{"id":402,"date":"2015-11-08T20:45:46","date_gmt":"2015-11-08T20:45:46","guid":{"rendered":"http:\/\/nethemba.com\/cs\/?page_id=402"},"modified":"2019-08-27T10:35:22","modified_gmt":"2019-08-27T09:35:22","slug":"penetracni-test-intranetu","status":"publish","type":"page","link":"https:\/\/nethemba.com\/cs\/sluzby\/sitova-a-systemova-bezpecnost\/penetracni-test-intranetu\/","title":{"rendered":"Penetra\u010dn\u00ed test intranetu"},"content":{"rendered":"<p>Penetra\u010dn\u00ed testov\u00e1n\u00ed intranetu se skl\u00e1d\u00e1 z n\u011bkolika f\u00e1z\u00ed, kter\u00e9 jsou realizov\u00e1ny v souladu s<a href=\"http:\/\/www.isecom.org\/mirror\/OSSTMM.3.pdf\">OSSTMM , kapitola 10 &#8211; Telecommunications Security Testing<\/a>. Pou\u017eit\u00e9 n\u00e1stroje a postupy jsou definov\u00e1ny v <a href=\"http:\/\/www.vulnerabilityassessment.co.uk\/Penetration%20Test.html\">Penetration Testing Framework<\/a>.<\/p>\n<p>Test je realizov\u00e1n z pohledu potenci\u00e1ln\u00edho anonymn\u00edho \u00fato\u010dn\u00edka, kter\u00fd m\u00e1 fyzick\u00fd p\u0159\u00edstup do intern\u00ed s\u00edt\u011b (bez p\u0159\u00edstupu do AD), tak z pohledu b\u011b\u017en\u00e9ho zam\u011bstnance spole\u010dnosti (s p\u0159\u00edstupem do AD).<\/p>\n<p>C\u00edlem je demonstrovat kompromitov\u00e1n\u00ed intern\u00ed s\u00edt\u011b z\u00e1kazn\u00edka (nap\u0159. z\u00edsk\u00e1n\u00ed dom\u00e9nov\u00e9ho admina).<\/p>\n<p><strong>Samotn\u00e9 testov\u00e1n\u00ed prob\u00edh\u00e1 ve \u010dty\u0159ech f\u00e1z\u00edch:<\/strong><\/p>\n<ol>\n<li>Prvn\u00ed f\u00e1ze p\u0159edstavuje scan (v\u00fd\u010det) kompletn\u00edho rozsahu TCP \/ UDP port\u016f (1-65535) dan\u00e9ho aktivn\u00edho prvku (server , router). Je mo\u017en\u00e9 realizovat speci\u00e1ln\u00ed anti &#8211; IDS scan, kdy se sni\u017euje mo\u017enost jeho detekce p\u0159\u00edpadn\u00fdmi IDS (vhodn\u00e9 pro ov\u011b\u0159en\u00ed spr\u00e1vn\u00e9 funk\u010dnosti IDS).<\/li>\n<li>Nalezen\u00e9 slu\u017eby jako i verze OS \/ IOS jsou ve druh\u00e9 f\u00e1zi identifikov\u00e1ny a pomoc\u00ed sady specializovan\u00fdch testovac\u00edch program\u016f jsou odhaleny potenci\u00e1ln\u00ed zranitelnosti. Sou\u010dasn\u011b jsou odhaleny nestandardn\u00ed, \u0161ifrovan\u00e9 protokoly (VPN) a pou\u017eit\u00ed IPv6 . Jde o zmapov\u00e1n\u00ed lok\u00e1ln\u00ed s\u00edt\u011b, dostupn\u00e9 servery, slu\u017eby, pracovn\u00ed stanice a za\u0159\u00edzen\u00ed, proveden\u00ed portscanu lok\u00e1ln\u00ed s\u00edt\u011b (dostupn\u00e9 SMTP, DNS, SNMP, SQL, http a ostatn\u00ed slu\u017eby), z\u00edsk\u00e1v\u00e1n\u00ed informac\u00ed o c\u00edlov\u00e9m testovac\u00edm prost\u0159ed\u00ed (IP adresy, n\u00e1zvy server\u016f, s\u00ed\u0165ov\u00e1 topologie, &#8230;).<\/li>\n<li>T\u0159et\u00ed f\u00e1ze p\u0159edstavuje \u00fatok na bezpe\u010dnost s\u00ed\u0165ov\u00e9 infrastruktury (VLAN, HSRP, sm\u011brovac\u00ed protokoly, STP, ..).