{"id":2424,"date":"2016-10-26T18:31:44","date_gmt":"2016-10-26T16:31:44","guid":{"rendered":"http:\/\/securite.intrinsec.com\/?p=2424"},"modified":"2016-10-26T18:31:44","modified_gmt":"2016-10-26T16:31:44","slug":"hack-lu-2016-troisieme-journee","status":"publish","type":"post","link":"https:\/\/www.intrinsec.com\/en\/hack-lu-2016-troisieme-journee\/","title":{"rendered":"Hack.lu 2016 \u2013 Day Three"},"content":{"rendered":"<p style=\"text-align: justify;\">Links to reports from other days:<\/p>\n<ul>\n<li style=\"text-align: justify;\"><a href=\"https:\/\/www.intrinsec.com\/en\/2016\/10\/26\/hack-lu-2016-premiere-journee\/\">Hack.lu 2016 \u2013 first day<\/a><\/li>\n<li style=\"text-align: justify;\"><a href=\"https:\/\/www.intrinsec.com\/en\/2016\/10\/26\/hack-lu-2016-deuxieme-journee\/\">Hack.lu 2016 \u2013 Day Two<\/a><\/li>\n<li style=\"text-align: justify;\">Hack.lu 2016 \u2013 Day Three<\/li>\n<\/ul>\n<h1 style=\"text-align: justify;\">Day 3<\/h1>\n<h2 style=\"text-align: justify;\">BtleJuice: the Bluetooth Smart Man In The Middle Framework<\/h2>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/10\/2016-10-26_10-13-19.jpg\"><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter size-full wp-image-2369\" src=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/10\/2016-10-26_10-13-19.jpg\" alt=\"Damien Cauquil\" width=\"341\" height=\"335\" \/><\/a><\/p>\n<p style=\"text-align: justify;\">Damien Cauquil started the day and managed to capture our attention despite the apparent lack of sleep (no doubt due to the early hour and more likely following the social event of the day before\u2026).<\/p>\n<p style=\"text-align: justify;\">After a review of the specifications of the BLE (Bluetooth Low Energy) protocol, mainly used by connected objects for its performance and low power consumption, he presented his &quot;BtleJuice&quot; framework written in Node.js and allowing the interception and manipulation of packets using this protocol.<\/p>\n<p style=\"text-align: justify;\">Several prerequisites are nevertheless necessary: two separate machines as well as two BLE adapters are currently required to carry out these attack scenarios.<\/p>\n<p style=\"text-align: justify;\">Several connected objects were then tested by Damien, for which vulnerabilities were found through the use of his framework.<\/p>\n<p style=\"text-align: justify;\">The first demonstration consisted of passively listening to network traffic and enabled the Quicklock connected padlock to be unlocked via a smartphone and an application.<\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/10\/2016-10-26_10-14-04.jpg\"><img decoding=\"async\" class=\"aligncenter size-large wp-image-2371\" src=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/10\/2016-10-26_10-14-04-1024x520.jpg\" alt=\"Quicklock\" width=\"1024\" height=\"520\" \/><\/a><\/p>\n<p style=\"text-align: justify;\">After analyzing the traffic, it appears that the PIN code is transmitted in clear text and that the authentication of the unlocking process is simply based on the BD (Bluetooth Device) address.<\/p>\n<p style=\"text-align: justify;\">Damien then performed query replay on his connected robot wowwee MIP using his BTLEJuice framework to perform manual fuzzing, allowing him to discover and call undocumented functionalities:<\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/10\/2016-10-26_10-14-09.jpg\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-2372\" src=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/10\/2016-10-26_10-14-09.jpg\" alt=\"Wowwee MIP\" width=\"895\" height=\"553\" \/><\/a><\/p>\n<p style=\"text-align: justify;\">For the final demonstration, Damien performed a packet injection by spoofing the BD address of a blood glucose meter. Authentication here again relies solely on the BD address.<\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/10\/2016-10-26_10-14-15.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-2370\" src=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/10\/2016-10-26_10-14-15-1024x469.jpg\" alt=\"Appareil de mesure de taux de glucose dans le sang\" width=\"1024\" height=\"469\" \/><\/a><\/p>\n<p style=\"text-align: justify;\">Damien concluded his presentation by explaining how it would be possible to detect the use of his tool by observing the response time during read and\/or write operations.<\/p>\n<p style=\"text-align: justify;\">BTLEJuice&#039;s source code is open source and available on Github:<\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/github.com\/DigitalSecurity\/btlejuice\">https:\/\/github.com\/DigitalSecurity\/btlejuice<\/a><\/p>\n<h2 style=\"text-align: justify;\">ARM Shellcode Basics<\/h2>\n<p style=\"text-align: justify;\">Saumil Shah presented the basics of ARM compilation in this workshop.