{"id":5291,"date":"2017-09-07T06:14:44","date_gmt":"2017-09-07T04:14:44","guid":{"rendered":"https:\/\/news.save.ch\/?p=5291"},"modified":"2023-03-14T08:57:01","modified_gmt":"2023-03-14T07:57:01","slug":"sechs-hacker-methoden","status":null,"type":"post","link":"https:\/\/news.save.ch\/fr\/sechs-hacker-methoden\/","title":{"rendered":"Six m\u00e9thodes de piratage courantes"},"content":{"rendered":"<figure id=\"attachment_5292\" aria-describedby=\"caption-attachment-5292\" style=\"width: 500px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-5292 size-full\" src=\"https:\/\/news.save.ch\/wp-content\/uploads\/2017\/08\/Depositphotos_96928212_s-2015.jpg\" alt=\" les six m\u00e9thodes de piratage les plus courantes\" width=\"500\" height=\"333\" srcset=\"https:\/\/news.save.ch\/wp-content\/uploads\/2017\/08\/Depositphotos_96928212_s-2015.jpg 500w, https:\/\/news.save.ch\/wp-content\/uploads\/2017\/08\/Depositphotos_96928212_s-2015-375x250.jpg 375w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><figcaption id=\"caption-attachment-5292\" class=\"wp-caption-text\">\u00a9 depositphotos<\/figcaption><\/figure>\n<p>Les pirates informatiques mettent tout en \u0153uvre pour entrer en possession des donn\u00e9es d'acc\u00e8s informatiques des comptes d'utilisateurs privil\u00e9gi\u00e9s. <a href=\"https:\/\/www.cyberark.com\/\">CyberArk<\/a> explique les six m\u00e9thodes les plus courantes qu'ils utilisent \u00e0 cet effet :<\/p>\n<p><strong><em>Enregistrement des frappes :<\/em> <\/strong>Un logiciel malveillant introduit dans le syst\u00e8me enregistre les saisies d'un utilisateur sur le clavier. Un keylogger peut soit enregistrer toutes les donn\u00e9es, soit attendre de mani\u00e8re cibl\u00e9e certaines saisies.<\/p>\n<p><strong><em>Attaques par force brute :<\/em> <\/strong>Dans cette m\u00e9thode, les pirates tentent de deviner les mots de passe en essayant simplement toutes les combinaisons possibles avec l'aide d'un logiciel sp\u00e9cial. Plus les mots de passe sont courts et simples, et moins ils sont modifi\u00e9s, plus la probabilit\u00e9 de r\u00e9ussite est \u00e9lev\u00e9e.<\/p>\n<p><strong><em>Le grattage de m\u00e9moire :<\/em> <\/strong>Un logiciel malveillant puise dans la m\u00e9moire vive des PC et y recherche des donn\u00e9es d'acc\u00e8s. Il peut s'agir de mots de passe stock\u00e9s en texte clair ou de hachages dans des environnements Windows qui peuvent \u00eatre utilis\u00e9s pour des attaques de type pass-the-hash.<\/p>\n<p><strong><em>Tableaux d'affichage des mots de passe :<\/em><\/strong> De nombreuses entreprises conservent encore leurs mots de passe dans des tableaux centraux. Cela en fait une cible particuli\u00e8rement int\u00e9ressante pour les cybercriminels.<\/p>\n<p><strong><em>Ing\u00e9nierie sociale :<\/em> <\/strong>Dans ce cas, les pirates se font passer pour des connaissances ou des coll\u00e8gues, par exemple dans des e-mails. Ils tentent ainsi d'inciter leurs victimes \u00e0 divulguer volontairement leurs donn\u00e9es d'acc\u00e8s.<\/p>\n<p><strong><em>Donn\u00e9es d'acc\u00e8s cod\u00e9es en dur :<\/em> <\/strong>Souvent, les cybercriminels recherchent \u00e9galement des mots de passe ou des cl\u00e9s SSH qui se trouvent dans les codes de programmation des applications, dans les scripts ou dans les fichiers de configuration. Ils permettent des acc\u00e8s \u00e9tendus, mais ne sont souvent pas modifi\u00e9s pendant des ann\u00e9es.<\/p>\n<p>\"La plupart des entreprises sont d\u00e9sormais conscientes que les donn\u00e9es d'acc\u00e8s privil\u00e9gi\u00e9es jouent un r\u00f4le d\u00e9cisif dans les cyber-attaques. Pourtant, ils ne sont souvent pas suffisamment prot\u00e9g\u00e9s\", explique Michael Kleist, directeur r\u00e9gional DACH de CyberArk.<\/p>\n<p>Selon l'exp\u00e9rience de l'expert, de nombreuses entreprises conservent leurs mots de passe dans des feuilles de calcul, changent trop rarement les donn\u00e9es d'acc\u00e8s ou accordent souvent inutilement aux utilisateurs les pleins droits d'administration sur les ordinateurs et les serveurs. En outre, les mesures de s\u00e9curit\u00e9 informatique traditionnelles sont souvent impuissantes face aux cyber-attaques modernes. L'intrusion de logiciels malveillants servant \u00e0 espionner les donn\u00e9es d'acc\u00e8s ne peut souvent pas \u00eatre emp\u00each\u00e9e par une s\u00e9curisation du p\u00e9rim\u00e8tre.