{"id":416,"date":"2025-07-30T10:17:38","date_gmt":"2025-07-30T08:17:38","guid":{"rendered":"https:\/\/network360.fr\/?p=416"},"modified":"2025-07-30T10:36:31","modified_gmt":"2025-07-30T08:36:31","slug":"verifier-hash-fichier-windows","status":"publish","type":"post","link":"https:\/\/network360.fr\/index.php\/2025\/07\/30\/verifier-hash-fichier-windows\/","title":{"rendered":"V\u00e9rifier le HASH d&rsquo;un fichier sous Windows"},"content":{"rendered":"\n<p>R\u00e9cemment un coll\u00e8gue m&rsquo;a demand\u00e9 comment faire pour v\u00e9rifier le hash d&rsquo;un fichier ISE.<\/p>\n\n\n\n<p>Dans cet article, je vous explique <strong>comment v\u00e9rifier le hash d\u2019un fichier sous Windows<\/strong>, pourquoi c\u2019est indispensable, et je vous donne un exemple concret avec un patch Cisco ISE.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-left\">C&rsquo;est quoi, un hash ? <\/h3>\n\n\n\n<p>Le <strong>HASH<\/strong> est l&#8217;empreinte d&rsquo;un fichier, sa carte d&rsquo;identit\u00e9. Lorsque vous t\u00e9l\u00e9chargez un fichier sur un site de confiance, le site vous propose g\u00e9n\u00e9ralement le hash du fichier. Cela vous permet de recalculer le hash du fichier et de le comparer une fois t\u00e9l\u00e9charg\u00e9.<\/p>\n\n\n\n<p>Si votre hash une fois calcul\u00e9 est identique au hash du site, alors le fichier est intact !<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img decoding=\"async\" width=\"1024\" height=\"1024\" data-src=\"https:\/\/network360.fr\/wp-content\/uploads\/2024\/12\/hash.raton_.webp\" alt=\"\" class=\"wp-image-421 lazyload\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/1024;width:354px;height:auto\" data-srcset=\"https:\/\/network360.fr\/wp-content\/uploads\/2024\/12\/hash.raton_.webp 1024w, https:\/\/network360.fr\/wp-content\/uploads\/2024\/12\/hash.raton_-300x300.webp 300w, https:\/\/network360.fr\/wp-content\/uploads\/2024\/12\/hash.raton_-150x150.webp 150w, https:\/\/network360.fr\/wp-content\/uploads\/2024\/12\/hash.raton_-768x768.webp 768w, https:\/\/network360.fr\/wp-content\/uploads\/2024\/12\/hash.raton_-600x600.webp 600w, https:\/\/network360.fr\/wp-content\/uploads\/2024\/12\/hash.raton_-100x100.webp 100w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Que se passe-t-il si mon hash n&rsquo;est pas bon ? <\/strong><\/h4>\n\n\n\n<p>Votre fichier a \u00e9t\u00e9 alt\u00e9r\u00e9, il est corrompu. Vous devez le re-t\u00e9l\u00e9charger. <\/p>\n\n\n\n<p>Il se peut que lors du t\u00e9l\u00e9chargement, le fichier ait \u00e9t\u00e9 alt\u00e9r\u00e9.<\/p>\n\n\n\n<p>Il est aussi possible que le fichier mis \u00e0 disposition sur le site soit directement alt\u00e9r\u00e9. <\/p>\n\n\n\n<p><\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Et si j&rsquo;utilise quand m\u00eame mon fichier ? <\/strong><\/h4>\n\n\n\n<p>Vous prenez un risque important, <strong>potentiellement critique.<\/strong><\/p>\n\n\n\n<p>Si c&rsquo;est un ancien switch, il red\u00e9marrera en mode \u00ab\u00a0<strong>ROMMON<\/strong>\u00ab\u00a0. Il faudra ensuite lui r\u00e9injecter un fichier non corrompu. Et \u00e7a prend du temps, beaucoup de temps.