{"id":5656,"date":"2021-04-07T03:13:09","date_gmt":"2021-04-07T01:13:09","guid":{"rendered":"https:\/\/nethemba.com\/?page_id=5656"},"modified":"2021-04-07T03:32:04","modified_gmt":"2021-04-07T01:32:04","slug":"red-teaming","status":"publish","type":"page","link":"https:\/\/nethemba.com\/cs\/sluzby\/it-bezpecnostni-sluzby\/red-teaming\/","title":{"rendered":"Red Teaming"},"content":{"rendered":"<h1>ODOL\u00c1TE PROFESION\u00c1LN\u00cdMU \u00daTOKU?<\/h1>\n<p>\u201cRed Teaming\u201d p\u0159edstavuje kombinaci information Gathering (OSINT), blackbox penetra\u010dn\u00edch test\u016f s c\u00edlem minimalizovat jejich detekci ze strany z\u00e1kazn\u00edka a soci\u00e1ln\u00edho in\u017een\u00fdrstv\u00ed jak ve form\u011b sofistikovan\u00e9ho spear phishingu,\u00a0 tak fyzick\u00e9 infiltrace.<\/p>\n<p><b>Red Team p\u0159edstavuje profesion\u00e1ln\u00ed t\u00fdm hacker\u016f<\/b>, soci\u00e1ln\u00edch in\u017een\u00fdr\u016f a \u201cintelligence\u201d expert\u016f, kte\u0159\u00ed dok\u00e1\u017e\u00ed z\u00edsk\u00e1vat, analyzovat a n\u00e1sledn\u011b vyu\u017e\u00edvat mno\u017estv\u00ed d\u016fle\u017eit\u00fdch informac\u00ed pot\u0159ebn\u00fdch na samotnou infiltraci.<\/p>\n<p><b>Red Teaming je sofistikovan\u00fd, koordinovan\u00fd \u00fatok, kter\u00fd simuluje re\u00e1ln\u00fd hackersk\u00fd \u00fatok<\/b>, s c\u00edlem vyhnout se detekci (ze strany tzv. \u201cBlue Teamu\u201d).\u00a0 Za norm\u00e1ln\u00edch okolnost\u00ed IT odd\u011blen\u00ed z\u00e1kazn\u00edka (s v\u00fdjimkou zadavatele) nen\u00ed o \u00fatoku informov\u00e1no.\u00a0 Samotn\u00fd Red Team obvykle tak\u00e9 nedisponuje \u017e\u00e1dn\u00fdmi informacemi o c\u00edlov\u00e9 infrastruktu\u0159e, syst\u00e9mech \u010di zam\u011bstnanc\u00edch dan\u00e9 organizace.\u00a0 Z tohoto hlediska jde o tzv.\u00a0 \u201cBlackbox test\u201d.\u00a0 Jedin\u00e1 informace, kterou z\u00e1kazn\u00edk schvaluje, je seznam odhalen\u00fdch potenci\u00e1ln\u00edch c\u00edl\u016f, kter\u00e9 Red Team n\u00e1sledn\u011b vyu\u017eije k \u00fatoku (jinak by toti\u017e mohlo doj\u00edt k neleg\u00e1ln\u00edm \u00fatok\u016fm na infrastrukturu, kterou z\u00e1kazn\u00edk nevlastn\u00ed) a seznam zak\u00e1zan\u00fdch metod nebo praktik, kter\u00e9 Red Team nem\u016f\u017ee pou\u017e\u00edt (nap\u0159\u00edklad\u00a0 DoS \u00fatoky, vyd\u00edr\u00e1n\u00ed \/ vyhro\u017eov\u00e1n\u00ed v p\u0159\u00edpad\u011b soci\u00e1ln\u00edho in\u017een\u00fdrstv\u00ed apod).<\/p>\n<p><b>Red Teaming p\u0159esto, \u017ee nejde do \u0161\u00ed\u0159ky, s c\u00edlem identifikovat v\u0161echny mo\u017en\u00e9 zranitelnosti, tak vyu\u017e\u00edv\u00e1 n\u011bkolik vektor\u016f \u00fatok\u016f nad r\u00e1mec b\u011b\u017en\u00fdch penetra\u010dn\u00edch test\u016f (nap\u0159\u00edklad soci\u00e1ln\u00ed in\u017een\u00fdrstv\u00ed).<\/b><\/p>\n<p>Jeho c\u00edlem je dosa\u017een\u00ed \u201cvlajky\u201d ( \u201cflag\u201d) jako nap\u0159\u00edklad z\u00edsk\u00e1n\u00ed lok\u00e1ln\u00edho dom\u00e9nov\u00e9ho administr\u00e1tora nebo kompromitace hrani\u010dn\u00edho sm\u011brova\u010de.