<\/li>\n<li>\u010ctvrt\u00e1 f\u00e1ze se skl\u00e1d\u00e1 z konkr\u00e9tn\u00edch \u00fatok\u016f na server, pomoc\u00ed voln\u011b p\u0159\u00edstupn\u00fdch program\u016f (exploit skript\u016f) na objeven\u00e9 chyby a ov\u011b\u0159en\u00ed re\u00e1ln\u00e9 hrozby nalezen\u00fdch zranitelnost\u00ed. Pokus o zneu\u017eit\u00ed dostupn\u00fdch zranitelnost\u00ed a nedostate\u010dn\u00e9 konfigurace za \u00fa\u010delem pr\u016fniku do ostatn\u00edch syst\u00e9m\u016f a za\u0159\u00edzen\u00ed, zv\u00fd\u0161en\u00ed u\u017eivatelsk\u00fdch opr\u00e1vn\u011bn\u00ed a p\u0159\u00edstupu k prost\u0159edk\u016fm.<\/li>\n<\/ol>\n<p><strong>Ka\u017ed\u00e1 odhalen\u00e1 slu\u017eba je detailn\u011b otestov\u00e1na na zn\u00e1m\u00e9 zranitelnosti vedouc\u00ed ke kompromitov\u00e1n\u00ed serveru, p\u0159\u00edpadn\u011b \u00faniku citliv\u00fdch informac\u00ed.<\/strong><\/p>\n<p>Testov\u00e1n\u00ed tak\u00e9 zahrnuje bezpe\u010dnostn\u00ed anal\u00fdzu:<\/p>\n<ul>\n<li><strong>S\u00ed\u0165ov\u00e9 infrastruktury<\/strong> &#8211; kontrola IP ACL, port security\/802.1x, konfigurace DHCP, mo\u017enost ARP flooding \/ poisoning, ov\u011b\u0159en\u00ed HSRP, SNMP protokol\u016f<\/li>\n<li><strong>Politiky u\u017eivatelsk\u00fdch hesel<\/strong> &#8211; pokus o zm\u011bnu u\u017eivatelsk\u00e9ho hesla na jednoduch\u00e9 heslo (\u010d\u00edseln\u00e9, kr\u00e1tk\u00e9 , slovn\u00edkov\u00e9 &#8230;) ve snaze zjistit mo\u017enosti zm\u011bny hesel nevyhovuj\u00edc\u00edch bezpe\u010dnostn\u00edm standard\u016fm (nedostate\u010dn\u00e1 politika hesel), snaha odhalit sch\u00e9ma tvorby hesel p\u0159i vytv\u00e1\u0159en\u00ed nov\u00fdch \u00fa\u010dt\u016f (p\u0159\u00edchod nov\u00e9ho zam\u011bstnance)<\/li>\n<li><strong>Dom\u00e9ny Windows<\/strong> &#8211; snaha o zmapov\u00e1n\u00ed stromu u\u017eivatel\u016f, prost\u0159edk\u016f a nastaven\u00ed pomoc\u00ed LDAP p\u0159\u00edstupu, zji\u0161t\u011bn\u00ed mo\u017enosti vyu\u017e\u00edv\u00e1n\u00ed n\u00edzk\u00fdch bezpe\u010dnostn\u00edch standard\u016f p\u0159i ov\u011b\u0159ov\u00e1n\u00ed v dom\u00e9n\u011b (NTLM), pokus o z\u00edsk\u00e1n\u00ed dom\u00e9nov\u00e9ho admina<\/li>\n<li><strong>Vn\u011bj\u0161\u00ed a postrann\u00ed komunika\u010dn\u00ed kan\u00e1ly<\/strong> &#8211; mo\u017enost vyu\u017e\u00edvat extern\u00ed po\u0161tovn\u00ed servery, proxy servery, DNS servery s c\u00edlem pou\u017e\u00edvat postrann\u00ed komunika\u010dn\u00ed kan\u00e1ly (HTTP nebo DNS tunel) a obej\u00edt politiku p\u0159\u00edstupu k ned\u016fv\u011bryhodn\u00fdm c\u00edlov\u00fdm prost\u0159edk\u016fm (pos\u00edl\u00e1n\u00ed SPAMu , p\u0159\u00edstup na web mimo firemn\u00ed proxy server) a zaznamen\u00e1v\u00e1n\u00ed v bezpe\u010dnostn\u00edch logech a na \u00fanik informac\u00ed<\/li>\n<li><strong>Managementu rozhran\u00ed a hardwarov\u00fdch za\u0159\u00edzen\u00ed<\/strong> &#8211; tisk\u00e1rny, remote management server\u016f, p\u0159ep\u00edna\u010d\u016f, kop\u00edrek atd.