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>Hacker setzen alles daran, in den Besitz der IT-Zugangsdaten f\u00fcr privilegierte Benutzerkonten zu gelangen. CyberArk erl\u00e4utert die sechs h\u00e4ufigsten Methoden, die sie dabei anwenden: Keystroke Logging: Hierbei werden mit Hilfe einer eingeschleusten Schadsoftware die Eingaben eines Benutzers an der Tastatur protokolliert. Ein Keylogger kann entweder s\u00e4mtliche Daten aufzeichnen oder gezielt auf bestimmte Eingaben warten. Brute-Force-Attacken: [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":5292,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pgc_sgb_lightbox_settings":"","footnotes":""},"categories":[3313],"tags":[96,63],"class_list":["post-5291","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digitalisierung","tag-cyber-crime","tag-it-security"],"acf":[],"hkrextid":null,"publication":null,"issue":null,"workflow":null,"startPage":null,"spitzmarke":null,"_posts_by_tag_page_fields":{"widget_title":"","widget_tags":""},"_at_widget":"1","_yoast_wpseo_primary_category":"2","_yoast_wpseo_focuskw_text_input":"Hacker-Methoden","_yoast_wpseo_opengraph-image":null,"_yoast_wpseo_opengraph-description":null,"_yoast_wpseo_opengraph-title":null,"enclosure":null,"_yoast_wpseo_twitter-title":null,"_yoast_wpseo_twitter-description":null,"_yoast_wpseo_twitter-image":null,"_wp_old_slug":null,"_yoast_wpseo_title":null,"_yoast_wpseo_canonical":null,"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Sechs h\u00e4ufige Hacker-Methoden - Save<\/title>\n<meta name=\"description\" content=\"Hacker setzen alles daran, in den Besitz der IT-Zugangsdaten f\u00fcr privilegierte Benutzerkonten zu gelangen. Die sechs h\u00e4ufigsten Methoden.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/news.save.ch\/fr\/sechs-hacker-methoden\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Sechs h\u00e4ufige Hacker-Methoden - Save\" \/>\n<meta property=\"og:description\" content=\"Hacker setzen alles daran, in den Besitz der IT-Zugangsdaten f\u00fcr privilegierte Benutzerkonten zu gelangen. Die sechs h\u00e4ufigsten Methoden.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/news.save.ch\/fr\/sechs-hacker-methoden\/\" \/>\n<meta property=\"og:site_name\" content=\"Save\" \/>\n<meta property=\"article:published_time\" content=\"2017-09-07T04:14:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-14T07:57:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/news.save.ch\/wp-content\/uploads\/2017\/08\/Depositphotos_96928212_s-2015.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"333\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Roger Str\u00e4ssle\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Str\u00e4ssle\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/sechs-hacker-methoden\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/sechs-hacker-methoden\\\/\"},\"author\":{\"name\":\"Roger Str\u00e4ssle\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d5022db048e0e2b9785c50e5b24da5aa\"},\"headline\":\"Sechs h\u00e4ufige Hacker-Methoden\",\"datePublished\":\"2017-09-07T04:14:44+00:00\",\"dateModified\":\"2023-03-14T07:57:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/sechs-hacker-methoden\\\/\"},\"wordCount\":347,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/sechs-hacker-methoden\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/Depositphotos_96928212_s-2015.jpg\",\"keywords\":[\"Cyber-Crime\",\"IT-SECURITY\"],\"articleSection\":[\"DIGITALISIERUNG\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/sechs-hacker-methoden\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/sechs-hacker-methoden\\\/\",\"name\":\"Sechs h\u00e4ufige Hacker-Methoden - Save\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/sechs-hacker-methoden\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/sechs-hacker-methoden\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/Depositphotos_96928212_s-2015.jpg\",\"datePublished\":\"2017-09-07T04:14:44+00:00\",\"dateModified\":\"2023-03-14T07:57:01+00:00\",\"description\":\"Hacker setzen alles daran, in den Besitz der IT-Zugangsdaten f\u00fcr privilegierte Benutzerkonten zu gelangen. Die sechs h\u00e4ufigsten Methoden.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/sechs-hacker-methoden\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/news.save.ch\\\/sechs-hacker-methoden\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/sechs-hacker-methoden\\\/#primaryimage\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/Depositphotos_96928212_s-2015.jpg\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/Depositphotos_96928212_s-2015.jpg\",\"width\":500,\"height\":333,\"caption\":\"\u00a9 depositphotos\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/sechs-hacker-methoden\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Sechs h\u00e4ufige Hacker-Methoden\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"name\":\"Save\",\"description\":\"Schweizer Fachzeitschrift f\u00fcr Sicherheit\",\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/news.save.ch\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\",\"name\":\"Sicherheitsforum\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"width\":1100,\"height\":91,\"caption\":\"Sicherheitsforum\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d5022db048e0e2b9785c50e5b24da5aa\",\"name\":\"Roger Str\u00e4ssle\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"caption\":\"Roger Str\u00e4ssle\"},\"url\":\"https:\\\/\\\/news.save.ch\\\/fr\\\/author\\\/roger-straessle\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Six m\u00e9thodes de piratage courantes - Save","description":"Les pirates informatiques mettent tout en \u0153uvre pour entrer en possession des donn\u00e9es d'acc\u00e8s informatiques des comptes d'utilisateurs privil\u00e9gi\u00e9s. Les six m\u00e9thodes les plus courantes.