Des noms de domaine de services emails (Gmail, Orange.fr etc.)<\/strong><br><br>La plupart des soci\u00e9t\u00e9s et institutions utilisent des adresse email associ\u00e9es \u00e0 leur propre nom de domaine (airbnb.com, mediavacances.com, abritel.fr, etc.). L&#8217;identification du nom de domaine d&#8217;un service de messagerie gratuit dans le cadre d&#8217;un email commercial indique tr\u00e8s souvent un email frauduleux. <br><br>Par exemple : <br><br><span class=\"has-inline-color has-central-palette-8-color\">&#8220;Airbnb&#8221;                                      reservation-airbnb@<strong>gmail.com<\/strong><\/span><\/p><\/span><\/span><\/span><\/li><li class=\"gutentor-list-item grid-lg-12 grid-md-12 grid-12\"><span class=\"gutentor-single-item gutentor-single-item-1\"><span class=\"gutentor-list-item-wrap g-s-list-wrap\"><span class=\"gutentor-single-list-item-icon\"><i class=\"list-item-icon fas fa-arrow-alt-circle-right\"><\/i><\/span><span class=\"gutentor-list-item\"><p class=\"gutentor-single-item-title\"><strong>Des noms de domaine frauduleux <\/strong><br><br>Les cybercriminels utilisent des noms de domaine qui ressemblent aux nom de domaines l\u00e9gitimes en utilisant plusieurs techniques vues plus haut concernant les sites de phishing. <br><br>Quelques exemples avec le nom de l&#8217;exp\u00e9diteur  et l&#8217;adresse email (nom de domaine en gras).<br><br>&#8220;<span class=\"has-inline-color has-central-palette-8-color\">LCL &#8211; Banque et assurance&#8221;               notification-fa@<strong>lcl-pro.fr<\/strong><br>&#8220;Web &lt;Banque Postale> &#8221;                    nepasrepondre@<strong>ns3-banquepostal.com<\/strong><br>&#8220;Amazon Business&#8221;                               infos@<strong>achevelements.fr<\/strong><br>&#8220;Service CHRONOPOST&#8221;                      noreply@<strong>agence-douanepost.fr<\/strong><\/span><br><\/p><\/span><\/span><\/span><\/li><\/ul><\/div>\n<\/div><\/div><\/div>\n\n\n\n<div id=\"8c0806\" class=\"wp-block-gutentor-m6-item section-8c0806 gutentor-module gutentor-module-accordion-item\"><div class=\"gutentor-module-accordion-panel g-a-panel-fc2b20\"><div class=\"gm-ah-fc2b20 gutentor-module-accordion-item-heading gutentor-module-icon-position-right\"><span class=\"gutentor-module-accordion-panel-handler\" role=\"button\"><span class=\"gutentor-module-accordion-panel-handler-label\">3. V\u00e9rifier les liens contenus dans l&#8217;email <\/span><span class=\"gutentor-module-accordion-icon\"><i class=\"gm-aio-fc2b20 gutentor-module-accordion-icon-open fas fa-angle-down\"><\/i><i class=\"gm-aic-fc2b20 gutentor-module-accordion-icon-close fas fa-angle-up\"><\/i><\/span><\/span><\/div><div class=\"gm-ab-fc2b20 gutentor-module-accordion-body\">\n<div id=\"section-g9f276c\" class=\"wp-block-gutentor-e0 section-g9f276c gutentor-element gutentor-element-advanced-text\"><div class=\"gutentor-text-wrap\"><p class=\"gutentor-text\">L&#8217;immense majorit\u00e9 des emails de phishing <strong>visent \u00e0 vous rediriger<\/strong> vers un site de phishing, sur lequel les cybercriminels pourront vous demander de saisir vos donn\u00e9es de connexion, donn\u00e9es bancaires, etc. <br><br><strong>L&#8217;analyse des liens contenus dans un email est donc tr\u00e8s instructive. <\/strong><br><br>Il suffit de : <\/p><\/div><\/div>\n\n\n\n<div id=\"section-g70ccf1\" class=\"wp-block-gutentor-e7 section-g70ccf1 gutentor-element gutentor-element-list\"><ul class=\"grid-row gutentor-grid-item-wrap list-indicator-icon\"><li class=\"gutentor-list-item grid-lg-12 grid-md-12 grid-12\"><span class=\"gutentor-single-item gutentor-single-item-0\"><span class=\"gutentor-list-item-wrap g-s-list-wrap\"><span