\u00a0 A toto je mo\u017en\u00e9 doc\u00edlit jak\u00fdmkoliv zp\u016fsobem \u2013 od technick\u00e9ho pr\u016fniku na samotn\u00e9 syst\u00e9my a\u017e po psychologickou manipulaci hlavn\u00edho administr\u00e1tora ve firm\u011b.<\/p>\n<p><b>C\u00edlem Red Teaming je otestovat spole\u010dnost na komplexn\u00ed hybridn\u00ed \u00fatok<\/b>, p\u0159i kter\u00e9m jsou vyu\u017eity v\u0161echny mo\u017en\u00e9 dostupn\u00e9 zp\u016fsoby k dosa\u017een\u00ed tohoto c\u00edle.<\/p>\n<p><b>Vztah mezi Red t\u00fdmem a Blue t\u00fdmem je asymetrick\u00fd a to na dvou \u00farovn\u00edch<\/b>\u00a0\u2013 Red Teamu sta\u010d\u00ed naj\u00edt jen jednu zranitelnost, aby se dok\u00e1zal p\u0159i sv\u00e9m \u00fatoku posunout dop\u0159edu.\u00a0 Blue Team oproti tomu mus\u00ed m\u00edt opraven\u00e9 (a neust\u00e1le opravovat) v\u0161echny mo\u017en\u00e9 zneu\u017eiteln\u00e9 zranitelnosti.\u00a0 Sou\u010dasn\u011b Red Teamu sta\u010d\u00ed ud\u011blat jednu chybu, aby ho Blue Team dok\u00e1zal odhalit (a nap\u0159\u00edklad zcela zablokovat) a Red Team mus\u00ed za\u010d\u00edt znovu.<\/p>\n<h1>PR\u016eB\u011aH RED TEAMINGU<\/h1>\n<h2>Z\u00cdSK\u00c1V\u00c1N\u00cd INFORMAC\u00cd (INFORMATION GATHERING)<\/h2>\n<p>Jde o pasivn\u00ed, \u00favodn\u00ed f\u00e1zi Red Teaming.\u00a0 C\u00edlem t\u00e9to f\u00e1ze je z ve\u0159ejn\u011b dostupn\u00fdch zdroj\u016f (datab\u00e1z\u00ed, registr\u016f, vyhled\u00e1va\u010d\u016f, soci\u00e1ln\u00edch s\u00edt\u00ed) z\u00edskat co nejv\u00edce informac\u00ed, kter\u00e9 mohou b\u00fdt vyu\u017eity p\u0159i dal\u0161\u00edm pr\u016fniku.\u00a0 Jde zejm\u00e9na o:<\/p>\n<ul>\n<li aria-level=\"1\">\u00a0IP adresn\u00ed rozsahy, IP adresy, kter\u00e9 budou d\u00e1le p\u0159edm\u011btem aktivn\u00edho testov\u00e1n\u00ed (jejich seznam mus\u00ed b\u00fdt explicitn\u011b schv\u00e1len z\u00e1kazn\u00edkem)<\/li>\n<li aria-level=\"1\">\u00a0Seznam zam\u011bstnanc\u016f a jejich osobn\u00edch informac\u00ed (e-mailov\u00e9 adresy, telefonn\u00ed \u010d\u00edsla, osobn\u00ed preference, technologie, kter\u00e9 pou\u017e\u00edvaj\u00ed, m\u00edsta, kde se vyskytuj\u00ed, p\u0159\u00edpadn\u011b lid\u00e9, kter\u00fdm v\u011b\u0159\u00ed a se kter\u00fdmi komunikuj\u00ed).\u00a0 Tyto informace budou n\u00e1sledn\u011b vyu\u017eity ve f\u00e1zi c\u00edlen\u00e9ho soci\u00e1ln\u00edho in\u017een\u00fdrstv\u00ed a enumera\u010dn\u00fdch \u00fatoc\u00edch.<\/li>\n<li aria-level=\"1\">\u00a0Identifikaci partner\u016f z\u00e1kazn\u00edk\u016f (pro p\u0159\u00edpadnou impersonifikaci ve f\u00e1zi soci\u00e1ln\u00edho in\u017een\u00fdrstv\u00ed)<\/li>\n<li aria-level=\"1\">\u00a0Identifikaci fyzick\u00fdch budov, kancel\u00e1\u0159sk\u00fdch prostor, popis jejich zabezpe\u010den\u00ed (pro p\u0159\u00edpad fyzick\u00e9 infiltrace)<\/li>\n<\/ul>\n<h2>C\u00cdLEN\u00dd \u00daTOK NA INFRASTRUKTURU A ZAM\u011aSTNANCE ORGANIZACE<\/h2>\n<p>C\u00edlen\u00fd \u00fatok na infrastrukturu i zam\u011bstnance organizace m\u016f\u017ee prob\u00edhat paraleln\u011b.\u00a0 \u010clenov\u00e9 Red Teamu jsou v neust\u00e1l\u00e9m kontaktu, informace navz\u00e1jem si sd\u00edlej\u00ed a vyu\u017e\u00edvaj\u00ed je p\u0159i samotn\u00e9m \u00fatoku.