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/news.save.ch\/fr\/sechs-hacker-methoden\/","og_locale":"fr_FR","og_type":"article","og_title":"Sechs h\u00e4ufige Hacker-Methoden - Save","og_description":"Hacker setzen alles daran, in den Besitz der IT-Zugangsdaten f\u00fcr privilegierte Benutzerkonten zu gelangen. Die sechs h\u00e4ufigsten Methoden.","og_url":"https:\/\/news.save.ch\/fr\/sechs-hacker-methoden\/","og_site_name":"Save","article_published_time":"2017-09-07T04:14:44+00:00","article_modified_time":"2023-03-14T07:57:01+00:00","og_image":[{"width":500,"height":333,"url":"https:\/\/news.save.ch\/wp-content\/uploads\/2017\/08\/Depositphotos_96928212_s-2015.jpg","type":"image\/jpeg"}],"author":"Roger Str\u00e4ssle","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Roger Str\u00e4ssle","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/news.save.ch\/sechs-hacker-methoden\/#article","isPartOf":{"@id":"https:\/\/news.save.ch\/sechs-hacker-methoden\/"},"author":{"name":"Roger Str\u00e4ssle","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d5022db048e0e2b9785c50e5b24da5aa"},"headline":"Sechs h\u00e4ufige Hacker-Methoden","datePublished":"2017-09-07T04:14:44+00:00","dateModified":"2023-03-14T07:57:01+00:00","mainEntityOfPage":{"@id":"https:\/\/news.save.ch\/sechs-hacker-methoden\/"},"wordCount":347,"commentCount":0,"publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"image":{"@id":"https:\/\/news.save.ch\/sechs-hacker-methoden\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2017\/08\/Depositphotos_96928212_s-2015.jpg","keywords":["Cyber-Crime","IT-SECURITY"],"articleSection":["DIGITALISIERUNG"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/news.save.ch\/sechs-hacker-methoden\/","url":"https:\/\/news.save.ch\/sechs-hacker-methoden\/","name":"Six m\u00e9thodes de piratage courantes - Save","isPartOf":{"@id":"https:\/\/news.save.ch\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/news.save.ch\/sechs-hacker-methoden\/#primaryimage"},"image":{"@id":"https:\/\/news.save.ch\/sechs-hacker-methoden\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2017\/08\/Depositphotos_96928212_s-2015.jpg","datePublished":"2017-09-07T04:14:44+00:00","dateModified":"2023-03-14T07:57:01+00:00","description":"Les pirates informatiques mettent tout en \u0153uvre pour entrer en possession des donn\u00e9es d'acc\u00e8s informatiques des comptes d'utilisateurs privil\u00e9gi\u00e9s. Les six m\u00e9thodes les plus courantes.","breadcrumb":{"@id":"https:\/\/news.save.ch\/sechs-hacker-methoden\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/news.save.ch\/sechs-hacker-methoden\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/news.save.ch\/sechs-hacker-methoden\/#primaryimage","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2017\/08\/Depositphotos_96928212_s-2015.jpg","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2017\/08\/Depositphotos_96928212_s-2015.jpg","width":500,"height":333,"caption":"\u00a9 depositphotos"},{"@type":"BreadcrumbList","@id":"https:\/\/news.save.ch\/sechs-hacker-methoden\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/news.save.ch\/de\/"},{"@type":"ListItem","position":2,"name":"Sechs h\u00e4ufige Hacker-Methoden"}]},{"@type":"WebSite","@id":"https:\/\/news.save.ch\/de\/#website","url":"https:\/\/news.save.ch\/de\/","name":"Save","description":"Revue suisse sp\u00e9cialis\u00e9e dans la s\u00e9curit\u00e9","publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/news.save.ch\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/news.save.ch\/de\/#organization","name":"Forum sur la s\u00e9curit\u00e9","url":"https:\/\/news.save.ch\/de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","width":1100,"height":91,"caption":"Sicherheitsforum"},"image":{"@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d5022db048e0e2b9785c50e5b24da5aa","name":"Roger Str\u00e4ssle","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","caption":"Roger Str\u00e4ssle"},"url":"https:\/\/news.save.ch\/fr\/author\/roger-straessle\/"}]}},"_links":{"self":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts\/5291","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/comments?post=5291"}],"version-history":[{"count":1,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts\/5291\/revisions"}],"predecessor-version":[{"id":17490,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts\/5291\/revisions\/17490"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/media\/5292"}],"wp:attachment":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/media?parent=5291"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/categories?post=5291"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/tags?post=5291"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}