{"id":3310,"date":"2021-09-23T06:15:39","date_gmt":"2021-09-23T06:15:39","guid":{"rendered":"https:\/\/stratign.com\/website\/?page_id=3310"},"modified":"2024-03-05T09:31:58","modified_gmt":"2024-03-05T05:31:58","slug":"wi-fi-interception-system","status":"publish","type":"page","link":"https:\/\/www.stratign.com\/fr\/wi-fi-interception-system\/","title":{"rendered":"SYST\u00c8ME D\u2019INTERCEPTION WI-FI"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][tm_spacer size=&#8221;xs:20;sm:40;lg:80&#8243;][tm_heading tag=&#8221;h4&#8243; custom_google_font=&#8221;&#8221; text_transform=&#8221;uppercase&#8221; align=&#8221;center&#8221; text_color=&#8221;secondary&#8221; font_size=&#8221;sm:28;md:34;lg:40&#8243; line_height=&#8221;1.4&#8243;]SYST\u00c8ME D&#8217;INTERCEPTION WI-FI[\/tm_heading][tm_spacer size=&#8221;xs:20;sm:30;lg:60&#8243;][\/vc_column][\/vc_row][vc_row sm_spacing=&#8221;padding_bottom:100&#8243; lg_spacing=&#8221;padding_bottom:5&#8243;][vc_column offset=&#8221;vc_col-md-5&#8243;][tm_heading style=&#8221;left-line&#8221; custom_google_font=&#8221;&#8221; font_weight=&#8221;800&#8243; font_size=&#8221;sm:18;md:21;lg:24&#8243; line_height=&#8221;1.67&#8243; max_width=&#8221;400px&#8221;]Le syst\u00e8me de surveillance WiFi peut intercepter plusieurs cibles connect\u00e9es \u00e0 des points d&#8217;acc\u00e8s cibl\u00e9s et utilisant le m\u00eame r\u00e9seau WiFi sur leurs t\u00e9l\u00e9phones portables, tablettes, ordinateurs de bureau et ordinateurs portables.[\/tm_heading][tm_spacer size=&#8221;xs:10;sm:10;md:0;lg:0&#8243;][\/vc_column][vc_column offset=&#8221;vc_col-md-7&#8243;][tm_heading tag=&#8221;div&#8221; custom_google_font=&#8221;&#8221; font_size=&#8221;lg:18&#8243; line_height=&#8221;1.67&#8243;]La disponibilit\u00e9 g\u00e9n\u00e9ralis\u00e9e des r\u00e9seaux Wi-Fi et leur utilisation accrue par des \u00e9l\u00e9ments subversifs dans le monde entier ont rendu n\u00e9cessaire la surveillance de certains r\u00e9seaux Wi-Fi par les organismes charg\u00e9s de l&#8217;application de la loi. Stratign propose un syst\u00e8me de surveillance tactique des r\u00e9seaux Wi-Fi qui a \u00e9t\u00e9 con\u00e7u dans le but de fournir \u00e0 votre d\u00e9fense nationale et aux agences de renseignement la capacit\u00e9 d&#8217;intercepter le trafic des applications de m\u00e9dias sociaux (c&#8217;est-\u00e0-dire Facebook, Twitter), des applications de chat (Facebook Chat, YahooChat), du Webmail (Gmail, YahooMail, etc.) et des flux vid\u00e9o (Youtube, dailymotion).[\/tm_heading][\/vc_column][\/vc_row][vc_row sm_spacing=&#8221;margin_top:-90&#8243; xs_spacing=&#8221;margin_top:-90&#8243;][vc_column][tm_heading tag=&#8221;div&#8221; custom_google_font=&#8221;&#8221; font_size=&#8221;lg:18&#8243; line_height=&#8221;1.67&#8243;]Le syst\u00e8me de surveillance WiFi peut intercepter plusieurs cibles connect\u00e9es \u00e0 des points d&#8217;acc\u00e8s cibl\u00e9s et utilisant le m\u00eame r\u00e9seau WiFi sur leurs t\u00e9l\u00e9phones portables, tablettes, ordinateurs de bureau et ordinateurs portables. Le syst\u00e8me a la capacit\u00e9 d&#8217;acqu\u00e9rir, de traiter, de d\u00e9coder et de reconstruire le trafic de tous les appareils cibl\u00e9s simultan\u00e9ment qui sont connect\u00e9s au point d&#8217;acc\u00e8s.[\/tm_heading][tm_spacer size=&#8221;xs:10;sm:10;lg:20&#8243;][tm_heading tag=&#8221;div&#8221; custom_google_font=&#8221;&#8221; font_size=&#8221;lg:18&#8243; line_height=&#8221;1.67&#8243;]Le fonctionnement du syst\u00e8me ne n\u00e9cessite pas de connaissances approfondies du r\u00e9seau WiFi et fournit une excellente plateforme aux agences de renseignement pour obtenir des informations pr\u00e9cieuses sur les r\u00e9seaux WiFi s\u00e9curis\u00e9s et non s\u00e9curis\u00e9s utilis\u00e9s par les criminels et les terroristes.