<\/p>\n<h3><a href=\"https:\/\/nethemba.com\/cs\/sluzby\/sitova-a-systemova-bezpecnost\/externi-penetracni-test\/\">BLACKBOX PENETRA\u010cN\u00cd TEST EXTERN\u00cd INFRASTRUKTURY<\/a><\/h3>\n<p>Blackbox penetra\u010dn\u00ed test extern\u00ed infrastruktury je mo\u017en\u00e9 prov\u00e9st hned pot\u00e9\u00a0 jak zadavatel (White Team) schv\u00e1l\u00ed seznam odhalen\u00fdch c\u00edl\u016f \u00fatoku (s c\u00edlem znemo\u017enit \u00fatoky na nepovolen\u00e9 adresn\u00ed rozsahy).<\/p>\n<p>Na rozd\u00edl od b\u011b\u017en\u00e9ho blackbox penetra\u010dn\u00edho testu, tento prob\u00edh\u00e1 v maxim\u00e1ln\u00edm utajen\u00ed (tzv. \u201cStealth re\u017eimu\u201d), bu\u010f z unik\u00e1tn\u00edch VPN nebo Tor uzl\u016f, kter\u00e9 jsou podle pot\u0159eby m\u011bn\u011bny.\u00a0 Standardn\u00edm c\u00edlem je z\u00edskat p\u0159\u00edstup do intern\u00ed s\u00edt\u011b (z\u00edsk\u00e1n\u00ed VPN p\u0159\u00edstup\u016f, kompromitovan\u00fdch server\u016f v DMZ, c\u00edlen\u00e9 \u00fatoky na klienty \u2013 viz n\u00ed\u017ee \u201csoci\u00e1ln\u00ed in\u017een\u00fdrstv\u00ed).<\/p>\n<h3><a href=\"https:\/\/nethemba.com\/cs\/sluzby\/it-bezpecnostni-sluzby\/socialni-inzenyrstvi\/\">SOCI\u00c1LN\u00cd IN\u017dEN\u00ddRSTV\u00cd<\/a><\/h3>\n<p>Soci\u00e1ln\u00ed in\u017een\u00fdrstv\u00ed (ve form\u011b spear phishingu \u010di fyzick\u00e9 infiltrace) m\u00e1 podobn\u011b jako penetra\u010dn\u00ed test vyty\u010den\u00fd konkr\u00e9tn\u00ed c\u00edl ( \u201cflag\u201d) a vyu\u017e\u00edv\u00e1 v\u0161echny metody (kter\u00e9 nejsou explicitn\u011b zak\u00e1z\u00e1ny z\u00e1kazn\u00edkem) k jeho dosa\u017een\u00ed.\u00a0 Tam pat\u0159\u00ed c\u00edlen\u00fd phishing (spear phishing), \u010dastokr\u00e1t se speci\u00e1ln\u011b upraven\u00fdm malwarem, jeho\u017e c\u00edlem je kompromitovat koncov\u00e9ho mailov\u00e9ho klienta nebo prohl\u00ed\u017ee\u010d a z\u00edskat p\u0159\u00edstup do intern\u00ed s\u00edt\u011b.\u00a0 \u010casto se na toto vyu\u017e\u00edvaj\u00ed d\u016fv\u011bryhodn\u011b vypadaj\u00edc\u00ed podvr\u017een\u00e9 internetov\u00e9 dom\u00e9ny, fale\u0161n\u00e9 certifik\u00e1ty atd.<\/p>\n<h2>ESKALACE PRIVILEGI\u00cd A DAL\u0160\u00cd INFILTRACE<\/h2>\n<p>V p\u0159\u00edpad\u011b, \u017ee \u00fatok na infrastrukturu nebo zam\u011bstnance organizace je \u00fasp\u011b\u0161n\u00fd a Red Team z\u00edsk\u00e1 p\u0159\u00edstupov\u00e9 \u00fadaje do intern\u00edch syst\u00e9m\u016f nebo se mu poda\u0159\u00ed fyzicky dostat do budovy, tak pokra\u010duje v eskalaci opr\u00e1vn\u011bn\u00ed a dal\u0161\u00ed infiltraci.<\/p>\n<h3>\u00daTOK V INTERN\u00cd S\u00cdTI<\/h3>\n<p>Z\u00edsk\u00e1n\u00ed VPN u\u017eivatele nebo jak\u00e9hokoli intern\u00edho p\u0159\u00edstupu (z extern\u00edch penetra\u010dn\u00edch test\u016f nebo soci\u00e1ln\u00edho in\u017een\u00fdrstv\u00ed) znamen\u00e1, \u017ee Red Team pokra\u010duje \u00fatoky v intern\u00ed s\u00edti.\u00a0 Toto mohou b\u00fdt \u00fatoky na L2 \/ L3 vrstv\u011b (nap\u0159\u00edklad ARP poisoning) s c\u00edlem z\u00edskat kontrolu nad komunikac\u00ed intern\u00edch stanic nebo server\u016f (pou\u017eit\u00e9 techniky jsou podobn\u00e9 <a href=\"https:\/\/nethemba.com\/cs\/sluzby\/sitova-a-systemova-bezpecnost\/penetracni-test-intranetu\/\">intern\u00edmu penetra\u010dn\u00edmu testu<\/a>).