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><img decoding=\"async\" width=\"1024\" height=\"683\" data-src=\"https:\/\/network360.fr\/wp-content\/uploads\/2025\/07\/pexels-photo-3808012-3808012-1024x683.jpg\" alt=\"Bored ethnic female in casual clothes sitting at table with netbook and watching sad movie while resting at home during weekend\" class=\"wp-image-796 lazyload\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/683;width:539px;height:auto\" data-srcset=\"https:\/\/network360.fr\/wp-content\/uploads\/2025\/07\/pexels-photo-3808012-3808012-1024x683.jpg 1024w, https:\/\/network360.fr\/wp-content\/uploads\/2025\/07\/pexels-photo-3808012-3808012-300x200.jpg 300w, https:\/\/network360.fr\/wp-content\/uploads\/2025\/07\/pexels-photo-3808012-3808012-768x512.jpg 768w, https:\/\/network360.fr\/wp-content\/uploads\/2025\/07\/pexels-photo-3808012-3808012-1536x1024.jpg 1536w, https:\/\/network360.fr\/wp-content\/uploads\/2025\/07\/pexels-photo-3808012-3808012-2048x1365.jpg 2048w, https:\/\/network360.fr\/wp-content\/uploads\/2025\/07\/pexels-photo-3808012-3808012-1320x880.jpg 1320w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" \/><\/figure>\n\n\n\n<p>Si c&rsquo;est un switch r\u00e9cent, ou un serveur, l&rsquo;\u00e9quipement ignorera le fichier et il faudra r\u00e9injecter un fichier non alt\u00e9r\u00e9.<\/p>\n\n\n\n<p><strong>Dans tous les cas, \u00e7a ne fonctionnera pas.<\/strong><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h4 class=\"wp-block-heading\">\u00ab\u00a0<strong>C&rsquo;est trop long, ce n\u2019est pas utile<\/strong>,<strong> j&rsquo;ai jamais eu de fichier alt\u00e9r\u00e9<\/strong>\u00ab\u00a0<\/h4>\n\n\n\n<p>J&rsquo;ai d\u00e9j\u00e0 eu ce genre de remarque. Croyez-moi, le jour o\u00f9 \u00e7a plante, vous le regretterez. Votre migration qui devait durer 2 heures va se terminer en une nuit enti\u00e8re devant l&rsquo;\u00e9quipement d\u00e9fectueux.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Exemple : Patch pour une ISE<\/h2>\n\n\n\n<h4 class=\"wp-block-heading\">R\u00e9cup\u00e9ration du hash sur le site constructeur<\/h4>\n\n\n\n<p>Je d\u00e9cide de t\u00e9l\u00e9charger le patch 3 pour mon installation d&rsquo;ISE en version 3.3.<\/p>\n\n\n\n<p>Je vais donc sur le site du constructeur. (<a href=\"http:\/\/software.cisco.com\">software.cisco.com<\/a>)<\/p>\n\n\n\n<p>Lorsque je laisse ma souris sur le nom du fichier, le site me propose deux hash : <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>MD5<\/li>\n\n\n\n<li>SHA-512<\/li>\n<\/ul>\n\n\n\n<p>MD5, SHA sont des algorithmes de hachage. Ils permettent de transformer votre fichier en une empreinte. (Comme vous et votre empreinte de pouce).<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large\"><img decoding=\"async\" width=\"1024\" height=\"439\" data-src=\"https:\/\/network360.fr\/wp-content\/uploads\/2024\/12\/image-21-1024x439.png\" alt=\"\" class=\"wp-image-422 lazyload\" data-srcset=\"https:\/\/network360.fr\/wp-content\/uploads\/2024\/12\/image-21-1024x439.png 1024w, https:\/\/network360.fr\/wp-content\/uploads\/2024\/12\/image-21-300x129.png 300w, https:\/\/network360.fr\/wp-content\/uploads\/2024\/12\/image-21-768x329.png 768w, https:\/\/network360.fr\/wp-content\/uploads\/2024\/12\/image-21-600x257.png 600w, https:\/\/network360.fr\/wp-content\/uploads\/2024\/12\/image-21.png 1236w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/439;\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>Je r\u00e9cup\u00e8re le hash et je le garde dans un fichier Notepad++.