HTTP Client
1
Total requests
0
HTTP errors
Clients
http_client 1
Requests
| GET | https://frontest.simplyform.lmosoft.com/api/module/details/R%C3%89S33 | Profile | |
|---|---|---|---|
| Response |
200
[ "info" => [ "header_size" => 303 "request_size" => 159 "total_time" => 0.487413 "namelookup_time" => 0.002082 "connect_time" => 0.00246 "pretransfer_time" => 0.010862 "size_download" => 12289.0 "speed_download" => 25234.0 "starttransfer_time" => 0.471294 "primary_ip" => "185.181.163.147" "primary_port" => 443 "local_ip" => "10.52.26.243" "local_port" => 39912 "http_version" => 3 "protocol" => 2 "scheme" => "HTTPS" "appconnect_time_us" => 10728 "connect_time_us" => 2460 "namelookup_time_us" => 2082 "pretransfer_time_us" => 10862 "starttransfer_time_us" => 471294 "total_time_us" => 487413 "effective_method" => "GET" "start_time" => 1765333566.8893 "original_url" => "https://frontest.simplyform.lmosoft.com/api/module/details/R%C3%89S33" "pause_handler" => Closure(float $duration) {#1513 : "Symfony\Component\HttpClient\Response\CurlResponse" : { : CurlHandle {#1487 …} : Symfony\Component\HttpClient\Internal\CurlClientState {#1498 …} : -9223372036854775808 } } "debug" => """ * Trying 185.181.163.147:443...\n * Connected to frontest.simplyform.lmosoft.com (185.181.163.147) port 443 (#0)\n * ALPN, offering h2\n * ALPN, offering http/1.1\n * successfully set certificate verify locations:\n * CAfile: /etc/ssl/certs/ca-certificates.crt\n * CApath: /etc/ssl/certs\n * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384\n * ALPN, server accepted to use h2\n * Server certificate:\n * subject: CN=frontest.simplyform.lmosoft.com\n * start date: Nov 25 23:17:47 2025 GMT\n * expire date: Feb 23 23:17:46 2026 GMT\n * issuer: C=US; O=Let's Encrypt; CN=R13\n * SSL certificate verify ok.\n * Using HTTP2, server supports multi-use\n * Connection state changed (HTTP/2 confirmed)\n * Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0\n * Using Stream ID: 1 (easy handle 0x38d3da0)\n > GET /api/module/details/R%C3%89S33 HTTP/2\r\n Host: frontest.simplyform.lmosoft.com\r\n accept: */*\r\n user-agent: Symfony HttpClient (Curl)\r\n accept-encoding: gzip\r\n \r\n * old SSL session ID is stale, removing\n * Connection state changed (MAX_CONCURRENT_STREAMS == 30)!\n < HTTP/2 200 \r\n < date: Wed, 10 Dec 2025 02:26:06 GMT\r\n < server: Apache\r\n < cache-control: no-cache, private\r\n < x-debug-token: d80b2a\r\n < x-debug-token-link: https://frontest.simplyform.lmosoft.com/_profiler/d80b2a\r\n < x-robots-tag: noindex\r\n < strict-transport-security: max-age=16000000\r\n < content-type: application/json\r\n < \r\n """ ] "response_headers" => [ "HTTP/2 200 " "date: Wed, 10 Dec 2025 02:26:06 GMT" "server: Apache" "cache-control: no-cache, private" "x-debug-token: d80b2a" "x-debug-token-link: https://frontest.simplyform.lmosoft.com/_profiler/d80b2a" "x-robots-tag: noindex" "strict-transport-security: max-age=16000000" "content-type: application/json" ] "response_content" => [ "{"id":33,"heures":21,"min":0,"financeurs":[],"path":"Hacking-et-securite","dateupdate":"26-09-2025","statistiques":{"tauxobtention":"","tauxabandon":"","tauxsatisfaction":"","tauxpoursuiteetude":"","tauxemployabilite":"","salairemoyen":""},"archive":false,"certification":false,"public":"Responsables, architectes s\u00e9curit\u00e9, administrateurs syst\u00e8mes et r\u00e9seaux. Pentesters.","infopratique":"HORAIRES DE LA FORMATION de 9 h 00 \u00e0 12 h 30 et de 13 h 30 \u00e0 17 h 00","cpf":false,"code":"R\u00c9S33","intitule":"Hacking et s\u00e9curit\u00e9 (module)","duree":1260,"mode":"Pr\u00e9sentiel","modes":["Classe virtuelle","Pr\u00e9sentiel"],"niveaumateriel":"4 - Niveau d\u0027\u00e9quipement mat\u00e9riel excellent","niveautechnique":"Expert","description":{"publie":true,"prerequis":"Bonnes connaissances