<\/p>\n<p>Pokud c\u00edlov\u00e1 vlajka nen\u00ed definov\u00e1na jinak, c\u00edlem je eskalace opr\u00e1vn\u011bn\u00ed na dom\u00e9nov\u00e9ho administr\u00e1tora \/ root u\u017eivatele kl\u00ed\u010dov\u00fdch server\u016f \u010di pln\u00e9 kontrola nad hlavn\u00ed s\u00ed\u0165ovou br\u00e1nou.<\/p>\n<p>\u00datok v intern\u00ed s\u00edti m\u016f\u017ee znamenat pro Red Team tak\u00e9 nasazen\u00ed zadn\u00edch vr\u00e1tek (tzv. \u201cbackdoors\u201d), v p\u0159\u00edpad\u011b, \u017ee Blue Team dan\u00e9 zneu\u017eit\u00ed zranitelnosti oprav\u00ed.<\/p>\n<h3>POKRA\u010cOV\u00c1N\u00cd FYZICK\u00c9 INFILTRACE<\/h3>\n<p>Pokud se Red Team fyzicky dostane do budovy organizace tak pokra\u010duje v infiltraci.\u00a0 Pokud c\u00edlov\u00e1 vlajka nen\u00ed definov\u00e1na jinak, tak obvykle je d\u016fle\u017eit\u00e9 z\u00edskat fyzick\u00fd p\u0159\u00edstup do serverovny \u010di fyzick\u00e9ho archivu citliv\u00fdch dokument\u016f (pracovna CEO).\u00a0 Pro tento \u00fa\u010del \u010dlenov\u00e9 Red Teamu pou\u017e\u00edvaj\u00ed specializovan\u00fd hardware (mini kamery, portabiln\u00ed wifi hotspoty, klonovac\u00ed za\u0159\u00edzen\u00ed na \u010dipov\u00e9 karty atd).\u00a0 Disponuj\u00ed tak\u00e9 tzv.\u00a0 \u201cGet out of jail letter\u201d, tedy ofici\u00e1ln\u00edm dokumentem, kter\u00fdm se prok\u00e1\u017e\u00ed v p\u0159\u00edpad\u011b, \u017ee budou p\u0159isti\u017eeni s c\u00edlem zabr\u00e1nit p\u0159\u00edpadn\u00e9mu n\u00e1sil\u00ed.<\/p>\n<h1>V\u00ddSLEDN\u00c1 ZPR\u00c1VA<\/h1>\n<p>V\u00fdsledn\u00e1 zpr\u00e1va krom\u011b mana\u017eersk\u00e9ho shrnut\u00ed obsahuje seznam v\u0161ech cest (v\u011bt\u0161ina je slep\u00fdch), kter\u00e9 Red Team vyzkou\u0161el.\u00a0 Dokumentuje p\u0159esn\u00fd pr\u016fb\u011bh jak se Red Team z\u00edskal k dan\u00e9mu c\u00edli a jak\u00fdm n\u00e1strah\u00e1m b\u011bhem tohoto procesu musel \u010delit.\u00a0 Sou\u010d\u00e1st\u00ed je seznam zneu\u017eit\u00fdch zranitelnost\u00ed v\u010detn\u011b toho jak uvedenou zranitelnost, bu\u010f zcela nebo alespo\u0148 \u010d\u00e1ste\u010dn\u011b, opravit.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>ODOL\u00c1TE PROFESION\u00c1LN\u00cdMU \u00daTOKU? \u201cRed Teaming\u201d p\u0159edstavuje kombinaci information Gathering (OSINT), blackbox penetra\u010dn\u00edch test\u016f s c\u00edlem minimalizovat jejich detekci ze strany z\u00e1kazn\u00edka a soci\u00e1ln\u00edho in\u017een\u00fdrstv\u00ed jak ve form\u011b sofistikovan\u00e9ho spear phishingu,\u00a0 tak fyzick\u00e9 infiltrace. Red Team p\u0159edstavuje profesion\u00e1ln\u00ed t\u00fdm hacker\u016f, soci\u00e1ln\u00edch in\u017een\u00fdr\u016f a \u201cintelligence\u201d expert\u016f, kte\u0159\u00ed dok\u00e1\u017e\u00ed z\u00edsk\u00e1vat, analyzovat a n\u00e1sledn\u011b vyu\u017e\u00edvat mno\u017estv\u00ed d\u016fle\u017eit\u00fdch informac\u00ed pot\u0159ebn\u00fdch [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":464,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"services_detail.php","meta":{"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-5656","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Red Teaming - Nethemba<\/title>\n<meta name=\"description\" content=\"Odol\u00e1te profesion\u00e1ln\u00edmu \u00fatoku? Red Team p\u0159edstavuje profesion\u00e1ln\u00ed t\u00fdm hacker\u016f, soci\u00e1ln\u00edch in\u017een\u00fdr\u016f a \u201cintelligence\u201d expert\u016f.