<\/p>\n<p style=\"text-align: justify;\">Thanks to a simple setup consisting of a Raspberry Pi and a WiFi router, it was possible to connect to the lab set up by Saumil in order to compile and test various ARM exploits:<\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/10\/IMG_0668.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-2374\" src=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/10\/IMG_0668-300x225.jpg\" alt=\"Installation atelier shellcode\" width=\"300\" height=\"225\" \/><\/a><\/p>\n<p style=\"text-align: justify;\"><em>Note: Saumil Shah also presented this work during the talk &quot;2016: The Infosec Crossroads&quot;.<\/em> <em>The presentation materials can be retrieved from this address:<\/em><\/p>\n<p style=\"text-align: justify;\"><em><a href=\"http:\/\/www.slideshare.net\/saumilshah\/hacklu-the-infosec-crossroads\">http:\/\/www.slideshare.net\/saumilshah\/hacklu-the-infosec-crossroads<\/a><\/em><\/p>\n<h2 style=\"text-align: justify;\">FastIR Collector<\/h2>\n<p style=\"text-align: justify;\">S\u00e9bastien Larinier presented us during this workshop the analysis of various malicious codes such as Casper, Babar or Poweliks facilitated by the FastIR tool.<\/p>\n<p style=\"text-align: justify;\">This takes the form of an executable that requires administrator rights when run in order to recover all Windows artifacts.<\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/10\/2016-10-26_13-21-05.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2376 size-full\" src=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/10\/2016-10-26_13-21-05.jpg\" alt=\"FastIR\" width=\"996\" height=\"616\" \/><\/a><\/p>\n<p style=\"text-align: justify;\">The presentation will be published soon, and the tool&#039;s source code will be available on the following Github repository:<\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/github.com\/SekoiaLab\/Fastir_Collector\">https:\/\/github.com\/SekoiaLab\/Fastir_Collector<\/a><\/p>\n<h1 id=\"annexes\" style=\"text-align: justify;\">Appendices<\/h1>\n<p style=\"text-align: justify;\">The various presentation materials will soon be available at the following address:<\/p>\n<p style=\"text-align: justify;\"><a href=\"http:\/\/archive.hack.lu\/2016\/\">http:\/\/archive.hack.lu\/2016\/<\/a><\/p>\n<p>In the meantime, here are some links to watch the different conferences:<\/p>\n<ul>\n<li>Day 3\n<ul>\n<li style=\"text-align: justify;\">BtleJuice: the Bluetooth Smart Man In The Middle Framework by Damiel Cauquil\n<ul>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=G08fh5Sa7TU\">https:\/\/www.youtube.com\/watch?v=G08fh5Sa7TU<\/a><\/li>\n<\/ul>\n<\/li>\n<li style=\"text-align: justify;\">Where should I host my malware? by Attila Marosi\n<ul>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=8uQ7XFdLgnI\">https:\/\/www.youtube.com\/watch?v=8uQ7XFdLgnI<\/a><\/li>\n<\/ul>\n<\/li>\n<li style=\"text-align: justify;\">Interesting Malware \u2013 No, I&#039;m not kidding\u2026 by Marion Marschalek\n<ul>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=u2Ry9HTBbZI\">https:\/\/www.youtube.com\/watch?v=u2Ry9HTBbZI<\/a><\/li>\n<\/ul>\n<\/li>\n<li style=\"text-align: justify;\">Enhancing infrastructure cybersecurity in Europe by Rosella Mattioli\n<ul>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=IQUdbHV1ebk\">https:\/\/www.youtube.com\/watch?v=IQUdbHV1ebk<\/a><\/li>\n<\/ul>\n<\/li>\n<li style=\"text-align: justify;\">Lightning Talk: Geeks Without Bounds by Chris Kebecka\n<ul>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=uqF5SjJQc6A\">https:\/\/www.youtube.com\/watch?v=uqF5SjJQc6A<\/a><\/li>\n<\/ul>\n<\/li>\n<li style=\"text-align: justify;\">Lightning Talk: Lama Project by Valentin Giannini\n<ul>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=Hvex-Z8hl5U\">https:\/\/www.youtube.com\/watch?v=Hvex-Z8hl5U<\/a><\/li>\n<\/ul>\n<\/li>\n<li style=\"text-align: justify;\">Lightning Talk: iOS Forensics by Pasquale Stirparo\n<ul>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=v4UCon9n04o\">https:\/\/www.youtube.com\/watch?v=v4UCon9n04o<\/a><\/li>\n<\/ul>\n<\/li>\n<li style=\"text-align: justify;\">Lightning Talk: EmailMadeIn.lu by Martin Bosslet\n<ul>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=PqAGH3F8UT0\">https:\/\/www.youtube.com\/watch?v=PqAGH3F8UT0<\/a><\/li>\n<\/ul>\n<\/li>\n<li style=\"text-align: justify;\">House intercoms