en s\u00e9curit\u00e9 SI, en C, Python et assembleur sont requises.","objectif":"Comprendre les r\u00e9centes attaques et exploitations de syst\u00e8me\r\nComprendre les techniques modernes de contournement des protections applicatives\r\nExploiter une vuln\u00e9rabilit\u00e9 applicative sur les syst\u00e8mes Linux et Windows\r\nCr\u00e9er des shellcodes et payloads (Linux et Windows)","plus":"Acc\u00e8s \u00e0 la biblioth\u00e8que num\u00e9rique pendant 3 mois : + de 1000 tutos, livres num\u00e9riques et vid\u00e9os Salles de formation climatis\u00e9es \u00e9quip\u00e9es d\u2019ordinateurs PC de derni\u00e8re g\u00e9n\u00e9ration Vid\u00e9os projecteurs interactifs Support de cours du formateur.","accessibiliteHandicap":"Dans votre espace candidat, une rubrique d\u00e9di\u00e9e au handicap vous permettra d\u0027exprimer vos besoins d\u0027adaptation afin que vous puissiez suivre votre formation dans les meilleures conditions.","modalitesDelaisAcces":"L\u2019inscription doit \u00eatre finalis\u00e9e 72 heures avant le d\u00e9but de la formation.","modulesExigeAvant":"\u003Cul\u003E\u003C\/ul\u003E","modulesSouhaitableAvant":"\u003Cul\u003E\u003C\/ul\u003E","modulesConseilleApres":"\u003Cul\u003E\u003C\/ul\u003E","infopratique":"HORAIRES DE LA FORMATION de 9 h 00 \u00e0 12 h 30 et de 13 h 30 \u00e0 17 h 00","description":"Cette formation vous apprendra les techniques avanc\u00e9es de hacking. Vous cr\u00e9erez des shellcodes et payload afin d\u2019exploiter des vuln\u00e9rabilit\u00e9s applicatives sur les syst\u00e8mes d\u2019exploitations afin de mieux comprendre les failles et pouvoir \u00e9lever le niveau de","modalitepedagogiques":"Alternance \u00e9quilibr\u00e9e de pr\u00e9sentations, d\u0027ateliers sur simulateur et de mises en situation dans des conditions similaires \u00e0 celles de l\u0027examen.","modaliteevaluationinitial":"Test de positionnement en amont de la session de formation.","modaliteevaluationfinal":"Le formateur \u00e9value la progression p\u00e9dagogique du participant tout au long de la formation au moyen de QCM, mises en situation, travaux pratiques."},"tarifVenteInter":"1380 \u20ac HT","modulesExigeAvant":[],"modulesSouhaitableAvant":[],"modulesConseilleApres":[],"theme":"R\u00e9seaux, s\u00e9curit\u00e9 \u0026 t\u00e9l\u00e9coms","soustheme":"S\u00e9curit\u00e9, sauvegarde et supervision","tarifVenteIntra":"Tarif sur demande","modalitepedagogiques":"Alternance \u00e9quilibr\u00e9e de pr\u00e9sentations, d\u0027ateliers sur simulateur et de mises en situation dans des conditions similaires \u00e0 celles de l\u0027examen.","modaliteevaluationinitial":"Test de positionnement en amont de la session de formation.","modaliteevaluationfinal":"Le formateur \u00e9value la progression p\u00e9dagogique du participant tout au long de la formation au moyen de QCM, mises en situation, travaux pratiques.","listecertifications":[],"listemodules":null,"sessions":[],"competences":{"moduleCompetences":[{"id":72,"intitule":"Comprendre les techniques modernes de contournement des protections applicatives","ordre":1,"duree":60,"type":"module","aevaluer":true,"evaluations":"Les techniques modernes de contournement des protections applicatives sont connues.","criteres":"Les techniques modernes de contournement des protections applicatives sont connues.","modaliteEvaluation":"Un Quiz est propos\u00e9 en fin de s\u00e9quence. ","quiz":"","quizId":null,"documents":[],"procedeevaluations":"\u003Cul\u003E\u003Cli\u003EQuiz\u003C\/li\u003E\u003C\/ul\u003E","procedeevaluationIds":[6447]},{"id":73,"intitule":"Exploiter une vuln\u00e9rabilit\u00e9 applicative sur les syst\u00e8mes Linux et Windows","ordre":2,"duree":60,"type":"module","aevaluer":true,"evaluations":"Une vuln\u00e9rabilit\u00e9 applicative sur les syst\u00e8mes Linux et Windows est