{"id":72265,"date":"2018-01-15T15:04:17","date_gmt":"2018-01-15T15:04:17","guid":{"rendered":"https:\/\/www.internetsociety.org\/blog\/2018\/01\/can-ipv4-networks-compromised-via-ipv6\/"},"modified":"2025-11-14T15:15:31","modified_gmt":"2025-11-14T15:15:31","slug":"can-ipv4-networks-compromised-via-ipv6","status":"publish","type":"post","link":"https:\/\/www.internetsociety.org\/fr\/blog\/2018\/01\/can-ipv4-networks-compromised-via-ipv6\/","title":{"rendered":"Les r\u00e9seaux IPv4 peuvent-ils \u00eatre compromis via IPv6?"},"content":{"rendered":"<div class=\"\">Le blog Fox-IT International a r\u00e9cemment publi\u00e9 un article sur la mani\u00e8re dont <a href=\"https:\/\/blog.fox-it.com\/2018\/01\/11\/mitm6-compromising-ipv4-networks-via-ipv6\/\">les r\u00e9seaux IPv4 peuvent \u00eatre compromis via IPv6.<\/a><\/div>\n<div><\/div>\n<p><span class=\"button\"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2018\/01\/can-ipv4-networks-compromised-via-ipv6\/\">Savoir plus en anglais<\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Le blog Fox-IT International a r\u00e9cemment publi\u00e9 un article sur la mani\u00e8re dont les r\u00e9seaux IPv4 peuvent \u00eatre compromis via IPv6. Savoir plus en anglais<\/p>\n","protected":false},"author":863,"featured_media":61749,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[178,6187,185,152,169,4909,4775,183,146],"tags":[6245],"region_news_regions":[6029],"content_category":[6101],"ppma_author":[4054],"class_list":["post-72265","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-securite","category-comment-fonctionne-internet","category-confiance","category-ipv6-fr","category-les-normes-internet-ouvertes","category-renforcer-internet","category-securite-fr","category-technologie","category-deploy360-fr","tag-ipv6","region_news_regions-mondial","content_category-blog-type"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/Deploy360-Billboard_IPv6.jpg",976,338,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/Deploy360-Billboard_IPv6-150x150.jpg",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/Deploy360-Billboard_IPv6-300x104.jpg",300,104,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/Deploy360-Billboard_IPv6-768x266.jpg",768,266,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/Deploy360-Billboard_IPv6.jpg",976,338,false],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/Deploy360-Billboard_IPv6.jpg",976,338,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/Deploy360-Billboard_IPv6.jpg",976,338,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/Deploy360-Billboard_IPv6-250x87.jpg",250,87,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/Deploy360-Billboard_IPv6-600x338.jpg",600,338,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/Deploy360-Billboard_IPv6.jpg",300,104,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/Deploy360-Billboard_IPv6.jpg",400,139,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/Deploy360-Billboard_IPv6.jpg",600,208,false]},"uagb_author_info":{"display_name":"Jan \u017dor\u017e","author_link":"https:\/\/www.internetsociety.org\/fr\/author\/zorz\/"},"uagb_comment_info":0,"uagb_excerpt":"Le blog Fox-IT International a r\u00e9cemment publi\u00e9 un article sur la mani\u00e8re dont les r\u00e9seaux IPv4 peuvent \u00eatre compromis via IPv6. Savoir plus en anglais","authors":[{"term_id":4054,"user_id":863,"is_guest":0,"slug":"zorz","display_name":"Jan \u017dor\u017e","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/02a4833ee14227d3e924b03dd7c8849a4e7d264d7731090722b26a001868354f?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/72265","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/users\/863"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/comments?post=72265"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/72265\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media\/61749"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media?parent=72265"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/categories?post=72265"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/tags?post=72265"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/region_news_regions?post=72265"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/content_category?post=72265"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/ppma_author?post=72265"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}