attacks: when frontdoors become backdoors by S\u00e9bastien Dudek\n<ul>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=rKeqjNSm6Ts\">https:\/\/www.youtube.com\/watch?v=rKeqjNSm6Ts<\/a><\/li>\n<\/ul>\n<\/li>\n<li style=\"text-align: justify;\">Bridging political gaps with code by Okhin\n<ul>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=HG-KYKf-zG4\">https:\/\/www.youtube.com\/watch?v=HG-KYKf-zG4<\/a><\/li>\n<\/ul>\n<\/li>\n<li style=\"text-align: justify;\">WiFi Exploitation: How passive interception leads to active exploitation\n<ul>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=QWzLKOEzTOQ\">https:\/\/www.youtube.com\/watch?v=QWzLKOEzTOQ<\/a><\/li>\n<\/ul>\n<\/li>\n<li style=\"text-align: justify;\">Fraud detection and forensics on telco networks\n<ul>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=09EAWT_F1ZA\">https:\/\/www.youtube.com\/watch?v=09EAWT_F1ZA<\/a><\/li>\n<\/ul>\n<\/li>\n<li style=\"text-align: justify;\">The Legend of Windows: A Link to the Hash by m4xk and s\u0131x\n<ul>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=cuF_Ibo-mmM\">https:\/\/www.youtube.com\/watch?v=cuF_Ibo-mmM<\/a><\/li>\n<\/ul>\n<\/li>\n<li>CTF Prize Ceremony by Fluxfingers\n<ul>\n<li style=\"text-align: justify;\"><a href=\"https:\/\/www.youtube.com\/watch?v=p34uqGeXqIY\">https:\/\/www.youtube.com\/watch?v=p34uqGeXqIY<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>Links to reports from other days: Hack.lu 2016 \u2013 first day Hack.lu 2016 [\u2026]<\/p>","protected":false},"author":22,"featured_media":2451,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,19,22],"tags":[],"class_list":["post-2424","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-evaluation-securite","category-soc-securite-operationnelle","category-veille-securite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Hack.lu 2016 - troisi\u00e8me journ\u00e9e - INTRINSEC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intrinsec.com\/en\/hack-lu-2016-troisieme-journee\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hack.lu 2016 - troisi\u00e8me journ\u00e9e\" \/>\n<meta property=\"og:description\" content=\"Liens vers les comptes-rendus des autres jours : Hack.lu 2016 &#8211; premi\u00e8re journ\u00e9e Hack.lu 2016 [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intrinsec.com\/en\/hack-lu-2016-troisieme-journee\/\" \/>\n<meta property=\"og:site_name\" content=\"INTRINSEC\" \/>\n<meta property=\"article:published_time\" content=\"2016-10-26T16:31:44+00:00\" \/>\n<meta name=\"author\" content=\"Walid ARNOULT\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Walid ARNOULT\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/hack-lu-2016-troisieme-journee\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/hack-lu-2016-troisieme-journee\\\/\"},\"author\":{\"name\":\"Walid ARNOULT\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/9dd16d3e1ff8da71d0dc1b9573880ef0\"},\"headline\":\"Hack.lu 2016 &#8211; troisi\u00e8me journ\u00e9e\",\"datePublished\":\"2016-10-26T16:31:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/hack-lu-2016-troisieme-journee\\\/\"},\"wordCount\":847,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/hack-lu-2016-troisieme-journee\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"articleSection\":[\"Evaluation S\u00e9curit\u00e9\",\"SOC S\u00e9curit\u00e9 Op\u00e9rationnelle\",\"Veille S\u00e9curit\u00e9\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.intrinsec.com\\\/hack-lu-2016-troisieme-journee\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/hack-lu-2016-troisieme-journee\\\/\",\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/hack-lu-2016-troisieme-journee\\\/\",\"name\":\"Hack.lu 2016 - troisi\u00e8me journ\u00e9e - INTRINSEC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/hack-lu-2016-troisieme-journee\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/hack-lu-2016-troisieme-journee\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2016-10-26T16:31:44+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/9dd16d3e1ff8da71d0dc1b9573880ef0\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/hack-lu-2016-troisieme-journee\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.intrinsec.com\\\/hack-lu-2016-troisieme-journee\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/hack-lu-2016-troisieme-journee\\\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/hack-lu-2016-troisieme-journee\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.intrinsec.