{"id":1591,"date":"2022-09-13T15:50:00","date_gmt":"2022-09-13T14:50:00","guid":{"rendered":"https:\/\/wp.qongzi.dev\/?p=1591"},"modified":"2023-12-21T15:53:05","modified_gmt":"2023-12-21T14:53:05","slug":"evenement-steakoverflow-2022","status":"publish","type":"post","link":"https:\/\/qongzi.com\/evenement-steakoverflow-2022\/","title":{"rendered":"[\u00c9V\u00c9NEMENT] Steakoverflow 2022"},"content":{"rendered":"\n

\ud83d\udcc5 Le samedi 3 septembre \u00e0 l\u2019ESNA de Bretagne se tenait la deuxi\u00e8me \u00e9dition du Steakoverflow, un \u00e9v\u00e8nement organis\u00e9 par l\u2019association rennaise l\u2019Esn\u2019Hack<\/a>.<\/p>\n\n\n\n

\ud83d\udce2 Notre consultant cybers\u00e9curit\u00e9 Gyver Ferrand a pu pr\u00e9senter une plateforme d\u2019Adversary Emulation<\/em>\/Red team automation<\/em>, sur une base open source et compatible avec les standards du MITRE<\/a>. Cet outil permettra de cr\u00e9er, rejouer ou d\u00e9couvrir des sc\u00e9narios sur des p\u00e9rim\u00e8tres larges. Une \u00e9volution vers une plateforme de recherche de vuln\u00e9rabilit\u00e9s est envisag\u00e9e afin d\u2019am\u00e9liorer ses capacit\u00e9s sur une cible unique. Une repr\u00e9sentation simple d\u2019attack path<\/em> et une visualisation centralis\u00e9e des r\u00e9sultats permettant des actions manuelles sont les axes cl\u00e9s de Gungnir. L\u2019aspect semi-automatis\u00e9 et le renforcement par Machine Learning sont ses forces.\"\"<\/p>\n\n\n\n

\u27a1\ufe0f L\u2019occasion \u00e9galement d\u2019\u00e9changer autour de la m\u00e9thode Principle of Synthetic Intelligence<\/em> qui donnera lieu \u00e0 un article prochainement\u2009! Nous remercions encore l\u2019organisation de nous avoir permis de participer \u00e0 cet \u00e9v\u00e8nement. \ud83d\ude4f<\/p>\n","protected":false},"excerpt":{"rendered":"

Le 03\/09\/22 \u00e0 la deuxi\u00e8me \u00e9dition du Steakoverflow, notre consultant Cyber Gyver a pr\u00e9sent\u00e9 une plateforme d\u2019Adversary Emulation\/Red team automation \u21e9<\/p>\n","protected":false},"author":1,"featured_media":1592,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[19],"tags":[22,40],"meta_box":{"card_category":"Cybers\u00e9curit\u00e9"},"_links":{"self":[{"href":"https:\/\/qongzi.com\/wp-json\/wp\/v2\/posts\/1591"}],"collection":[{"href":"https:\/\/qongzi.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/qongzi.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/qongzi.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/qongzi.com\/wp-json\/wp\/v2\/comments?post=1591"}],"version-history":[{"count":0,"href":"https:\/\/qongzi.com\/wp-json\/wp\/v2\/posts\/1591\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/qongzi.com\/wp-json\/wp\/v2\/media\/1592"}],"wp:attachment":[{"href":"https:\/\/qongzi.com\/wp-json\/wp\/v2\/media?parent=1591"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/qongzi.com\/wp-json\/wp\/v2\/categories?post=1591"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/qongzi.com\/wp-json\/wp\/v2\/tags?post=1591"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}