<\/li>\n<li><strong>P\u0159\u00edstupu k firemn\u00ed po\u0161t\u011b Exchange<\/strong> &#8211; mo\u017enost pou\u017e\u00edv\u00e1n\u00ed nezaji\u0161t\u011bn\u00fdch protokol\u016f (IMAP , POP3), enumerovan\u00ed platn\u00fdch \u00fa\u010dt\u016f podle chybov\u00fdch k\u00f3d\u016f serveru, mo\u017enost pos\u00edl\u00e1n\u00ed po\u0161ty bez opr\u00e1vn\u011bn\u00ed (open relay), ov\u011b\u0159en\u00ed schopnosti mailov\u00e9ho serveru zachytit infikov\u00e1n\u00fd mail virem\/trojan\u016fm , kter\u00fd bude adresov\u00e1n na konkr\u00e9tn\u00edho u\u017eivatele.<\/li>\n<li><strong>Testov\u00e1n\u00ed DNS z\u00f3n<\/strong> &#8211; krom\u011b testov\u00e1n\u00ed zn\u00e1m\u00fdch zranitelnost\u00ed v konkr\u00e9tn\u00ed implementaci DNS serveru (Bind, Microsoft DNS server) je realizov\u00e1n tak\u00e9 test konzistence z\u00f3n na v\u0161ech zadan\u00fdch DNS serverech, kontrola mo\u017enosti ve\u0159ejn\u00e9ho &#8222;zone transfer&#8220;, zranitelnost na DNS &#8222;caching&#8220; \u00fatoky atd. Sou\u010dasn\u011b jsou realizov\u00e1ny detailn\u00ed penetra\u010dn\u00ed testy ka\u017ed\u00e9ho DNS serveru pro danou dom\u00e9nu (i mimo s\u00ed\u0165 objednavatele &#8211; v tomto p\u0159\u00edpad\u011b je nutn\u00fd souhlas p\u0159\u00edslu\u0161n\u00e9ho provozovatele)<\/li>\n<\/ul>\n<p><strong>Sou\u010d\u00e1st\u00ed testov\u00e1n\u00ed jsou samoz\u0159ejm\u011b i slovn\u00edkov\u00e9 \u00fatoky a \u00fatoky hrubou silou na odhalen\u00e9 autentifika\u010dn\u00ed mechanismy<\/strong>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Penetra\u010dn\u00ed testov\u00e1n\u00ed intranetu se skl\u00e1d\u00e1 z n\u011bkolika f\u00e1z\u00ed, kter\u00e9 jsou realizov\u00e1ny v souladu sOSSTMM , kapitola 10 &#8211; Telecommunications Security Testing. Pou\u017eit\u00e9 n\u00e1stroje a postupy jsou definov\u00e1ny v Penetration Testing Framework. Test je realizov\u00e1n z pohledu potenci\u00e1ln\u00edho anonymn\u00edho \u00fato\u010dn\u00edka, kter\u00fd m\u00e1 fyzick\u00fd p\u0159\u00edstup do intern\u00ed s\u00edt\u011b (bez p\u0159\u00edstupu do AD), tak z pohledu b\u011b\u017en\u00e9ho zam\u011bstnance [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":383,"menu_order":3,"comment_status":"closed","ping_status":"closed","template":"services_detail.php","meta":{"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-402","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Penetra\u010dn\u00ed test intranetu - Nethemba<\/title>\n<meta name=\"description\" content=\"Penetra\u010dn\u00ed testov\u00e1n\u00ed intranetu se skl\u00e1d\u00e1 z n\u011bkolika f\u00e1z\u00ed, kter\u00e9 jsou realizov\u00e1ny v souladu s OSSTMM - Telecommunications Security Testing.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nethemba.com\/cs\/sluzby\/sitova-a-systemova-bezpecnost\/penetracni-test-intranetu\/\" \/>\n<meta property=\"og:locale\" content=\"cs_CZ\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Penetra\u010dn\u00ed test intranetu - Nethemba\" \/>\n<meta property=\"og:description\" content=\"Penetra\u010dn\u00ed testov\u00e1n\u00ed intranetu se skl\u00e1d\u00e1 z n\u011bkolika f\u00e1z\u00ed, kter\u00e9 jsou realizov\u00e1ny v souladu s OSSTMM - Telecommunications Security Testing.