{"id":395,"date":"2015-11-08T20:43:06","date_gmt":"2015-11-08T20:43:06","guid":{"rendered":"http:\/\/nethemba.com\/cs\/?page_id=395"},"modified":"2019-08-27T10:31:51","modified_gmt":"2019-08-27T09:31:51","slug":"externi-penetracni-test","status":"publish","type":"page","link":"https:\/\/nethemba.com\/cs\/sluzby\/sitova-a-systemova-bezpecnost\/externi-penetracni-test\/","title":{"rendered":"Extern\u00ed penetra\u010dn\u00ed test"},"content":{"rendered":"<p>Uveden\u00e9 testov\u00e1n\u00ed se skl\u00e1d\u00e1 z n\u011bkolika f\u00e1z\u00ed, kter\u00e9 jsou realizov\u00e1ny v souladu s <a href=\"http:\/\/www.isecom.org\/research\/osstmm.html\">OSSTMM<\/a> metodologii.<\/p>\n<p>Pou\u017eit\u00e9 n\u00e1stroje a postupy jsou definov\u00e1ny v <a href=\"http:\/\/www.vulnerabilityassessment.co.uk\/Penetration%20Test.html\">Penetration Testing Framework<\/a>.<\/p>\n<p>Test je realizov\u00e1n z pohledu potenci\u00e1ln\u00edho anonymn\u00edho \u00fato\u010dn\u00edka z Internetu, kter\u00fd nedisponuje \u017e\u00e1dn\u00fdmi informacemi o zkou\u0161en\u00e9 topologii a testovan\u00fdch slu\u017eb\u00e1ch.<\/p>\n<p>Samotn\u00e9 testov\u00e1n\u00ed prob\u00edh\u00e1<strong> ve t\u0159ech f\u00e1z\u00edch:<\/strong><\/p>\n<ol>\n<li>Prvn\u00ed f\u00e1ze p\u0159edstavuje scan (v\u00fd\u010det) kompletn\u00edho rozsahu TCP \/ UDP port\u016f (1-65535) dan\u00e9ho aktivn\u00edho prvku (server, router v Internetu \/ DMZ). Je mo\u017en\u00e9 realizovat speci\u00e1ln\u00ed anti-IDS scan, kdy se sni\u017euje mo\u017enost jeho detekce p\u0159\u00edpadn\u00fdmi IDS (vhodn\u00e9 pro ov\u011b\u0159en\u00ed spr\u00e1vn\u00e9 funkcionality ITS). P\u0159i enumer\u00e1cii se pou\u017eije TCP SYN (Half-Open), TCP (full connect), TCP fragmenty v opa\u010dn\u00e9m po\u0159ad\u00ed a UDP scan.<\/li>\n<li>Nalezen\u00e9 slu\u017eby jako i verze OS \/ IOS jsou v druh\u00e9 f\u00e1zi identifikov\u00e1ny a pomoc\u00ed sady specializovan\u00fdch testovac\u00edch program\u016f jsou odhaleny potenci\u00e1ln\u011b zranitelnosti. Sou\u010dasn\u011b jsou odhaleny nestandardn\u00ed, \u0161ifrovan\u00e9 protokoly (VPN) a pou\u017eit\u00ed IPv6. V p\u0159\u00edpad\u011b odhalen\u00ed VPN slu\u017eeb (IKE hosts), je analyzov\u00e1na jejich verze a typ implementace, na z\u00e1klad\u011b \u010deho\u017e jsou identifikov\u00e1ny p\u0159\u00edpadn\u00e9 zranitelnosti.<\/li>\n<li>T\u0159et\u00ed f\u00e1ze sest\u00e1v\u00e1 z konkr\u00e9tn\u00edch \u00fatok\u016f na server pomoc\u00ed voln\u011b p\u0159\u00edstupn\u00fdch program\u016f (exploit skript\u016f) na objeven\u00e9 chyby a ov\u011b\u0159en\u00ed re\u00e1ln\u00e9 hrozby nalezeno zranitelnost\u00ed.<\/li>\n<\/ol>\n<p>Ka\u017ed\u00e1 odhalena slu\u017eba je detailn\u011b otestov\u00e1na na zn\u00e1m\u00e9 zranitelnosti vedouc\u00ed ke kompromitov\u00e1n serveru, p\u0159\u00edpadn\u011b \u00faniku citliv\u00fdch informac\u00ed.<\/p>\n<p><strong>Testov\u00e1n\u00ed zahrnuje:<\/strong><\/p>\n<ul>\n<li><strong>Kontrolu zranitelnost\u00ed<\/strong>&#8211; proveden\u00ed bezpe\u010dnostn\u00edho scanu na odhalen\u00ed dostupn\u00fdch existuj\u00edc\u00edch zranitelnost\u00ed ve slu\u017eb\u00e1ch zji\u0161t\u011bn\u00fdch b\u011bhem porstcanu<\/li>\n<li><strong>Pr\u016fnik<\/strong> &#8211; snaha o zneu\u017eit\u00ed dostupn\u00fdch zranitelnost\u00ed a nedostate\u010dn\u00e9 konfigurace za \u00fa\u010delem pr\u016fniku do ostatn\u00edch syst\u00e9m\u016f a za\u0159\u00edzen\u00ed, zv\u00fd\u0161en\u00ed u\u017eivatelsk\u00fdch opr\u00e1vn\u011bn\u00ed a p\u0159\u00edstupu k