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hack.lu 2016 &#8211; troisi\u00e8me journ\u00e9e\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#website\",\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/\",\"name\":\"INTRINSEC\",\"description\":\"Notre m\u00e9tier , Prot\u00e9ger le v\u00f4tre\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.intrinsec.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/9dd16d3e1ff8da71d0dc1b9573880ef0\",\"name\":\"Walid ARNOULT\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/?s=96&d=retro&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/?s=96&d=retro&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/?s=96&d=retro&r=g\",\"caption\":\"Walid ARNOULT\"},\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/en\\\/author\\\/walid-arnoult\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Hack.lu 2016 - Day Three - INTRINSEC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intrinsec.com\/en\/hack-lu-2016-troisieme-journee\/","og_locale":"en_US","og_type":"article","og_title":"Hack.lu 2016 - troisi\u00e8me journ\u00e9e","og_description":"Liens vers les comptes-rendus des autres jours : Hack.lu 2016 &#8211; premi\u00e8re journ\u00e9e Hack.lu 2016 [&hellip;]","og_url":"https:\/\/www.intrinsec.com\/en\/hack-lu-2016-troisieme-journee\/","og_site_name":"INTRINSEC","article_published_time":"2016-10-26T16:31:44+00:00","author":"Walid ARNOULT","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Walid ARNOULT","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.intrinsec.com\/hack-lu-2016-troisieme-journee\/#article","isPartOf":{"@id":"https:\/\/www.intrinsec.com\/hack-lu-2016-troisieme-journee\/"},"author":{"name":"Walid ARNOULT","@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/9dd16d3e1ff8da71d0dc1b9573880ef0"},"headline":"Hack.lu 2016 &#8211; troisi\u00e8me journ\u00e9e","datePublished":"2016-10-26T16:31:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intrinsec.com\/hack-lu-2016-troisieme-journee\/"},"wordCount":847,"commentCount":0,"image":{"@id":"https:\/\/www.intrinsec.com\/hack-lu-2016-troisieme-journee\/#primaryimage"},"thumbnailUrl":"","articleSection":["Evaluation S\u00e9curit\u00e9","SOC S\u00e9curit\u00e9 Op\u00e9rationnelle","Veille S\u00e9curit\u00e9"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intrinsec.com\/hack-lu-2016-troisieme-journee\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.intrinsec.com\/hack-lu-2016-troisieme-journee\/","url":"https:\/\/www.intrinsec.com\/hack-lu-2016-troisieme-journee\/","name":"Hack.lu 2016 - Day Three - INTRINSEC","isPartOf":{"@id":"https:\/\/www.intrinsec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intrinsec.com\/hack-lu-2016-troisieme-journee\/#primaryimage"},"image":{"@id":"https:\/\/www.intrinsec.com\/hack-lu-2016-troisieme-journee\/#primaryimage"},"thumbnailUrl":"","datePublished":"2016-10-26T16:31:44+00:00","author":{"@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/9dd16d3e1ff8da71d0dc1b9573880ef0"},"breadcrumb":{"@id":"https:\/\/www.intrinsec.com\/hack-lu-2016-troisieme-journee\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intrinsec.com\/hack-lu-2016-troisieme-journee\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.intrinsec.com\/hack-lu-2016-troisieme-journee\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/www.intrinsec.com\/hack-lu-2016-troisieme-journee\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.intrinsec.com\/"},{"@type":"ListItem","position":2,"name":"Hack.lu 2016 &#8211; troisi\u00e8me journ\u00e9e"}]},{"@type":"WebSite","@id":"https:\/\/www.intrinsec.com\/#website","url":"https:\/\/www.intrinsec.com\/","name":"INTRINSEC","description":"Our job is to protect yours.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intrinsec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/9dd16d3e1ff8da71d0dc1b9573880ef0","name":"Walid ARNOULT","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=retro&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=retro&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=retro&r=g","caption":"Walid ARNOULT"},"url":"https:\/\/www.intrinsec.com\/en\/author\/walid-arnoult\/"}]}},"_links":{"self":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts\/2424","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/comments?post=2424"}],"version-history":[{"count":0,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts\/2424\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/media?parent=2424"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/categories?post=2424"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/tags?post=2424"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}