class=\"gutentor-single-list-item-icon\"><i class=\"list-item-icon fas fa-arrow-right\"><\/i><\/span><span class=\"gutentor-list-item\"><p class=\"gutentor-single-item-title\"><strong>Passer la souris sur les liens les plus visibles* (sans cliquer)<\/strong><br>Les emails de phishing mixent parfois les liens l\u00e9gitimes et les liens frauduleux. Ce sont cependant ces derniers qui sont mis en avant dans l&#8217;email. <\/p><\/span><\/span><\/span><\/li><li class=\"gutentor-list-item grid-lg-12 grid-md-12 grid-12\"><span class=\"gutentor-single-item gutentor-single-item-1\"><span class=\"gutentor-list-item-wrap g-s-list-wrap\"><span class=\"gutentor-single-list-item-icon\"><i class=\"list-item-icon fas fa-arrow-right\"><\/i><\/span><span class=\"gutentor-list-item\"><p class=\"gutentor-single-item-title\"><strong>Localiser le nom de domaine dans l&#8217;URL (voir ci-dessus)<\/strong><\/p><\/span><\/span><\/span><\/li><li class=\"gutentor-list-item grid-lg-12 grid-md-12 grid-12\"><span class=\"gutentor-single-item gutentor-single-item-2\"><span class=\"gutentor-list-item-wrap g-s-list-wrap\"><span class=\"gutentor-single-list-item-icon\"><i class=\"list-item-icon fas fa-arrow-right\"><\/i><\/span><span class=\"gutentor-list-item\"><p class=\"gutentor-single-item-title\"><strong>V\u00e9rifier que que le nom de domaine est exactement le m\u00eame que celui de l&#8217;entit\u00e9 l\u00e9gitime<\/strong><br>Si ce n&#8217;est pas le cas, il s&#8217;agit d&#8217;un email de phishing. <\/p><\/span><\/span><\/span><\/li><\/ul><\/div>\n<\/div><\/div><\/div>\n\n\n\n<div id=\"f1d7b9\" class=\"wp-block-gutentor-m6-item section-f1d7b9 gutentor-module gutentor-module-accordion-item\"><div class=\"gutentor-module-accordion-panel g-a-panel-fc2b20\"><div class=\"gm-ah-fc2b20 gutentor-module-accordion-item-heading gutentor-module-icon-position-right\"><span class=\"gutentor-module-accordion-panel-handler\" role=\"button\"><span class=\"gutentor-module-accordion-panel-handler-label\">4. Exemple d\u2019e-mail avec exp\u00e9diteur et lien frauduleux<\/span><span class=\"gutentor-module-accordion-icon\"><i class=\"gm-aio-fc2b20 gutentor-module-accordion-icon-open fas fa-angle-down\"><\/i><i class=\"gm-aic-fc2b20 gutentor-module-accordion-icon-close fas fa-angle-up\"><\/i><\/span><\/span><\/div><div class=\"gm-ab-fc2b20 gutentor-module-accordion-body\">\n<div id=\"section-ga1c3d9\" class=\"wp-block-gutentor-e0 section-ga1c3d9 gutentor-element gutentor-element-advanced-text\"><div class=\"gutentor-text-wrap\"><p class=\"gutentor-text\">L&#8217;exemple ci-dessous vous pr\u00e9sente un e-mail de phishing bancaire. Un simple contr\u00f4le du <strong>nom de domaine de l&#8217;exp\u00e9diteur<\/strong> (&#8220;client7845bred.fr&#8221;) et <strong>de l&#8217;adresse de destination du lien <\/strong>(&#8220;porjefatkenj.com&#8221;)  permet de d\u00e9tecter facilement un e-mail frauduleux. <\/p><\/div><\/div>\n\n\n\n<div id=\"section-g3b7461\" class=\"wp-block-gutentor-e6 section-g3b7461 gutentor-element gutentor-element-image\"><div class=\"gutentor-element-image-box\"><div class=\"gutentor-image-thumb\"><img class=\"normal-image\" src=\"https:\/\/www.arnaques-location-vacances.com\/wp-content\/uploads\/2021\/09\/Capture-de\u0301cran-2021-08-27-a\u0300-15.18.24-1.jpg\"\/><\/div><\/div><\/div>\n<\/div><\/div><\/div>\n<\/div><\/section>\n<\/div>\n<\/div>\n\n\n\n<h2>E. Le protocole s\u00e9curis\u00e9 &#8220;https&#8221;<\/h2>\n\n\n\n<p><\/p>\n\n\n\n<section id=\"da5a31\" class=\"section-da5a31 gutentor-module gutentor-module-accordion\"><div class=\"grid-container\">\n<div id=\"4203bb\" class=\"wp-block-gutentor-m6-item section-4203bb gutentor-module gutentor-module-accordion-item\"><div class=\"gutentor-module-accordion-panel g-a-panel-da5a31\"><div class=\"gm-ah-da5a31 gutentor-module-accordion-item-heading gutentor-module-icon-position-right\"><span class=\"gutentor-module-accordion-panel-handler\" role=\"button\"><span class=\"gutentor-module-accordion-panel-handler-label\">Qu&#8217;est ce que le protocole &#8220;https&#8221; ?