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nethemba.com\/cs\/sluzby\/sitova-a-systemova-bezpecnost\/penetracni-test-intranetu\/\" \/>\n<meta property=\"og:site_name\" content=\"Nethemba\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/nethemba\" \/>\n<meta property=\"article:modified_time\" content=\"2019-08-27T09:35:22+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@nethemba\" \/>\n<meta name=\"twitter:label1\" content=\"Odhadovan\u00e1 doba \u010dten\u00ed\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minuty\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/nethemba.com\/cs\/sluzby\/sitova-a-systemova-bezpecnost\/penetracni-test-intranetu\/\",\"url\":\"https:\/\/nethemba.com\/cs\/sluzby\/sitova-a-systemova-bezpecnost\/penetracni-test-intranetu\/\",\"name\":\"Penetra\u010dn\u00ed test intranetu - Nethemba\",\"isPartOf\":{\"@id\":\"https:\/\/nethemba.com\/de\/#website\"},\"datePublished\":\"2015-11-08T20:45:46+00:00\",\"dateModified\":\"2019-08-27T09:35:22+00:00\",\"description\":\"Penetra\u010dn\u00ed testov\u00e1n\u00ed intranetu se skl\u00e1d\u00e1 z n\u011bkolika f\u00e1z\u00ed, kter\u00e9 jsou realizov\u00e1ny v souladu s OSSTMM - Telecommunications Security Testing.\",\"breadcrumb\":{\"@id\":\"https:\/\/nethemba.com\/cs\/sluzby\/sitova-a-systemova-bezpecnost\/penetracni-test-intranetu\/#breadcrumb\"},\"inLanguage\":\"cs\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/nethemba.com\/cs\/sluzby\/sitova-a-systemova-bezpecnost\/penetracni-test-intranetu\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/nethemba.com\/cs\/sluzby\/sitova-a-systemova-bezpecnost\/penetracni-test-intranetu\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/nethemba.com\/cs\/home-new-2025\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Slu\u017eby\",\"item\":\"https:\/\/nethemba.com\/cs\/sluzby\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"S\u00ed\u0165ov\u00e1 a syst\u00e9mov\u00e1 bezpe\u010dnost\",\"item\":\"https:\/\/nethemba.com\/cs\/sluzby\/sitova-a-systemova-bezpecnost\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Penetra\u010dn\u00ed test intranetu\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/nethemba.com\/de\/#website\",\"url\":\"https:\/\/nethemba.com\/de\/\",\"name\":\"Nethemba\",\"description\":\"We care about your security\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/nethemba.com\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"cs\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Penetra\u010dn\u00ed test intranetu - Nethemba","description":"Penetra\u010dn\u00ed testov\u00e1n\u00ed intranetu se skl\u00e1d\u00e1 z n\u011bkolika f\u00e1z\u00ed, kter\u00e9 jsou realizov\u00e1ny v souladu s OSSTMM - Telecommunications Security Testing.