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nethemba.com\/cs\/sluzby\/it-bezpecnostni-sluzby\/red-teaming\/\" \/>\n<meta property=\"og:locale\" content=\"cs_CZ\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Red Teaming - Nethemba\" \/>\n<meta property=\"og:description\" content=\"Odol\u00e1te profesion\u00e1ln\u00edmu \u00fatoku? Red Team p\u0159edstavuje profesion\u00e1ln\u00ed t\u00fdm hacker\u016f, soci\u00e1ln\u00edch in\u017een\u00fdr\u016f a \u201cintelligence\u201d expert\u016f.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nethemba.com\/cs\/sluzby\/it-bezpecnostni-sluzby\/red-teaming\/\" \/>\n<meta property=\"og:site_name\" content=\"Nethemba\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/nethemba\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-07T01:32:04+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@nethemba\" \/>\n<meta name=\"twitter:label1\" content=\"Odhadovan\u00e1 doba \u010dten\u00ed\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minut\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nethemba.com\\\/cs\\\/sluzby\\\/it-bezpecnostni-sluzby\\\/red-teaming\\\/\",\"url\":\"https:\\\/\\\/nethemba.com\\\/cs\\\/sluzby\\\/it-bezpecnostni-sluzby\\\/red-teaming\\\/\",\"name\":\"Red Teaming - Nethemba\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nethemba.com\\\/de\\\/#website\"},\"datePublished\":\"2021-04-07T01:13:09+00:00\",\"dateModified\":\"2021-04-07T01:32:04+00:00\",\"description\":\"Odol\u00e1te profesion\u00e1ln\u00edmu \u00fatoku? Red Team p\u0159edstavuje profesion\u00e1ln\u00ed t\u00fdm hacker\u016f, soci\u00e1ln\u00edch in\u017een\u00fdr\u016f a \u201cintelligence\u201d expert\u016f.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nethemba.com\\\/cs\\\/sluzby\\\/it-bezpecnostni-sluzby\\\/red-teaming\\\/#breadcrumb\"},\"inLanguage\":\"cs\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nethemba.com\\\/cs\\\/sluzby\\\/it-bezpecnostni-sluzby\\\/red-teaming\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nethemba.com\\\/cs\\\/sluzby\\\/it-bezpecnostni-sluzby\\\/red-teaming\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nethemba.com\\\/cs\\\/home-new-2025\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Slu\u017eby\",\"item\":\"https:\\\/\\\/nethemba.com\\\/cs\\\/sluzby\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IT bezpe\u010dnostn\u00ed slu\u017eby\",\"item\":\"https:\\\/\\\/nethemba.com\\\/cs\\\/sluzby\\\/it-bezpecnostni-sluzby\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Red Teaming\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nethemba.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/nethemba.com\\\/de\\\/\",\"name\":\"Nethemba\",\"description\":\"We care about your security\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nethemba.