<\/span><span class=\"gutentor-module-accordion-icon\"><i class=\"gm-aio-da5a31 gutentor-module-accordion-icon-open fas fa-angle-down\"><\/i><i class=\"gm-aic-da5a31 gutentor-module-accordion-icon-close fas fa-angle-up\"><\/i><\/span><\/span><\/div><div class=\"gm-ab-da5a31 gutentor-module-accordion-body\">\n<div id=\"section-g41b33e\" class=\"wp-block-gutentor-e0 section-g41b33e gutentor-element gutentor-element-advanced-text\"><div class=\"gutentor-text-wrap\"><p class=\"gutentor-text\">Le &#8220;<strong>https<\/strong>&#8221; est une version s\u00e9curis\u00e9e (&#8220;s&#8221;) du protocole <strong>&#8220;http&#8221;<\/strong> qui permet d&#8217;afficher des pages web. Il permet, en particulier, de crypter les donn\u00e9es envoy\u00e9es par le site et d\u2019authentifier dans une certaine mesure l&#8217;auteur du contenu. <strong>Tous les sites l\u00e9gitimes de location de vacances ont une adresse utilisant le protocole &#8220;https<\/strong>&#8220;. Le protocole apporte une faible protection contre les sites de phishing (voir plus bas). <\/p><\/div><\/div>\n<\/div><\/div><\/div>\n\n\n\n<div id=\"5e87dd\" class=\"wp-block-gutentor-m6-item section-5e87dd gutentor-module gutentor-module-accordion-item\"><div class=\"gutentor-module-accordion-panel g-a-panel-da5a31\"><div class=\"gm-ah-da5a31 gutentor-module-accordion-item-heading gutentor-module-icon-position-right\"><span class=\"gutentor-module-accordion-panel-handler\" role=\"button\"><span class=\"gutentor-module-accordion-panel-handler-label\">Quel est le niveau de risque des sites en &#8220;http&#8221; et &#8220;https&#8221; ?<\/span><span class=\"gutentor-module-accordion-icon\"><i class=\"gm-aio-da5a31 gutentor-module-accordion-icon-open fas fa-angle-down\"><\/i><i class=\"gm-aic-da5a31 gutentor-module-accordion-icon-close fas fa-angle-up\"><\/i><\/span><\/span><\/div><div class=\"gm-ab-da5a31 gutentor-module-accordion-body\">\n<div id=\"section-g09c7cc\" class=\"wp-block-gutentor-e0 section-g09c7cc gutentor-element gutentor-element-advanced-text\"><div class=\"gutentor-text-wrap\"><p class=\"gutentor-text\">L&#8217;utilisation du protocole simple &#8220;http&#8221; est un <strong>indicateur fort d&#8217;un site de phishing<\/strong>. Attention cependant, l&#8217;existence du protocole s\u00e9curis\u00e9 ne garantit pas la l\u00e9gitimit\u00e9 du site. En effet, 60% des sites de phishing parviennent \u00e0 utiliser le protocole https.<br><br>Pour r\u00e9sumer : <\/p><\/div><\/div>\n\n\n\n<section id=\"gm2ebbdb0\" class=\"wp-block-gutentor-m3 section-gm2ebbdb0 gutentor-module gutentor-container-cover has-color-bg has-custom-bg\"><div class=\"grid-container\">\n<div id=\"section-gb7cc15\" class=\"wp-block-gutentor-e7 section-gb7cc15 gutentor-element gutentor-element-list\"><ul class=\"grid-row gutentor-grid-item-wrap list-indicator-icon\"><li class=\"gutentor-list-item grid-lg-12 grid-md-12 grid-12\"><span class=\"gutentor-single-item gutentor-single-item-0\"><span class=\"gutentor-list-item-wrap g-s-list-wrap\"><span class=\"gutentor-single-list-item-icon\"><i class=\"list-item-icon fas fa-arrow-right\"><\/i><\/span><span class=\"gutentor-list-item\"><p class=\"gutentor-single-item-title\"><strong>&#8220;http&#8221; : <span class=\"has-inline-color has-vivid-red-color\">risque important<\/span><\/strong><\/p><\/span><\/span><\/span><\/li><li