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" width=\"628\" height=\"250\" data-src=\"https:\/\/network360.fr\/wp-content\/uploads\/2024\/12\/image-22.png\" alt=\"\" class=\"wp-image-423 lazyload\" data-srcset=\"https:\/\/network360.fr\/wp-content\/uploads\/2024\/12\/image-22.png 628w, https:\/\/network360.fr\/wp-content\/uploads\/2024\/12\/image-22-300x119.png 300w, https:\/\/network360.fr\/wp-content\/uploads\/2024\/12\/image-22-600x239.png 600w\" data-sizes=\"(max-width: 628px) 100vw, 628px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 628px; --smush-placeholder-aspect-ratio: 628\/250;\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Calcul du hash sur le fichier t\u00e9l\u00e9charg\u00e9 <\/h4>\n\n\n\n<p>Maintenant je me rends dans mon dossier de t\u00e9l\u00e9chargement.<\/p>\n\n\n\n<p>Vous pouvez y aller avec le gestionnaire de fichiers et faire un clic droit dessus (Ouvrir dans le terminal)<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" width=\"368\" height=\"434\" data-src=\"https:\/\/network360.fr\/wp-content\/uploads\/2025\/07\/image-1.png\" alt=\"\" class=\"wp-image-799 lazyload\" data-srcset=\"https:\/\/network360.fr\/wp-content\/uploads\/2025\/07\/image-1.png 368w, https:\/\/network360.fr\/wp-content\/uploads\/2025\/07\/image-1-254x300.png 254w\" data-sizes=\"(max-width: 368px) 100vw, 368px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 368px; --smush-placeholder-aspect-ratio: 368\/434;\" \/><\/figure>\n\n\n\n<p>J&rsquo;utilise la commande suivante pour calculer mon hash :<\/p>\n\n\n<div class=\"wp-block-prettycode-code  \">\n  <header class=\"prettycode-header\">\n    <div class=\"prettycode-lang is-lang-html\">\n      HTML    <\/div>\n    <div class=\"prettycode-file\">\n          <\/div>\n  <\/header>\n  <textarea\n    class=\"prettycode-source\"\n    name=\"codemirror-1632560601\"\n    id=\"codemirror-1632560601\"\n  >certutil -hashfile NOMDUFICHER md5<\/textarea>\n  <script>\n    CodeMirror.fromTextArea( document.getElementById('codemirror-1632560601'), {\n      mode: 'xml',\n      readOnly: true,\n      theme: 'hopscotch',\n      lineNumbers: true,\n      firstLineNumber: 1,\n      matchBrackets: true,\n      indentUnit: 4,\n      tabSize: 4,\n      lineWrapping: true,\n    } );\n  <\/script>\n<\/div>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"117\" data-src=\"https:\/\/network360.fr\/wp-content\/uploads\/2024\/12\/image-24-1024x117.png\" alt=\"\" class=\"wp-image-425 lazyload\" data-srcset=\"https:\/\/network360.fr\/wp-content\/uploads\/2024\/12\/image-24-1024x117.png 1024w, https:\/\/network360.fr\/wp-content\/uploads\/2024\/12\/image-24-300x34.png 300w, https:\/\/network360.fr\/wp-content\/uploads\/2024\/12\/image-24-768x88.png 768w, https:\/\/network360.fr\/wp-content\/uploads\/2024\/12\/image-24-600x68.png 600w, https:\/\/network360.fr\/wp-content\/uploads\/2024\/12\/image-24.png 1061w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/117;\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>Mon PC vient de recalculer mon hash. Il ne me reste plus qu&rsquo;\u00e0 le comparer.<\/p>\n\n\n\n<p>Je copie\/colle mon hash dans Notepad++ et je v\u00e9rifie.