prost\u0159edk\u016fm<\/li>\n<li><strong>Sb\u00edr\u00e1n\u00ed Informac\u00ed<\/strong> &#8211; o c\u00edlov\u00e9m syst\u00e9mu jsou sklizeny, identifikov\u00e1ny a analyzov\u00e1ny v\u0161echny informace, v\u010detn\u011b verze webov\u00e9ho serveru, pou\u017eit\u00fdch modul\u016f, programov\u00e9 platformy, WAF a p\u0159\u00edstupov\u00fdch bod\u016f do aplikace<\/li>\n<li><strong>Enumerovanie a Mapov\u00e1n\u00ed zranitelnosti<\/strong> &#8211; pomoc\u00ed intruz\u00edvnych metod a technik (speci\u00e1ln\u011b konstruovan\u00e1 HTTP \u017e\u00e1dosti) jsou identifikov\u00e1ny potenci\u00e1ln\u00ed slabiny (pou\u017eit\u00e9 jsou speci\u00e1ln\u00ed bezpe\u010dnostn\u00ed scannery, &#8222;fault-injection proxies&#8220; jak manu\u00e1ln\u00ed ov\u011b\u0159en\u00ed)<\/li>\n<li><strong>Vyu\u017eit\u00ed zranitelnosti<\/strong> &#8211; pokus o z\u00edsk\u00e1n\u00ed p\u0159\u00edstupu pomoc\u00ed zranitelnost\u00ed identifikovan\u00fdch v p\u0159edchoz\u00ed f\u00e1zi. C\u00edlem je z\u00edskat u\u017eivatelsk\u00fd nebo privilegovan\u00fd (Administr\u00e1torsk\u00fd) p\u0159\u00edstup do aplikace nebo opera\u010dn\u00edho syst\u00e9mu (pou\u017eit\u00e9 jsou speci\u00e1ln\u00ed &#8222;exploit&#8220; skripty a &#8222;exploit&#8220; syst\u00e9my<\/li>\n<li><strong>Testov\u00e1n\u00ed po\u0161tovn\u00edho serveru<\/strong> &#8211; krom\u011b testov\u00e1n\u00ed zn\u00e1m\u00fdch zranitelnost\u00ed v konkr\u00e9tn\u00ed implementaci MTA serveru, je realizov\u00e1no n\u011bkolik detailn\u00edch SMTP test\u016f k ov\u011b\u0159en\u00ed &#8222;relaying probl\u00e9m\u016f&#8220; MTA serveru, tak\u017ee jsou odhaleny v\u0161echny mo\u017enosti zneu\u017eit\u00ed SMTP serveru p\u0159\u00edpadn\u00fdm spamerem a odolnosti MTA serveru na potenci\u00e1ln\u00ed DOS \u00fatok. Test se vztahuje na v\u0161echny MX servery pro danou testovanou dom\u00e9nu. Sou\u010dasn\u011b jsou otestov\u00e1ny potenci\u00e1ln\u011b zneu\u017eiteln\u00e9 zranitelnosti anti-virov\u00fdch a anti spamov\u00fdch implementac\u00ed.<\/li>\n<li><strong>Testov\u00e1n\u00ed DNS z\u00f3n<\/strong> &#8211; krom\u011b testov\u00e1n\u00ed zn\u00e1m\u00fdch zranitelnost\u00ed v konkr\u00e9tn\u00ed implementaci DNS serveru (Bind, Microsoft DNS server) je realizov\u00e1n tak\u00e9 test konzistence z\u00f3n na v\u0161ech zadan\u00fdch DNS serverech, kontrola mo\u017enosti ve\u0159ejn\u00e9ho &#8222;zone transfer&#8220;, zranitelnost na DNS &#8222;caching&#8220; \u00fatoky atd.. Sou\u010dasn\u011b jsou realizov\u00e1ny detailn\u00ed penetra\u010dn\u00ed testy ka\u017ed\u00e9ho DNS serveru pro danou dom\u00e9nu (i mimo s\u00ed\u0165 objednavatele &#8211; v tomto p\u0159\u00edpad\u011b je nutn\u00fd ale souhlas p\u0159\u00edslu\u0161n\u00e9ho provozovatele).<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Uveden\u00e9 testov\u00e1n\u00ed se skl\u00e1d\u00e1 z n\u011bkolika f\u00e1z\u00ed, kter\u00e9 jsou realizov\u00e1ny v souladu s OSSTMM metodologii. Pou\u017eit\u00e9 n\u00e1stroje a postupy jsou definov\u00e1ny v Penetration Testing Framework. Test je realizov\u00e1n z pohledu potenci\u00e1ln\u00edho anonymn\u00edho \u00fato\u010dn\u00edka z Internetu, kter\u00fd nedisponuje \u017e\u00e1dn\u00fdmi informacemi o zkou\u0161en\u00e9 topologii a testovan\u00fdch slu\u017eb\u00e1ch. Samotn\u00e9 testov\u00e1n\u00ed prob\u00edh\u00e1 ve t\u0159ech f\u00e1z\u00edch: Prvn\u00ed f\u00e1ze p\u0159edstavuje scan [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":383,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"services_detail.php","meta":{"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-395","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Extern\u00ed penetra\u010dn\u00ed test - Nethemba<\/title>\n<meta name=\"description\" content=\"Extern\u00ed penetra\u010dn\u00ed test zahrnuje proveden\u00ed bezpe\u010dnostn\u00edho scanu na odhalen\u00ed dostupn\u00fdch existuj\u00edc\u00edch zranitelnost\u00ed ve slu\u017eb\u00e1ch zji\u0161t\u011bn\u00fdch b\u011bhem porstcanu...