class=\"gutentor-list-item grid-lg-12 grid-md-12 grid-12\"><span class=\"gutentor-single-item gutentor-single-item-1\"><span class=\"gutentor-list-item-wrap g-s-list-wrap\"><span class=\"gutentor-single-list-item-icon\"><i class=\"list-item-icon fas fa-arrow-right\"><\/i><\/span><span class=\"gutentor-list-item\"><p class=\"gutentor-single-item-title\"><strong>&#8220;https&#8221; : <span class=\"has-inline-color has-luminous-vivid-amber-color\">risque diminu\u00e9 mais existant<\/span><\/strong><\/p><\/span><\/span><\/span><\/li><\/ul><\/div>\n<\/div><\/section>\n<\/div><\/div><\/div>\n\n\n\n<div id=\"528ad5\" class=\"wp-block-gutentor-m6-item section-528ad5 gutentor-module gutentor-module-accordion-item\"><div class=\"gutentor-module-accordion-panel g-a-panel-da5a31\"><div class=\"gm-ah-da5a31 gutentor-module-accordion-item-heading gutentor-module-icon-position-right\"><span class=\"gutentor-module-accordion-panel-handler\" role=\"button\"><span class=\"gutentor-module-accordion-panel-handler-label\">Comment savoir si l\u2019on est en pr\u00e9sence d\u2019un protocole standard ou s\u00e9curis\u00e9 ?<\/span><span class=\"gutentor-module-accordion-icon\"><i class=\"gm-aio-da5a31 gutentor-module-accordion-icon-open fas fa-angle-down\"><\/i><i class=\"gm-aic-da5a31 gutentor-module-accordion-icon-close fas fa-angle-up\"><\/i><\/span><\/span><\/div><div class=\"gm-ab-da5a31 gutentor-module-accordion-body\">\n<div id=\"section-g591188\" class=\"wp-block-gutentor-e0 section-g591188 gutentor-element gutentor-element-advanced-text\"><div class=\"gutentor-text-wrap\"><p class=\"gutentor-text\">Il suffit de regarder la barre d&#8217;adresse du navigateur qui doit afficher &#8220;https&#8221; <strong>et\/ou<\/strong> un cadenas.<\/p><\/div><\/div>\n\n\n\n<div id=\"section-gc724b2\" class=\"wp-block-gutentor-e6 section-gc724b2 gutentor-element gutentor-element-image\"><div class=\"gutentor-element-image-box\"><div class=\"gutentor-image-thumb\"><img class=\"normal-image\" src=\"https:\/\/www.arnaques-location-vacances.com\/wp-content\/uploads\/2021\/09\/Capture-de\u0301cran-2021-09-03-a\u0300-15.34.24-1.jpg\"\/><\/div><\/div><\/div>\n<\/div><\/div><\/div>\n<\/div><\/section>\n\n\n\n<h2>F. Testez vos connaissances !<\/h2>\n\n\n\n<p>Vous avez tout compris ? Bravo. Vous pouvez maintenant <a href=\"https:\/\/www.arnaques-location-vacances.com\/index.php\/testez-vos-connaissances-phishing\/\"><strong>tester vos connaissances sur cette page.<\/strong><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Le &#8220;phishing&#8221; est utilis\u00e9 dans de tr\u00e8s nombreux cas d&#8217;arnaques sur internet. Il est en particulier exploit\u00e9 pour contourner les syst\u00e8mes de paiements des sites de locations de vacances. Typiquement, un annonceur cr\u00e9e une fausse annonces et indique aux potentiels locataires qu&#8217;il recevront &#8220;un email du site&#8221;. Un email est bien envoy\u00e9 &#8230;mais par le&hellip;&nbsp;<a href=\"https:\/\/www.arnaques-location-vacances.com\/index.php\/elements-techniques\/\" class=\"\" rel=\"bookmark\">Lire la suite &raquo;<span class=\"screen-reader-text\">D\u00e9tecter le phishing et la fraude sur Internet<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_eb_attr":"","eb_css":"","neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":""},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>D\u00e9tecter le phishing et la fraude sur Internet - Arnaque location vacances<\/title>\n<meta name=\"description\" content=\"Les \u00e9l\u00e9ments techniques indispensable \u00e0 maitriser pour \u00e9chapper \u00e0 la fraude sur internet : noms de domaine, adresses email, test de connaissances, etc.