[\/tm_heading][tm_spacer size=&#8221;lg:50&#8243;][\/vc_column][\/vc_row][vc_row][vc_column][tm_spacer size=&#8221;lg:50&#8243;][tm_heading tag=&#8221;h4&#8243; custom_google_font=&#8221;&#8221; align=&#8221;center&#8221; text_color=&#8221;secondary&#8221; font_size=&#8221;sm:28;md:34;lg:40&#8243; line_height=&#8221;1.4&#8243; css=&#8221;.vc_custom_1704174361719{background-position: center !important;background-repeat: no-repeat !important;background-size: contain !important;}&#8221;]Caract\u00e9ristiques du syst\u00e8me[\/tm_heading][tm_spacer size=&#8221;lg:40&#8243;][tm_list list_style=&#8221;check-02&#8243; marker_color=&#8221;secondary&#8221; title_color=&#8221;primary&#8221; columns=&#8221;xs:1;lg:2&#8243; items=&#8221;%5B%7B%22item_title%22%3A%22Cible%20les%20r%C3%A9seaux%20s%C3%A9curis%C3%A9s%20et%20non%20s%C3%A9curis%C3%A9s%22%2C%22item_desc%22%3A%22Con%C3%A7u%20pour%20l&#8217;interception%20et%20la%20reconstruction%20du%20trafic%20IP%20%C3%A0%20partir%20de%20r%C3%A9seaux%20WiFi%20s%C3%A9curis%C3%A9s%20et%20non%20s%C3%A9curis%C3%A9s.%22%7D%2C%7B%22item_title%22%3A%22Bandes%20de%20fr%C3%A9quences%20WiFi%22%2C%22link%22%3A%22%7C%7C%7C%22%2C%22item_desc%22%3A%22Prise%20en%20charge%20des%20bandes%20de%20fr%C3%A9quences%20WiFi%202%2C4%20GHz%20ou%205%20GHz.%22%7D%2C%7B%22item_title%22%3A%22Casse%20les%20r%C3%A9seaux%20s%C3%A9curis%C3%A9s%22%2C%22item_desc%22%3A%22Peut%20casser%20les%20r%C3%A9seaux%20WiFi%20s%C3%A9curis%C3%A9s%20WEP%2C%20WPA%2C%20WPA2.%22%7D%2C%7B%22item_title%22%3A%22Ind%C3%A9pendant%20du%20pare-feu%22%2C%22link%22%3A%22%7C%7C%7C%22%2C%22item_desc%22%3A%22Peut%20fonctionner%20ind%C3%A9pendamment%20du%20pare-feu%2C%20de%20l&#8217;antivirus%20et%20des%20mises%20%C3%A0%20jour%20de%20s%C3%A9curit%C3%A9.%22%7D%2C%7B%22item_title%22%3A%22Agnostique%20au%20syst%C3%A8me%20d&#8217;exploitation%22%2C%22item_desc%22%3A%22Peut%20intercepter%20le%20trafic%20provenant%20d&#8217;appareils%20cibles%20utilisant%20diff%C3%A9rents%20syst%C3%A8mes%20d&#8217;exploitation%20tels%20que%20Mac%20OSX%2C%20Windows%2C%20iOS%2C%20Android%2C%20Blackberry%2C%20Linux%2C%20etc.%22%7D%2C%7B%22item_title%22%3A%22Trafic%20HTTPS%22%2C%22item_desc%22%3A%22Peut%20charger%20le%20certificat%20l%C3%A9gal%20%C3%A9mis%20par%20les%20autorit%C3%A9s%20de%20certification%20et%20dispose%20%C3%A9galement%20d&#8217;un%20certificat%20racine%20int%C3%A9gr%C3%A9%20pour%20intercepter%20et%20reconstruire%20le%20trafic%20HTTPS.%22%7D%2C%7B%22item_title%22%3A%22Identifiants%20de%20connexion%20de%20la%20cible%22%2C%22item_desc%22%3A%22Permet%20d&#8217;intercepter%2C%20de%20d%C3%A9coder%20et%20d&#8217;afficher%20les%20identifiants%20de%20connexion%20de%20la%20cible%20%C3%A0%20partir%20des%20%C3%A9l%C3%A9ments%20suivants%20et%20de%20bien%20d&#8217;autres%20encore.%20Courriel%20%3A%20Gmail%2C%20YahooMail%2C%20Hotmail%2C%20GMX%20Mail%2C%20Yandex%2C%20Mail.ru%2C%20courriels%20sp%C3%A9cifiques%20%C3%A0%20un%20pays%2C%20etc%20%3A%20Facebook%2C%20Twitter%2C%20LinkedIn%2C%20etc%20%3A%20Skype%2C%20etc.%22%7D%2C%7B%22item_title%22%3A%22Reconstruction%20des%20pages%20web%20parcourues%22%2C%22item_desc%22%3A%22Peut%20intercepter%20et%20reconstruire%20automatiquement%20les%20pages%20web%20parcourues%20dans%20la%20m%C3%AAme%20langue%20que%20celle%20dans%20laquelle%20elles%20ont%20%C3%A9t%C3%A9%20parcourues%20sur%20le%20syst%C3%A8me%20cible.