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nethemba.com\/cs\/sluzby\/sitova-a-systemova-bezpecnost\/externi-penetracni-test\/\" \/>\n<meta property=\"og:locale\" content=\"cs_CZ\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Extern\u00ed penetra\u010dn\u00ed test - Nethemba\" \/>\n<meta property=\"og:description\" content=\"Extern\u00ed penetra\u010dn\u00ed test zahrnuje proveden\u00ed bezpe\u010dnostn\u00edho scanu na odhalen\u00ed dostupn\u00fdch existuj\u00edc\u00edch zranitelnost\u00ed ve slu\u017eb\u00e1ch zji\u0161t\u011bn\u00fdch b\u011bhem porstcanu...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nethemba.com\/cs\/sluzby\/sitova-a-systemova-bezpecnost\/externi-penetracni-test\/\" \/>\n<meta property=\"og:site_name\" content=\"Nethemba\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/nethemba\" \/>\n<meta property=\"article:modified_time\" content=\"2019-08-27T09:31:51+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@nethemba\" \/>\n<meta name=\"twitter:label1\" content=\"Odhadovan\u00e1 doba \u010dten\u00ed\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minuty\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/nethemba.com\/cs\/sluzby\/sitova-a-systemova-bezpecnost\/externi-penetracni-test\/\",\"url\":\"https:\/\/nethemba.com\/cs\/sluzby\/sitova-a-systemova-bezpecnost\/externi-penetracni-test\/\",\"name\":\"Extern\u00ed penetra\u010dn\u00ed test - Nethemba\",\"isPartOf\":{\"@id\":\"https:\/\/nethemba.com\/de\/#website\"},\"datePublished\":\"2015-11-08T20:43:06+00:00\",\"dateModified\":\"2019-08-27T09:31:51+00:00\",\"description\":\"Extern\u00ed penetra\u010dn\u00ed test zahrnuje proveden\u00ed bezpe\u010dnostn\u00edho scanu na odhalen\u00ed dostupn\u00fdch existuj\u00edc\u00edch zranitelnost\u00ed ve slu\u017eb\u00e1ch zji\u0161t\u011bn\u00fdch b\u011bhem porstcanu...\",\"breadcrumb\":{\"@id\":\"https:\/\/nethemba.com\/cs\/sluzby\/sitova-a-systemova-bezpecnost\/externi-penetracni-test\/#breadcrumb\"},\"inLanguage\":\"cs\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/nethemba.com\/cs\/sluzby\/sitova-a-systemova-bezpecnost\/externi-penetracni-test\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/nethemba.com\/cs\/sluzby\/sitova-a-systemova-bezpecnost\/externi-penetracni-test\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/nethemba.com\/cs\/home-new-2025\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Slu\u017eby\",\"item\":\"https:\/\/nethemba.com\/cs\/sluzby\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"S\u00ed\u0165ov\u00e1 a syst\u00e9mov\u00e1 bezpe\u010dnost\",\"item\":\"https:\/\/nethemba.com\/cs\/sluzby\/sitova-a-systemova-bezpecnost\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Extern\u00ed penetra\u010dn\u00ed test\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/nethemba.com\/de\/#website\",\"url\":\"https:\/\/nethemba.com\/de\/\",\"name\":\"Nethemba\",\"description\":\"We care about your security\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/nethemba.com\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"cs\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Extern\u00ed penetra\u010dn\u00ed test - Nethemba","description":"Extern\u00ed penetra\u010dn\u00ed test zahrnuje proveden\u00ed bezpe\u010dnostn\u00edho scanu na odhalen\u00ed dostupn\u00fdch existuj\u00edc\u00edch zranitelnost\u00ed ve slu\u017eb\u00e1ch zji\u0161t\u011bn\u00fdch b\u011bhem porstcanu...