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" width=\"507\" height=\"203\" data-src=\"https:\/\/network360.fr\/wp-content\/uploads\/2024\/12\/image-25.png\" alt=\"\" class=\"wp-image-426 lazyload\" data-srcset=\"https:\/\/network360.fr\/wp-content\/uploads\/2024\/12\/image-25.png 507w, https:\/\/network360.fr\/wp-content\/uploads\/2024\/12\/image-25-300x120.png 300w\" data-sizes=\"(max-width: 507px) 100vw, 507px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 507px; --smush-placeholder-aspect-ratio: 507\/203;\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>Les empreintes sont identiques. Je peux utiliser le fichier t\u00e9l\u00e9charg\u00e9 sans risque de corruption. <\/p>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-large-font-size\">Conclusion<\/p>\n\n\n\n<p>Que vous manipuliez des images ISO, des binaires Cisco, <strong>v\u00e9rifier l\u2019int\u00e9grit\u00e9 du fichier<\/strong> vous prot\u00e8ge contre les fichiers corrompus, alt\u00e9r\u00e9s ou mal t\u00e9l\u00e9charg\u00e9s.<\/p>\n\n\n\n<p><strong>Prenez l\u2019habitude<\/strong> : calculez toujours le hash, comparez-le avec celui du site constructeur.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>R\u00e9cemment un coll\u00e8gue m&rsquo;a demand\u00e9 comment faire pour v\u00e9rifier le hash d&rsquo;un fichier ISE. Dans cet article, je vous explique [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":689,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[21],"tags":[56,28,80],"class_list":["post-416","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-astuces","tag-astuce","tag-cisco","tag-hash"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>V\u00e9rifier le HASH d&#039;un fichier sous Windows - Network360<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/network360.fr\/index.php\/2025\/07\/30\/verifier-hash-fichier-windows\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"V\u00e9rifier le HASH d&#039;un fichier sous Windows - Network360\" \/>\n<meta property=\"og:description\" content=\"R\u00e9cemment un coll\u00e8gue m&rsquo;a demand\u00e9 comment faire pour v\u00e9rifier le hash d&rsquo;un fichier ISE. Dans cet article, je vous explique [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/network360.fr\/index.php\/2025\/07\/30\/verifier-hash-fichier-windows\/\" \/>\n<meta property=\"og:site_name\" content=\"Network360\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-30T08:17:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-30T08:36:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/network360.fr\/wp-content\/uploads\/2025\/06\/g657a1da4b0707ca94ec59a481b6309f6fa6c30f626d49ce48adebcf9fa405a9afe639be1dd179de6d0d19e0099c08f951b02140e852b7b27c232fe1265dde096_1280-5419943.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"753\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/network360.fr\\\/index.php\\\/2025\\\/07\\\/30\\\/verifier-hash-fichier-windows\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/network360.fr\\\/index.php\\\/2025\\\/07\\\/30\\\/verifier-hash-fichier-windows\\\/\"},\"author\":{\"name\":\"Admin\",\"@id\":\"https:\\\/\\\/network360.fr\\\/#\\\/schema\\\/person\\\/0f765d2aa5031b9c6e0ff879e9622f00\"},\"headline\":\"V\u00e9rifier le HASH d&rsquo;un fichier sous Windows\",\"datePublished\":\"2025-07-30T08:17:38+00:00\",\"dateModified\":\"2025-07-30T08:36:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/network360.fr\\\/index.php\\\/2025\\\/07\\\/30\\\/verifier-hash-fichier-windows\\\/\"},\"wordCount\":556,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/network360.fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/network360.fr\\\/index.php\\\/2025\\\/07\\\/30\\\/verifier-hash-fichier-windows\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/network360.fr\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/g657a1da4b0707ca94ec59a481b6309f6fa6c30f626d49ce48adebcf9fa405a9