%22%7D%2C%7B%22item_title%22%3A%22Interception%20des%20sessions%20de%20chat%22%2C%22item_desc%22%3A%22Permet%20d&#8217;intercepter%20des%20sessions%20de%20chat%20comme%20Yahoo%20chat%2C%20Facebook%20Chat%20ainsi%20que%20les%20informations%20li%C3%A9es%20%C3%A0%20la%20session.%22%7D%2C%7B%22item_title%22%3A%22Intercepter%20les%20courriels%22%2C%22item_desc%22%3A%22Permet%20d&#8217;intercepter%20les%20courriels%20envoy%C3%A9s%20par%20un%20client%20de%20messagerie%20tel%20que%20Outlook%2C%20Thunderbird%20Mail%2C%20etc.%22%7D%2C%7B%22item_title%22%3A%22D%C3%A9ploiement%20statique%20et%20portable%22%2C%22item_desc%22%3A%22Peut%20%C3%AAtre%20utilis%C3%A9%20pour%20un%20d%C3%A9ploiement%20statique%20ou%20portable%20en%20fonction%20des%20exigences%20de%20la%20mission.%22%7D%2C%7B%22item_title%22%3A%22Brouillage%20s%C3%A9lectif%22%2C%22item_desc%22%3A%22Peut%20%C3%A9galement%20%C3%AAtre%20utilis%C3%A9%20pour%20le%20brouillage%20d&#8217;un%20r%C3%A9seau%20WiFi%20sp%C3%A9cifique.%22%7D%5D&#8221; custom_css=&#8221;LnRtLWxpc3Quc3R5bGUtY2hlY2stMDIlMjAuZGVzYyUyMCU3QiUwQSUyMCUyMCUyMCUyMG1hcmdpbi10b3AlM0ElMjAxMHB4JTNCJTBBJTIwJTIwJTIwJTIwbWFyZ2luLWJvdHRvbSUzQSUyMDEwcHglM0IlMEElN0Q=&#8221;][tm_spacer size=&#8221;xs:30;sm:60;lg:120&#8243;][\/vc_column][\/vc_row][vc_row css_animation=&#8221;none&#8221; lg_spacing=&#8221;margin_bottom:10&#8243; md_spacing=&#8221;margin_bottom:10&#8243;][vc_column width=&#8221;1\/4&#8243;][tm_heading tag=&#8221;h4&#8243; custom_google_font=&#8221;&#8221; css=&#8221;.vc_custom_1702534293059{margin-top: 10px !important;}&#8221;]En savoir plus[\/tm_heading][\/vc_column][vc_column width=&#8221;1\/4&#8243;][tm_button button=&#8221;url:https%3A%2F%2Fwww.stratign.com%2Fcontact-us%2F|title:Nous%20contacter%20&#8243; el_id=&#8221;Contact-us-other&#8221;][\/vc_column][vc_column width=&#8221;1\/4&#8243;][tm_heading tag=&#8221;h4&#8243; custom_google_font=&#8221;&#8221;]T\u00e9l\u00e9charger la brochure[\/tm_heading][\/vc_column][vc_column width=&#8221;1\/4&#8243;][tm_button button=&#8221;url:https%3A%2F%2Fwww.stratign.com%2Fbrochures%2F|title:T%C3%A9l%C3%A9charger&#8221; el_id=&#8221;Brochure-other&#8221;][\/vc_column][\/vc_row]<\/p>\n<\/section>","protected":false},"excerpt":{"rendered":"<p>The WiFi Monitoring System can intercept multiple targets which are connected to targeted Access Points and using same WiFi network on their mobile, tablets, desktop and laptops.<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-3310","page","type-page","status-publish","hentry","post-no-thumbnail"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>SYST\u00c8ME D\u2019INTERCEPTION WI-FI - Stratign<\/title>\n<meta name=\"description\" content=\"Le syst\u00e8me de surveillance Wi-Fi peut intercepter le trafic des applications de m\u00e9dias sociaux, de chat, de webmail, de streaming vid\u00e9o, etc.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratign.com\/fr\/wi-fi-interception-system\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SYST\u00c8ME D\u2019INTERCEPTION WI-FI - Stratign\" \/>\n<meta property=\"og:description\" content=\"Le syst\u00e8me de surveillance Wi-Fi peut intercepter le trafic des applications de m\u00e9dias sociaux, de chat, de webmail, de streaming vid\u00e9o, etc.