exploit\u00e9e.","criteres":"Une vuln\u00e9rabilit\u00e9 applicative sur les syst\u00e8mes Linux et Windows est exploit\u00e9e.","modaliteEvaluation":"Un Quiz est propos\u00e9 en fin de s\u00e9quence. ","quiz":"","quizId":null,"documents":[],"procedeevaluations":"\u003Cul\u003E\u003Cli\u003EQuiz\u003C\/li\u003E\u003C\/ul\u003E","procedeevaluationIds":[6447]},{"id":74,"intitule":"Cr\u00e9er des shellcodes et payloads (Linux et Windows)","ordre":3,"duree":60,"type":"module","aevaluer":true,"evaluations":"Des shellcodes et payloads (Linux et Windows) sont cr\u00e9es.","criteres":"Des shellcodes et payloads (Linux et Windows) sont cr\u00e9es.","modaliteEvaluation":"Un Quiz est propos\u00e9 en fin de s\u00e9quence. ","quiz":"","quizId":null,"documents":[],"procedeevaluations":"\u003Cul\u003E\u003Cli\u003EQuiz\u003C\/li\u003E\u003C\/ul\u003E","procedeevaluationIds":[6447]}]},"seo":{"publication":"\u003Cspan class=\u0022badge bg-success\u0022\u003EPubli\u00e9\u003C\/span\u003E","seotitre":"Hacking et s\u00e9curit\u00e9","seodescription":"Hacking et s\u00e9curit\u00e9","contenuavant":"Hacking et s\u00e9curit\u00e9","contenuapres":"Hacking et s\u00e9curit\u00e9"},"plus":"Acc\u00e8s \u00e0 la biblioth\u00e8que num\u00e9rique pendant 3 mois : + de 1000 tutos, livres num\u00e9riques et vid\u00e9os Salles de formation climatis\u00e9es \u00e9quip\u00e9es d\u2019ordinateurs PC de derni\u00e8re g\u00e9n\u00e9ration Vid\u00e9os projecteurs interactifs Support de cours du formateur.","Images":{"banniere":"https:\/\/frontest.simplyform.lmosoft.com\/uploads\/module\/banniere\/Banniere-Hacking-68d2ca212c872.png","vignette":"https:\/\/frontest.simplyform.lmosoft.com\/uploads\/module\/vignette\/Vignette-Hacking-68d2ca212c465.png","altBanniere":"Hacking","altVignette":"Hacking"},"Programmes":{"chapitres":[{"id":85,"intitule":"L\u0027\u00e9tat de l\u2019art offensif et d\u00e9fensif","ordre":1,"commentaire":"Un peu d\u2019actualit\u00e9 : la 5G, la blockchain, le smart contract, IoTs (objets connect\u00e9s), IA, IPv4, IPv6.\r\nLes derni\u00e8res techniques d\u2019attaques.\r\nLes derni\u00e8res strat\u00e9gies d\u00e9fensives.","travauxpratiques":"Exercice de d\u00e9fense."},{"id":86,"intitule":"Du C \u00e0 l\u0027assembleur au code machine","ordre":2,"commentaire":"Qu\u2019est-ce que l\u2019assembleur et le code machine. La compilation.\r\nLe fonctionnement d\u2019un processeur.\r\nLes bases de l\u2019assembleur et les bases du langage C.\r\nLes concepts de l\u2019encodage (modes d\u0027adressage, registres, instructions, op\u00e9rations\u2026).","travauxpratiques":"TP r\u00e9alis\u00e9 en \u00e9quipe."},{"id":87,"intitule":"Les attaques applicatives","ordre":3,"commentaire":"Les concepts des logiciels malveillants, des malwares (virus, rootkit ou autre).\r\n\u00c9tat de l\u0027art des backdoors sous Windows et Unix\/Linux.\r\nMise en place de backdoors et de trojans.\r\nLes shellcodes, le reverse shell TCP, le Bind Shell TCP.\r\nL\u0027encodage de s","travauxpratiques":"Exploitation de shellcode : buffer overflow (Windows ou Linux). Contourner des protections. Obtenir un shell root par diff\u00e9rents types de buffer overflow. Utiliser Metasploit et g\u00e9n\u00e9rer des shellcode."},{"id":88,"intitule":"Les techniques d\u2019analyse","ordre":4,"commentaire":"Analyse statique des binaires.\r\nOutils d\u0027analyse dynamiques.\r\nLa s\u00e9curit\u00e9 dans le bac \u00e0 sable (sandboxing).\r\nLe reverse engineering et debugging.\r\nPackers et crypters modernes.","travauxpratiques":"Analyse d\u2019un malware avec les diff\u00e9rentes techniques d\u2019analyse."},{"id":89,"intitule":"La cryptanalyse","ordre":5,"commentaire":"Les concepts de la cryptanalyse (processus, chiffrement...).\r\nIdentification des algorithmes.\r\nAttaques sur le chiffrement par flux, sur les modes ECB et CBC.