afe639be1dd179de6d0d19e0099c08f951b02140e852b7b27c232fe1265dde096_1280-5419943.jpg\",\"keywords\":[\"Astuce\",\"Cisco\",\"Hash\"],\"articleSection\":[\"Astuces\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/network360.fr\\\/index.php\\\/2025\\\/07\\\/30\\\/verifier-hash-fichier-windows\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/network360.fr\\\/index.php\\\/2025\\\/07\\\/30\\\/verifier-hash-fichier-windows\\\/\",\"url\":\"https:\\\/\\\/network360.fr\\\/index.php\\\/2025\\\/07\\\/30\\\/verifier-hash-fichier-windows\\\/\",\"name\":\"V\u00e9rifier le HASH d'un fichier sous Windows - Network360\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/network360.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/network360.fr\\\/index.php\\\/2025\\\/07\\\/30\\\/verifier-hash-fichier-windows\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/network360.fr\\\/index.php\\\/2025\\\/07\\\/30\\\/verifier-hash-fichier-windows\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/network360.fr\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/g657a1da4b0707ca94ec59a481b6309f6fa6c30f626d49ce48adebcf9fa405a9afe639be1dd179de6d0d19e0099c08f951b02140e852b7b27c232fe1265dde096_1280-5419943.jpg\",\"datePublished\":\"2025-07-30T08:17:38+00:00\",\"dateModified\":\"2025-07-30T08:36:31+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/network360.fr\\\/index.php\\\/2025\\\/07\\\/30\\\/verifier-hash-fichier-windows\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/network360.fr\\\/index.php\\\/2025\\\/07\\\/30\\\/verifier-hash-fichier-windows\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/network360.fr\\\/index.php\\\/2025\\\/07\\\/30\\\/verifier-hash-fichier-windows\\\/#primaryimage\",\"url\":\"https:\\\/\\\/network360.fr\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/g657a1da4b0707ca94ec59a481b6309f6fa6c30f626d49ce48adebcf9fa405a9afe639be1dd179de6d0d19e0099c08f951b02140e852b7b27c232fe1265dde096_1280-5419943.jpg\",\"contentUrl\":\"https:\\\/\\\/network360.fr\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/g657a1da4b0707ca94ec59a481b6309f6fa6c30f626d49ce48adebcf9fa405a9afe639be1dd179de6d0d19e0099c08f951b02140e852b7b27c232fe1265dde096_1280-5419943.jpg\",\"width\":1280,\"height\":753,\"caption\":\"floppy disk, computer, file, data, bits, technology, binary, floppy disk, floppy disk, floppy disk, floppy disk, floppy disk, file\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/network360.fr\\\/index.php\\\/2025\\\/07\\\/30\\\/verifier-hash-fichier-windows\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/network360.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"V\u00e9rifier le HASH d&rsquo;un fichier sous Windows\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/network360.fr\\\/#website\",\"url\":\"https:\\\/\\\/network360.fr\\\/\",\"name\":\"Network360\",\"description\":\"Network360.FR | Boostez votre carri\u00e8re r\u00e9seau : CCNA, Cisco, Automation |\",\"publisher\":{\"@id\":\"https:\\\/\\\/network360.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/network360.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/network360.fr\\\/#organization\",\"name\":\"Network360\",\"url\":\"https:\\\/\\\/network360.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/network360.