<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>EternalBlue on blog</title><link>https://blog.louzar.com/tags/eternalblue/</link><description>Recent content in EternalBlue on blog</description><generator>Hugo -- gohugo.io</generator><language>fr</language><copyright>© 2026 Amine Louzar</copyright><lastBuildDate>Fri, 04 Aug 2023 00:00:00 +0000</lastBuildDate><atom:link href="https://blog.louzar.com/tags/eternalblue/index.xml" rel="self" type="application/rss+xml"/><item><title>EternalBlue ou MS17-010</title><link>https://blog.louzar.com/cyber-posts-vulnerabilities/eternalblue/</link><pubDate>Fri, 04 Aug 2023 00:00:00 +0000</pubDate><guid>https://blog.louzar.com/cyber-posts-vulnerabilities/eternalblue/</guid><description>EternalBlue est un exploit connu qui cible les versions de Windows de Microsoft, exploitant une vulnérabilité dans le protocole SMB et permettant à un attaquant de prendre le contrôle total d&amp;rsquo;un système.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://blog.louzar.com/cyber-posts-vulnerabilities/eternalblue/cover.png"/></item></channel></rss>