{"id":622,"date":"2022-03-07T15:24:51","date_gmt":"2022-03-07T14:24:51","guid":{"rendered":"http:\/\/scpo-cybersecurityassociation.com\/?p=622"},"modified":"2022-03-07T15:26:21","modified_gmt":"2022-03-07T14:26:21","slug":"10-03-2022-technical-workshop-3-a-la-decouverte-des-bots","status":"publish","type":"post","link":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/2022\/03\/07\/10-03-2022-technical-workshop-3-a-la-decouverte-des-bots\/","title":{"rendered":"10\/03\/2022: Technical Workshop #3 &#8211; A la d\u00e9couverte des bots"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large is-style-default\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"489\" src=\"https:\/\/scpo-cybersecurityassociation.com\/wp-content\/uploads\/2022\/03\/Copie-de-Events-visual-7-1024x489.png\" alt=\"\" class=\"wp-image-623\" srcset=\"https:\/\/scpo-cybersecurityassociation.com\/wp-content\/uploads\/2022\/03\/Copie-de-Events-visual-7-1024x489.png 1024w, https:\/\/scpo-cybersecurityassociation.com\/wp-content\/uploads\/2022\/03\/Copie-de-Events-visual-7-300x143.png 300w, https:\/\/scpo-cybersecurityassociation.com\/wp-content\/uploads\/2022\/03\/Copie-de-Events-visual-7-768x367.png 768w, https:\/\/scpo-cybersecurityassociation.com\/wp-content\/uploads\/2022\/03\/Copie-de-Events-visual-7.png 1256w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Vous vous \u00eates d\u00e9j\u00e0 demand\u00e9 \u00e0 quoi servaient les \u00ab <strong>captchas<\/strong> \u00bb que vous validez souvent sur internet pour \u00ab prouver que vous n\u2019\u00eates pas un bot \u00bb ? Comme si des robots nuisibles \u00e0 nos activit\u00e9s d\u2019humain patrouillaient continuellement internet. Mais qu\u2019en est-il vraiment ? Et si des robots parcourent r\u00e9ellement internet quotidiennement, alors que font-ils et comment sont-ils cr\u00e9es ?<\/p>\n\n\n\n<p>\u00c0 travers ce workshop technique de 2 heures, l\u2019Association de Cybers\u00e9curit\u00e9 de Sciences Po (SCA) vous pr\u00e9sentera en fran\u00e7ais et de mani\u00e8re non-exhaustive les diff\u00e9rents types de bots, leur fonctionnement et leurs objectifs. Nous terminerons sur des applications concr\u00e8tes, dont certaines offensives.Aucune connaissance en informatique n\u2019est n\u00e9cessaire pour cette session !<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-fill\"><a class=\"wp-block-button__link\" href=\"https:\/\/forms.gle\/4F466uPheBcu6uWs8\" target=\"_blank\" rel=\"noreferrer noopener\">Inscription obligatoire<\/a><\/div>\n<\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>RDV 1, place Saint-Thomas d&#8217;Aquin &#8211; C K031 &#8211; \u00e0 10h<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Vous vous \u00eates d\u00e9j\u00e0 demand\u00e9 \u00e0 quoi servaient les \u00ab captchas \u00bb que vous validez souvent sur internet pour \u00ab prouver que vous n\u2019\u00eates pas un bot \u00bb ? Comme si des robots nuisibles \u00e0 nos activit\u00e9s d\u2019humain patrouillaient continuellement internet. Mais qu\u2019en est-il vraiment ? Et si des robots parcourent r\u00e9ellement internet quotidiennement, alors [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":623,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-622","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-events"],"_links":{"self":[{"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/posts\/622","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/comments?post=622"}],"version-history":[{"count":3,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/posts\/622\/revisions"}],"predecessor-version":[{"id":627,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/posts\/622\/revisions\/627"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/media\/623"}],"wp:attachment":[{"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/media?parent=622"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/categories?post=622"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/tags?post=622"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}