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/network360.fr\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/cropped-LOGO3-3_preview_rev_1-1.png?fit=501%2C410&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/network360.fr\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/cropped-LOGO3-3_preview_rev_1-1.png?fit=501%2C410&ssl=1\",\"width\":501,\"height\":410,\"caption\":\"Network360\"},\"image\":{\"@id\":\"https:\\\/\\\/network360.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/network360.fr\\\/#\\\/schema\\\/person\\\/0f765d2aa5031b9c6e0ff879e9622f00\",\"name\":\"Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/268fa79373fa3d1db9782a1cda40eca20b34e670aede3da90a8fb05b69521bbd?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/268fa79373fa3d1db9782a1cda40eca20b34e670aede3da90a8fb05b69521bbd?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/268fa79373fa3d1db9782a1cda40eca20b34e670aede3da90a8fb05b69521bbd?s=96&d=mm&r=g\",\"caption\":\"Admin\"},\"sameAs\":[\"https:\\\/\\\/network360.fr\"],\"url\":\"https:\\\/\\\/network360.fr\\\/index.php\\\/author\\\/netadmin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"V\u00e9rifier le HASH d'un fichier sous Windows - Network360","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/network360.fr\/index.php\/2025\/07\/30\/verifier-hash-fichier-windows\/","og_locale":"fr_FR","og_type":"article","og_title":"V\u00e9rifier le HASH d'un fichier sous Windows - Network360","og_description":"R\u00e9cemment un coll\u00e8gue m&rsquo;a demand\u00e9 comment faire pour v\u00e9rifier le hash d&rsquo;un fichier ISE. Dans cet article, je vous explique [&hellip;]","og_url":"https:\/\/network360.fr\/index.php\/2025\/07\/30\/verifier-hash-fichier-windows\/","og_site_name":"Network360","article_published_time":"2025-07-30T08:17:38+00:00","article_modified_time":"2025-07-30T08:36:31+00:00","og_image":[{"width":1280,"height":753,"url":"https:\/\/network360.fr\/wp-content\/uploads\/2025\/06\/g657a1da4b0707ca94ec59a481b6309f6fa6c30f626d49ce48adebcf9fa405a9afe639be1dd179de6d0d19e0099c08f951b02140e852b7b27c232fe1265dde096_1280-5419943.jpg","type":"image\/jpeg"}],"author":"Admin","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Admin","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/network360.fr\/index.php\/2025\/07\/30\/verifier-hash-fichier-windows\/#article","isPartOf":{"@id":"https:\/\/network360.fr\/index.php\/2025\/07\/30\/verifier-hash-fichier-windows\/"},"author":{"name":"Admin","@id":"https:\/\/network360.fr\/#\/schema\/person\/0f765d2aa5031b9c6e0ff879e9622f00"},"headline":"V\u00e9rifier le HASH d&rsquo;un fichier sous Windows","datePublished":"2025-07-30T08:17:38+00:00","dateModified":"2025-07-30T08:36:31+00:00","mainEntityOfPage":{"@id":"https:\/\/network360.fr\/index.php\/2025\/07\/30\/verifier-hash-fichier-windows\/"},"wordCount":556,"commentCount":0,"publisher":{"@id":"https:\/\/network360.fr\/#organization"},"image":{"@id":"https:\/\/network360.fr\/index.php\/2025\/07\/30\/verifier-hash-fichier-windows\/#primaryimage"},"thumbnailUrl":"https:\/\/network360.fr\/wp-content\/uploads\/2025\/06\/g657a1da4b0707ca94ec59a481b6309f6fa6c30f626d49ce48adebcf9fa405a9afe639be1dd179de6d0d19e0099c08f951b02140e852b7b27c232fe1265dde096_1280-5419943.jpg","keywords":["Astuce","Cisco","Hash"],"articleSection":["Astuces"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/network360.fr\/index.php\/2025\/07\/30\/verifier-hash-fichier-windows\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/network360.fr\/index.php\/2025\/07\/30\/verifier-hash-fichier-windows\/","url":"https:\/\/network360.fr\/index.php\/2025\/07\/30\/verifier-hash-fichier-windows\/","name":"V\u00e9rifier le HASH d'un fichier sous Windows - Network360","isPartOf":{"@id":"https:\/\/network360.