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nethemba.com\/cs\/sluzby\/sitova-a-systemova-bezpecnost\/externi-penetracni-test\/","og_locale":"cs_CZ","og_type":"article","og_title":"Extern\u00ed penetra\u010dn\u00ed test - Nethemba","og_description":"Extern\u00ed penetra\u010dn\u00ed test zahrnuje proveden\u00ed bezpe\u010dnostn\u00edho scanu na odhalen\u00ed dostupn\u00fdch existuj\u00edc\u00edch zranitelnost\u00ed ve slu\u017eb\u00e1ch zji\u0161t\u011bn\u00fdch b\u011bhem porstcanu...","og_url":"https:\/\/nethemba.com\/cs\/sluzby\/sitova-a-systemova-bezpecnost\/externi-penetracni-test\/","og_site_name":"Nethemba","article_publisher":"https:\/\/www.facebook.com\/nethemba","article_modified_time":"2019-08-27T09:31:51+00:00","twitter_card":"summary_large_image","twitter_site":"@nethemba","twitter_misc":{"Odhadovan\u00e1 doba \u010dten\u00ed":"3 minuty"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/nethemba.com\/cs\/sluzby\/sitova-a-systemova-bezpecnost\/externi-penetracni-test\/","url":"https:\/\/nethemba.com\/cs\/sluzby\/sitova-a-systemova-bezpecnost\/externi-penetracni-test\/","name":"Extern\u00ed penetra\u010dn\u00ed test - Nethemba","isPartOf":{"@id":"https:\/\/nethemba.com\/de\/#website"},"datePublished":"2015-11-08T20:43:06+00:00","dateModified":"2019-08-27T09:31:51+00:00","description":"Extern\u00ed penetra\u010dn\u00ed test zahrnuje proveden\u00ed bezpe\u010dnostn\u00edho scanu na odhalen\u00ed dostupn\u00fdch existuj\u00edc\u00edch zranitelnost\u00ed ve slu\u017eb\u00e1ch zji\u0161t\u011bn\u00fdch b\u011bhem porstcanu...","breadcrumb":{"@id":"https:\/\/nethemba.com\/cs\/sluzby\/sitova-a-systemova-bezpecnost\/externi-penetracni-test\/#breadcrumb"},"inLanguage":"cs","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nethemba.com\/cs\/sluzby\/sitova-a-systemova-bezpecnost\/externi-penetracni-test\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/nethemba.com\/cs\/sluzby\/sitova-a-systemova-bezpecnost\/externi-penetracni-test\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nethemba.com\/cs\/home-new-2025\/"},{"@type":"ListItem","position":2,"name":"Slu\u017eby","item":"https:\/\/nethemba.com\/cs\/sluzby\/"},{"@type":"ListItem","position":3,"name":"S\u00ed\u0165ov\u00e1 a syst\u00e9mov\u00e1 bezpe\u010dnost","item":"https:\/\/nethemba.com\/cs\/sluzby\/sitova-a-systemova-bezpecnost\/"},{"@type":"ListItem","position":4,"name":"Extern\u00ed penetra\u010dn\u00ed test"}]},{"@type":"WebSite","@id":"https:\/\/nethemba.com\/de\/#website","url":"https:\/\/nethemba.com\/de\/","name":"Nethemba","description":"We care about your security","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nethemba.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"cs"}]}},"_links":{"self":[{"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/pages\/395","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/comments?post=395"}],"version-history":[{"count":0,"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/pages\/395\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/pages\/383"}],"wp:attachment":[{"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/media?parent=395"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}