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"cs\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Red Teaming - Nethemba","description":"Odol\u00e1te profesion\u00e1ln\u00edmu \u00fatoku? Red Team p\u0159edstavuje profesion\u00e1ln\u00ed t\u00fdm hacker\u016f, soci\u00e1ln\u00edch in\u017een\u00fdr\u016f a \u201cintelligence\u201d expert\u016f.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nethemba.com\/cs\/sluzby\/it-bezpecnostni-sluzby\/red-teaming\/","og_locale":"cs_CZ","og_type":"article","og_title":"Red Teaming - Nethemba","og_description":"Odol\u00e1te profesion\u00e1ln\u00edmu \u00fatoku? Red Team p\u0159edstavuje profesion\u00e1ln\u00ed t\u00fdm hacker\u016f, soci\u00e1ln\u00edch in\u017een\u00fdr\u016f a \u201cintelligence\u201d expert\u016f.","og_url":"https:\/\/nethemba.com\/cs\/sluzby\/it-bezpecnostni-sluzby\/red-teaming\/","og_site_name":"Nethemba","article_publisher":"https:\/\/www.facebook.com\/nethemba","article_modified_time":"2021-04-07T01:32:04+00:00","twitter_card":"summary_large_image","twitter_site":"@nethemba","twitter_misc":{"Odhadovan\u00e1 doba \u010dten\u00ed":"7 minut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/nethemba.com\/cs\/sluzby\/it-bezpecnostni-sluzby\/red-teaming\/","url":"https:\/\/nethemba.com\/cs\/sluzby\/it-bezpecnostni-sluzby\/red-teaming\/","name":"Red Teaming - Nethemba","isPartOf":{"@id":"https:\/\/nethemba.com\/de\/#website"},"datePublished":"2021-04-07T01:13:09+00:00","dateModified":"2021-04-07T01:32:04+00:00","description":"Odol\u00e1te profesion\u00e1ln\u00edmu \u00fatoku? Red Team p\u0159edstavuje profesion\u00e1ln\u00ed t\u00fdm hacker\u016f, soci\u00e1ln\u00edch in\u017een\u00fdr\u016f a \u201cintelligence\u201d expert\u016f.","breadcrumb":{"@id":"https:\/\/nethemba.com\/cs\/sluzby\/it-bezpecnostni-sluzby\/red-teaming\/#breadcrumb"},"inLanguage":"cs","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nethemba.com\/cs\/sluzby\/it-bezpecnostni-sluzby\/red-teaming\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/nethemba.com\/cs\/sluzby\/it-bezpecnostni-sluzby\/red-teaming\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nethemba.com\/cs\/home-new-2025\/"},{"@type":"ListItem","position":2,"name":"Slu\u017eby","item":"https:\/\/nethemba.com\/cs\/sluzby\/"},{"@type":"ListItem","position":3,"name":"IT bezpe\u010dnostn\u00ed slu\u017eby","item":"https:\/\/nethemba.com\/cs\/sluzby\/it-bezpecnostni-sluzby\/"},{"@type":"ListItem","position":4,"name":"Red Teaming"}]},{"@type":"WebSite","@id":"https:\/\/nethemba.com\/de\/#website","url":"https:\/\/nethemba.com\/de\/","name":"Nethemba","description":"We care about your security","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nethemba.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"cs"}]}},"_links":{"self":[{"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/pages\/5656","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/comments?post=5656"}],"version-history":[{"count":0,"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/pages\/5656\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/pages\/464"}],"wp:attachment":[{"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/media?parent=5656"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}