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.arnaques-location-vacances.com\/index.php\/elements-techniques\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"D\u00e9tecter le phishing et la fraude sur Internet - Arnaque location vacances\" \/>\n<meta property=\"og:description\" content=\"Les \u00e9l\u00e9ments techniques indispensable \u00e0 maitriser pour \u00e9chapper \u00e0 la fraude sur internet : noms de domaine, adresses email, test de connaissances, etc.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.arnaques-location-vacances.com\/index.php\/elements-techniques\/\" \/>\n<meta property=\"og:site_name\" content=\"Stop aux arnaques \u00e0 la location de vacances\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-24T12:29:47+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.arnaques-location-vacances.com\/#organization\",\"name\":\"Stop aux arnaques \u00e0 la location de vacances\",\"url\":\"https:\/\/www.arnaques-location-vacances.com\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.arnaques-location-vacances.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.arnaques-location-vacances.com\/wp-content\/uploads\/2021\/09\/cropped-cropped-logo.gif\",\"contentUrl\":\"https:\/\/www.arnaques-location-vacances.com\/wp-content\/uploads\/2021\/09\/cropped-cropped-logo.gif\",\"width\":250,\"height\":250,\"caption\":\"Stop aux arnaques \u00e0 la location de vacances\"},\"image\":{\"@id\":\"https:\/\/www.arnaques-location-vacances.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.arnaques-location-vacances.com\/#website\",\"url\":\"https:\/\/www.arnaques-location-vacances.com\/\",\"name\":\"Stop aux arnaques \u00e0 la location de vacances\",\"description\":\"Tout ce qu&#039;il faut savoir pour \u00e9chapper \u00e0 la fraude\",\"publisher\":{\"@id\":\"https:\/\/www.arnaques-location-vacances.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.arnaques-location-vacances.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.arnaques-location-vacances.com\/index.php\/elements-techniques\/\",\"url\":\"https:\/\/www.arnaques-location-vacances.com\/index.php\/elements-techniques\/\",\"name\":\"D\u00e9tecter le phishing et la fraude sur Internet - Arnaque location vacances\",\"isPartOf\":{\"@id\":\"https:\/\/www.arnaques-location-vacances.com\/#website\"},\"datePublished\":\"2021-09-03T12:30:35+00:00\",\"dateModified\":\"2023-07-24T12:29:47+00:00\",\"description\":\"Les \u00e9l\u00e9ments techniques indispensable \u00e0 maitriser pour \u00e9chapper \u00e0 la fraude sur internet : noms de domaine, adresses email, test de connaissances, etc.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.arnaques-location-vacances.com\/index.php\/elements-techniques\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.arnaques-location-vacances.com\/index.php\/elements-techniques\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.arnaques-location-vacances.com\/index.php\/elements-techniques\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.arnaques-location-vacances.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"D\u00e9tecter le phishing et la fraude sur Internet\"}]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"D\u00e9tecter le phishing et la fraude sur Internet - Arnaque location vacances","description":"Les \u00e9l\u00e9ments techniques indispensable \u00e0 maitriser pour \u00e9chapper \u00e0 la fraude sur internet : noms de domaine, adresses email, test de connaissances, etc.