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/network360.fr\/index.php\/2025\/07\/30\/verifier-hash-fichier-windows\/#primaryimage"},"image":{"@id":"https:\/\/network360.fr\/index.php\/2025\/07\/30\/verifier-hash-fichier-windows\/#primaryimage"},"thumbnailUrl":"https:\/\/network360.fr\/wp-content\/uploads\/2025\/06\/g657a1da4b0707ca94ec59a481b6309f6fa6c30f626d49ce48adebcf9fa405a9afe639be1dd179de6d0d19e0099c08f951b02140e852b7b27c232fe1265dde096_1280-5419943.jpg","datePublished":"2025-07-30T08:17:38+00:00","dateModified":"2025-07-30T08:36:31+00:00","breadcrumb":{"@id":"https:\/\/network360.fr\/index.php\/2025\/07\/30\/verifier-hash-fichier-windows\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/network360.fr\/index.php\/2025\/07\/30\/verifier-hash-fichier-windows\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/network360.fr\/index.php\/2025\/07\/30\/verifier-hash-fichier-windows\/#primaryimage","url":"https:\/\/network360.fr\/wp-content\/uploads\/2025\/06\/g657a1da4b0707ca94ec59a481b6309f6fa6c30f626d49ce48adebcf9fa405a9afe639be1dd179de6d0d19e0099c08f951b02140e852b7b27c232fe1265dde096_1280-5419943.jpg","contentUrl":"https:\/\/network360.fr\/wp-content\/uploads\/2025\/06\/g657a1da4b0707ca94ec59a481b6309f6fa6c30f626d49ce48adebcf9fa405a9afe639be1dd179de6d0d19e0099c08f951b02140e852b7b27c232fe1265dde096_1280-5419943.jpg","width":1280,"height":753,"caption":"floppy disk, computer, file, data, bits, technology, binary, floppy disk, floppy disk, floppy disk, floppy disk, floppy disk, file"},{"@type":"BreadcrumbList","@id":"https:\/\/network360.fr\/index.php\/2025\/07\/30\/verifier-hash-fichier-windows\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/network360.fr\/"},{"@type":"ListItem","position":2,"name":"V\u00e9rifier le HASH d&rsquo;un fichier sous Windows"}]},{"@type":"WebSite","@id":"https:\/\/network360.fr\/#website","url":"https:\/\/network360.fr\/","name":"Network360","description":"Network360.FR | Boostez votre carri\u00e8re r\u00e9seau : CCNA, Cisco, Automation |","publisher":{"@id":"https:\/\/network360.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/network360.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/network360.fr\/#organization","name":"Network360","url":"https:\/\/network360.fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/network360.fr\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/network360.fr\/wp-content\/uploads\/2024\/12\/cropped-LOGO3-3_preview_rev_1-1.png?fit=501%2C410&ssl=1","contentUrl":"https:\/\/i0.wp.com\/network360.fr\/wp-content\/uploads\/2024\/12\/cropped-LOGO3-3_preview_rev_1-1.png?fit=501%2C410&ssl=1","width":501,"height":410,"caption":"Network360"},"image":{"@id":"https:\/\/network360.fr\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/network360.fr\/#\/schema\/person\/0f765d2aa5031b9c6e0ff879e9622f00","name":"Admin","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/268fa79373fa3d1db9782a1cda40eca20b34e670aede3da90a8fb05b69521bbd?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/268fa79373fa3d1db9782a1cda40eca20b34e670aede3da90a8fb05b69521bbd?