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nethemba.com\/cs\/sluzby\/sitova-a-systemova-bezpecnost\/penetracni-test-intranetu\/","og_locale":"cs_CZ","og_type":"article","og_title":"Penetra\u010dn\u00ed test intranetu - Nethemba","og_description":"Penetra\u010dn\u00ed testov\u00e1n\u00ed intranetu se skl\u00e1d\u00e1 z n\u011bkolika f\u00e1z\u00ed, kter\u00e9 jsou realizov\u00e1ny v souladu s OSSTMM - Telecommunications Security Testing.","og_url":"https:\/\/nethemba.com\/cs\/sluzby\/sitova-a-systemova-bezpecnost\/penetracni-test-intranetu\/","og_site_name":"Nethemba","article_publisher":"https:\/\/www.facebook.com\/nethemba","article_modified_time":"2019-08-27T09:35:22+00:00","twitter_card":"summary_large_image","twitter_site":"@nethemba","twitter_misc":{"Odhadovan\u00e1 doba \u010dten\u00ed":"4 minuty"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/nethemba.com\/cs\/sluzby\/sitova-a-systemova-bezpecnost\/penetracni-test-intranetu\/","url":"https:\/\/nethemba.com\/cs\/sluzby\/sitova-a-systemova-bezpecnost\/penetracni-test-intranetu\/","name":"Penetra\u010dn\u00ed test intranetu - Nethemba","isPartOf":{"@id":"https:\/\/nethemba.com\/de\/#website"},"datePublished":"2015-11-08T20:45:46+00:00","dateModified":"2019-08-27T09:35:22+00:00","description":"Penetra\u010dn\u00ed testov\u00e1n\u00ed intranetu se skl\u00e1d\u00e1 z n\u011bkolika f\u00e1z\u00ed, kter\u00e9 jsou realizov\u00e1ny v souladu s OSSTMM - Telecommunications Security Testing.","breadcrumb":{"@id":"https:\/\/nethemba.com\/cs\/sluzby\/sitova-a-systemova-bezpecnost\/penetracni-test-intranetu\/#breadcrumb"},"inLanguage":"cs","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nethemba.com\/cs\/sluzby\/sitova-a-systemova-bezpecnost\/penetracni-test-intranetu\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/nethemba.com\/cs\/sluzby\/sitova-a-systemova-bezpecnost\/penetracni-test-intranetu\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nethemba.com\/cs\/home-new-2025\/"},{"@type":"ListItem","position":2,"name":"Slu\u017eby","item":"https:\/\/nethemba.com\/cs\/sluzby\/"},{"@type":"ListItem","position":3,"name":"S\u00ed\u0165ov\u00e1 a syst\u00e9mov\u00e1 bezpe\u010dnost","item":"https:\/\/nethemba.com\/cs\/sluzby\/sitova-a-systemova-bezpecnost\/"},{"@type":"ListItem","position":4,"name":"Penetra\u010dn\u00ed test intranetu"}]},{"@type":"WebSite","@id":"https:\/\/nethemba.com\/de\/#website","url":"https:\/\/nethemba.com\/de\/","name":"Nethemba","description":"We care about your security","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nethemba.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"cs"}]}},"_links":{"self":[{"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/pages\/402","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/comments?post=402"}],"version-history":[{"count":0,"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/pages\/402\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/pages\/383"}],"wp:attachment":[{"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/media?parent=402"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}