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.arnaques-location-vacances.com\/index.php\/elements-techniques\/","og_locale":"fr_FR","og_type":"article","og_title":"D\u00e9tecter le phishing et la fraude sur Internet - Arnaque location vacances","og_description":"Les \u00e9l\u00e9ments techniques indispensable \u00e0 maitriser pour \u00e9chapper \u00e0 la fraude sur internet : noms de domaine, adresses email, test de connaissances, etc.","og_url":"https:\/\/www.arnaques-location-vacances.com\/index.php\/elements-techniques\/","og_site_name":"Stop aux arnaques \u00e0 la location de vacances","article_modified_time":"2023-07-24T12:29:47+00:00","twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.arnaques-location-vacances.com\/#organization","name":"Stop aux arnaques \u00e0 la location de vacances","url":"https:\/\/www.arnaques-location-vacances.com\/","sameAs":[],"logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.arnaques-location-vacances.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.arnaques-location-vacances.com\/wp-content\/uploads\/2021\/09\/cropped-cropped-logo.gif","contentUrl":"https:\/\/www.arnaques-location-vacances.com\/wp-content\/uploads\/2021\/09\/cropped-cropped-logo.gif","width":250,"height":250,"caption":"Stop aux arnaques \u00e0 la location de vacances"},"image":{"@id":"https:\/\/www.arnaques-location-vacances.com\/#\/schema\/logo\/image\/"}},{"@type":"WebSite","@id":"https:\/\/www.arnaques-location-vacances.com\/#website","url":"https:\/\/www.arnaques-location-vacances.com\/","name":"Stop aux arnaques \u00e0 la location de vacances","description":"Tout ce qu&#039;il faut savoir pour \u00e9chapper \u00e0 la fraude","publisher":{"@id":"https:\/\/www.arnaques-location-vacances.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.arnaques-location-vacances.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.arnaques-location-vacances.com\/index.php\/elements-techniques\/","url":"https:\/\/www.arnaques-location-vacances.com\/index.php\/elements-techniques\/","name":"D\u00e9tecter le phishing et la fraude sur Internet - Arnaque location vacances","isPartOf":{"@id":"https:\/\/www.arnaques-location-vacances.com\/#website"},"datePublished":"2021-09-03T12:30:35+00:00","dateModified":"2023-07-24T12:29:47+00:00","description":"Les \u00e9l\u00e9ments techniques indispensable \u00e0 maitriser pour \u00e9chapper \u00e0 la fraude sur internet : noms de domaine, adresses email, test de connaissances, etc.","breadcrumb":{"@id":"https:\/\/www.arnaques-location-vacances.com\/index.php\/elements-techniques\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.arnaques-location-vacances.com\/index.php\/elements-techniques\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.arnaques-location-vacances.com\/index.php\/elements-techniques\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.arnaques-location-vacances.com\/"},{"@type":"ListItem","position":2,"name":"D\u00e9tecter le phishing et la fraude sur Internet"}]}]}},"_links":{"self":[{"href":"https:\/\/www.arnaques-location-vacances.com\/index.php\/wp-json\/wp\/v2\/pages\/128"}],"collection":[{"href":"https:\/\/www.arnaques-location-vacances.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.arnaques-location-vacances.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.arnaques-location-vacances.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.arnaques-location-vacances.com\/index.php\/wp-json\/wp\/v2\/comments?post=128"}],"version-history":[{"count":147,"href":"https:\/\/www.arnaques-location-vacances.com\/index.php\/wp-json\/wp\/v2\/pages\/128\/revisions"}],"predecessor-version":[{"id":1428,"href":"https:\/\/www.arnaques-location-vacances.com\/index.php\/wp-json\/wp\/v2\/pages\/128\/revisions\/1428"}],"wp:attachment":[{"href":"https:\/\/www.arnaques-location-vacances.com\/index.php\/wp-json\/wp\/v2\/media?parent=128"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}