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratign.com\/fr\/wi-fi-interception-system\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratign\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/stratignfb\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-05T05:31:58+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@stratign\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/wi-fi-interception-system\\\/\",\"url\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/wi-fi-interception-system\\\/\",\"name\":\"SYST\u00c8ME D\u2019INTERCEPTION WI-FI - Stratign\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/#website\"},\"datePublished\":\"2021-09-23T06:15:39+00:00\",\"dateModified\":\"2024-03-05T05:31:58+00:00\",\"description\":\"Le syst\u00e8me de surveillance Wi-Fi peut intercepter le trafic des applications de m\u00e9dias sociaux, de chat, de webmail, de streaming vid\u00e9o, etc.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/wi-fi-interception-system\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.stratign.com\\\/fr\\\/wi-fi-interception-system\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/wi-fi-interception-system\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SYST\u00c8ME D\u2019INTERCEPTION WI-FI\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/\",\"name\":\"Stratign\",\"description\":\"Military Defense Technology\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SYST\u00c8ME D\u2019INTERCEPTION WI-FI - Stratign","description":"Le syst\u00e8me de surveillance Wi-Fi peut intercepter le trafic des applications de m\u00e9dias sociaux, de chat, de webmail, de streaming vid\u00e9o, etc.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratign.com\/fr\/wi-fi-interception-system\/","og_locale":"en_US","og_type":"article","og_title":"SYST\u00c8ME D\u2019INTERCEPTION WI-FI - Stratign","og_description":"Le syst\u00e8me de surveillance Wi-Fi peut intercepter le trafic des applications de m\u00e9dias sociaux, de chat, de webmail, de streaming vid\u00e9o, etc.","og_url":"https:\/\/www.stratign.com\/fr\/wi-fi-interception-system\/","og_site_name":"Stratign","article_publisher":"https:\/\/www.facebook.com\/stratignfb\/","article_modified_time":"2024-03-05T05:31:58+00:00","twitter_card":"summary_large_image","twitter_site":"@stratign","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.stratign.com\/fr\/wi-fi-interception-system\/","url":"https:\/\/www.stratign.com\/fr\/wi-fi-interception-system\/","name":"SYST\u00c8ME D\u2019INTERCEPTION WI-FI - Stratign","isPartOf":{"@id":"https:\/\/www.stratign.com\/fr\/#website"},"datePublished":"2021-09-23T06:15:39+00:00","dateModified":"2024-03-05T05:31:58+00:00","description":"Le syst\u00e8me de surveillance Wi-Fi peut intercepter le trafic des applications de m\u00e9dias sociaux, de chat, de webmail, de streaming vid\u00e9o, etc.","breadcrumb":{"@id":"https:\/\/www.stratign.com\/fr\/wi-fi-interception-system\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratign.com\/fr\/wi-fi-interception-system\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratign.com\/fr\/wi-fi-interception-system\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratign.com\/fr\/"},{"@type":"ListItem","position":2,"name":"SYST\u00c8ME D\u2019INTERCEPTION WI-FI"}]},{"@type":"WebSite","@id":"https:\/\/www.stratign.com\/fr\/#website","url":"https:\/\/www.stratign.com\/fr\/","name":"Stratign","description":"Military Defense Technology","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratign.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/pages\/3310","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/comments?post=3310"}],"version-history":[{"count":7,"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/pages\/3310\/revisions"}],"predecessor-version":[{"id":15115,"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/pages\/3310\/revisions\/15115"}],"wp:attachment":[{"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/media?parent=3310"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}