\r\nLes attaques par canaux cach\u00e9s (side-channel attack).\r\nLes attaques sur la blockchain.","travauxpratiques":"Quiz de fin de s\u00e9quence."}]},"programme":"","Othersdomaines":[{"id":23,"intitule":"NOUVEAUTHEME","code":"NOUV","path":"","etat":"\u003Cspan class=\u0022badge bg-success\u0022\u003EActif\u003C\/span\u003E","ordre":2,"couleur":"#48cb8e","archive":false,"commentaire":"NOUVEAUTHEME","seodescription":"NOUVEAUTHEME","seotitre":"NOUVEAUTHEME","publication":"\u003Cspan class=\u0022badge bg-success\u0022\u003EOui\u003C\/span\u003E","banniere":"","vignette":"","altBanniere":"","altVignette":""},{"id":22,"intitule":"MEGATHEME","code":"MEG","path":"","etat":"\u003Cspan class=\u0022badge bg-success\u0022\u003EActif\u003C\/span\u003E","ordre":2,"couleur":"#3f9aec","archive":false,"commentaire":"1234","seodescription":"MEGATHEM","seotitre":"MEGATHEME","publication":"\u003Cspan class=\u0022badge bg-success\u0022\u003EOui\u003C\/span\u003E","banniere":"","vignette":"","altBanniere":"","altVignette":""},{"id":21,"intitule":"Agenda","code":"agenda","path":"","etat":"\u003Cspan class=\u0022badge bg-success\u0022\u003EActif\u003C\/span\u003E","ordre":2,"couleur":"#000000","archive":false,"commentaire":"agenda","seodescription":"agenda","seotitre":"agenda","publication":"\u003Cspan class=\u0022badge bg-success\u0022\u003EOui\u003C\/span\u003E","banniere":"","vignette":"","altBanniere":"","altVignette":""},{"id":20,"intitule":"Hypertest","code":"HYP","path":"","etat":"\u003Cspan class=\u0022badge bg-success\u0022\u003EActif\u003C\/span\u003E","ordre":2,"couleur":"#249b91","archive":false,"commentaire":"Hypertest","seodescription":"Hypertest","seotitre":"Hypertest","publication":"\u003Cspan class=\u0022badge bg-success\u0022\u003EOui\u003C\/span\u003E","banniere":"https:\/\/frontest.simplyform.lmosoft.com\/uploads\/theme\/banniere\/Screenshot-from-2024-05-19-19-26-32-6909edddcacd7.png","vignette":"https:\/\/frontest.simplyform.lmosoft.com\/uploads\/theme\/vignette\/Screenshot-from-2024-05-19-19-26-32-6909edddca904.png","altBanniere":"banniere","altVignette":"vignette*"},{"id":19,"intitule":"Gigatheme","code":"GIG","path":"","etat":"\u003Cspan class=\u0022badge bg-success\u0022\u003EActif\u003C\/span\u003E","ordre":2,"couleur":"#cd2727","archive":false,"commentaire":"Gigatheme","seodescription":"Gigatheme","seotitre":"Gigatheme","publication":"\u003Cspan class=\u0022badge bg-success\u0022\u003EOui\u003C\/span\u003E","banniere":"","vignette":"","altBanniere":"","altVignette":""},{"id":18,"intitule":"Sauvetage","code":"SAUV","path":"","etat":"\u003Cspan class=\u0022badge bg-success\u0022\u003EActif\u003C\/span\u003E","ordre":2,"couleur":"#ddd052","archive":false,"commentaire":"Sauvetage","seodescription":"Sauvetage","seotitre":"Sauvetage","publication":"\u003Cspan class=\u0022badge bg-success\u0022\u003EOui\u003C\/span\u003E","banniere":"","vignette":"","altBanniere":"","altVignette":""}],"Details":{"identifiantDokelio":"","public":"Responsables, architectes s\u00e9curit\u00e9, administrateurs syst\u00e8mes et r\u00e9seaux. Pentesters.","commentaire":"","iscpf":false,"cpf":"\u003Cspan class=\u0022badge bg-danger\u0022\u003ESans CPF\u003C\/span\u003E","niveautechnique":"Expert","niveaumateriel":"4 - Niveau d\u0027\u00e9quipement mat\u00e9riel excellent","autoriteDelivranceCpf":null,"codeCpfSalarie":"","codeCpfDemandeurEmploi":"","financeurs":"\u003Cul\u003E\u003C\/ul\u003E","sessions":[]},"Certifications":{"certifiante":"\u003Cspan class=\u0022badge bg-danger\u0022\u003ENon\u003C\/span\u003E","certifiantes":"\u003Cspan class=\u0022badge bg-danger\u0022\u003ENon\u003C\/span\u003E","certificationcommentaire":"","certifications":"\u003Cul\u003E\u003C\/ul\u003E"},"type":"module","urlFront":"https:\/\/frontest.simplyform.lmosoft.com\/33\/module-export-pdf-front"}" ] ] |
d80b2a | |