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/268fa79373fa3d1db9782a1cda40eca20b34e670aede3da90a8fb05b69521bbd?s=96&d=mm&r=g","caption":"Admin"},"sameAs":["https:\/\/network360.fr"],"url":"https:\/\/network360.fr\/index.php\/author\/netadmin\/"}]}},"uagb_featured_image_src":{"full":["https:\/\/network360.fr\/wp-content\/uploads\/2025\/06\/g657a1da4b0707ca94ec59a481b6309f6fa6c30f626d49ce48adebcf9fa405a9afe639be1dd179de6d0d19e0099c08f951b02140e852b7b27c232fe1265dde096_1280-5419943.jpg",1280,753,false],"thumbnail":["https:\/\/network360.fr\/wp-content\/uploads\/2025\/06\/g657a1da4b0707ca94ec59a481b6309f6fa6c30f626d49ce48adebcf9fa405a9afe639be1dd179de6d0d19e0099c08f951b02140e852b7b27c232fe1265dde096_1280-5419943-150x150.jpg",150,150,true],"medium":["https:\/\/network360.fr\/wp-content\/uploads\/2025\/06\/g657a1da4b0707ca94ec59a481b6309f6fa6c30f626d49ce48adebcf9fa405a9afe639be1dd179de6d0d19e0099c08f951b02140e852b7b27c232fe1265dde096_1280-5419943-300x176.jpg",300,176,true],"medium_large":["https:\/\/network360.fr\/wp-content\/uploads\/2025\/06\/g657a1da4b0707ca94ec59a481b6309f6fa6c30f626d49ce48adebcf9fa405a9afe639be1dd179de6d0d19e0099c08f951b02140e852b7b27c232fe1265dde096_1280-5419943-768x452.jpg",768,452,true],"large":["https:\/\/network360.fr\/wp-content\/uploads\/2025\/06\/g657a1da4b0707ca94ec59a481b6309f6fa6c30f626d49ce48adebcf9fa405a9afe639be1dd179de6d0d19e0099c08f951b02140e852b7b27c232fe1265dde096_1280-5419943-1024x602.jpg",1024,602,true],"hd_qu_size2":["https:\/\/network360.fr\/wp-content\/uploads\/2025\/06\/g657a1da4b0707ca94ec59a481b6309f6fa6c30f626d49ce48adebcf9fa405a9afe639be1dd179de6d0d19e0099c08f951b02140e852b7b27c232fe1265dde096_1280-5419943.jpg",400,235,false],"1536x1536":["https:\/\/network360.fr\/wp-content\/uploads\/2025\/06\/g657a1da4b0707ca94ec59a481b6309f6fa6c30f626d49ce48adebcf9fa405a9afe639be1dd179de6d0d19e0099c08f951b02140e852b7b27c232fe1265dde096_1280-5419943.jpg",1280,753,false],"2048x2048":["https:\/\/network360.fr\/wp-content\/uploads\/2025\/06\/g657a1da4b0707ca94ec59a481b6309f6fa6c30f626d49ce48adebcf9fa405a9afe639be1dd179de6d0d19e0099c08f951b02140e852b7b27c232fe1265dde096_1280-5419943.jpg",1280,753,false]},"uagb_author_info":{"display_name":"Admin","author_link":"https:\/\/network360.fr\/index.php\/author\/netadmin\/"},"uagb_comment_info":0,"uagb_excerpt":"R\u00e9cemment un coll\u00e8gue m&rsquo;a demand\u00e9 comment faire pour v\u00e9rifier le hash d&rsquo;un fichier ISE. Dans cet article, je vous explique [&hellip;]","_links":{"self":[{"href":"https:\/\/network360.fr\/index.php\/wp-json\/wp\/v2\/posts\/416","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/network360.fr\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/network360.fr\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/network360.fr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/network360.fr\/index.php\/wp-json\/wp\/v2\/comments?post=416"}],"version-history":[{"count":9,"href":"https:\/\/network360.fr\/index.php\/wp-json\/wp\/v2\/posts\/416\/revisions"}],"predecessor-version":[{"id":810,"href":"https:\/\/network360.fr\/index.php\/wp-json\/wp\/v2\/posts\/416\/revisions\/810"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/network360.fr\/index.php\/wp-json\/wp\/v2\/media\/689"}],"wp:attachment":[{"href":"https:\/\/network360.fr\/index.php\/wp-json\/wp\/v2\/media?parent=416"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/network360.fr\/index.php\/wp-json\/wp\/v2\/categories?post=416"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/network360.fr\/index.php\/wp-json\/wp\/v2\/tags?post=416"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}