{"id":1175,"date":"2010-12-14T11:12:59","date_gmt":"2010-12-14T11:12:59","guid":{"rendered":"http:\/\/nethemba.com\/de\/ako-dopadol-prvy-confidence-v-prahe\/"},"modified":"2010-12-14T11:12:59","modified_gmt":"2010-12-14T11:12:59","slug":"ako-dopadol-prvy-confidence-v-prahe","status":"publish","type":"post","link":"https:\/\/nethemba.com\/de\/ako-dopadol-prvy-confidence-v-prahe\/","title":{"rendered":"Ako dopadol prv\u00fd Confidence v Prahe"},"content":{"rendered":"<p>Pred dvomi t\u00fd\u017ed\u0148ami skon\u010dil \u00f4smy ro\u010dn\u00edk medzin\u00e1rodnej IT bezpe\u010dnostnej technologickej konferencie Confidence 2.0, ktor\u00e1 sa ale v Prahe konala \u00faplne prv\u00fdkr\u00e1t. Konferencie sa z\u00fa\u010dastnilo mno\u017estvo nad\u0161encov z cel\u00e9ho sveta, ve\u013ek\u00e1 \u00fa\u010das\u0165 bola z Po\u013eska (viac ako 70 \u013eud\u00ed), ako aj zo Slovenska, \u010di Ma\u010farska. Pozvan\u00ed predn\u00e1\u0161aj\u00faci pricestovali z 25 r\u00f4znych kraj\u00edn z cel\u00e9ho sveta.<\/p>\n<p>Aj napriek tomu, \u017ee som bol cel\u00fa konferenciu \u00faplne zahlten\u00fd pr\u00e1cou (staros\u0165ami o predn\u00e1\u0161aj\u00facich) a ve\u013ea prezent\u00e1ci\u00ed som preme\u0161kal, r\u00e1d by som sa s Vami podelil s dostupn\u00fdm materi\u00e1lom z prezent\u00e1ci\u00ed, ktor\u00e9 na Confidence 2.0 v Prahe odzneli.<\/p>\n<p>Konferenciu otvoril svojou \u0161okuj\u00facou prezent\u00e1ciou u\u017e n\u00e1\u0161 kamar\u00e1t <a href=\"http:\/\/samy.pl\/\">Samy Kamkar<\/a> &#8211; <a href=\"http:\/\/samy.pl\/talks\/2010-talk.ppt\">How I Met Your Girlfriend<\/a>, ktor\u00fa sme mali mo\u017enos\u0165 vidie\u0165 minul\u00fd mesiac aj v Bratislave (<a href=\"https:\/\/www.nethemba.com\/sk\/blog\/-\/blogs\/prednaska-samyho-kamkara-v-bratislave\">detailn\u00fd popis jeho prezent\u00e1cie k dispoz\u00edcii<\/a>)<\/p>\n<p>Juraj Malcho zo spolo\u010dnosti ESET mal prezent\u00e1ciu o Stuxnete &#8211; sofistikovanom worme, ktor\u00fd infikuje Siemens \u00fastredne (<a href=\"http:\/\/www.eset.com\/resources\/white-papers\/Stuxnet_Under_the_Microscope.pdf\">Stuxnet Under the Microscope od Juraja Malcha k dispoz\u00edcii<\/a>). Zauj\u00edmav\u00e9 na tomto worme je fakt, \u017ee je skuto\u010dne komplexn\u00fd a existuj\u00fa \u0161pekul\u00e1cie, \u017ee bol vytvoren\u00fd americk\u00fdmi tajn\u00fdmi agent\u00farami s cie\u013eom za\u00fato\u010di\u0165 na Ir\u00e1nske SCADA syst\u00e9my.<\/p>\n<p>Deviant Ollam mal praktick\u00fa a u\u017eito\u010dnu predn\u00e1\u0161ku o 10-tich veciach, ktor\u00e9 by ste mali vedie\u0165 o fyzickej bezpe\u010dnosti a lockpickingu. Deviant m\u00e1 o lockpickingu mno\u017estvo <a href=\"http:\/\/deviating.net\/lockpicking\/slides.html\">prezent\u00e1ci\u00ed<\/a> a je \u010dlenom v\u00fdkonneho v\u00fdboru najv\u00e4\u010d\u0161ej americkej organiz\u00e1cie na lockpicking <a href=\"http:\/\/toool.us\/\">Toool<\/a>. Na Confidence konferencii viedol tie\u017e samostatn\u00fd lockpicking workshop, ktor\u00fd bol otvoren\u00fd v\u0161etk\u00fdm \u00fa\u010dastn\u00edkom konferencie, kde bola mo\u017enos\u0165 na\u017eivo si vysk\u00fa\u0161a\u0165 svoje lockpicking schopnosti, \u010di nak\u00fapi\u0165 pr\u00edslu\u0161n\u00e9 lockpicking n\u00e1stroje.<\/p>\n<p>Brad \u201cRenderMan\u201d Haines, spoluautor popul\u00e1rneho n\u00e1stroja Kismet a knihy <a href=\"http:\/\/www.amazon.com\/Kismet-Hacking-Brad-Haines\/dp\/1597491179\/ref=sr_1_1?ie=UTF8&amp;s=books&amp;qid=1292333686&amp;sr=8-1\">Kismet Hacking <\/a>vyst\u00fapil s prezent\u00e1ciou <a href=\"http:\/\/201002.confidence.org.pl\/prelegenci\/brad-renderman-haines\">802 NOT 11<\/a>.<\/p>\n<p>Zameran\u00edm a inovat\u00edvnos\u0165ou ma oslovila prezent\u00e1cia Maria Heidricha a Johannessa Hoffmana. Mario hovoril s\u00edce r\u00fdchlo, ale zauj\u00edmavo &#8211; odprezentoval nov\u00e9 \u00fatoky na Firebug, Eclipse, Zend Studio, Plesk, OTRS, n\u00e1stroje, ktor\u00e9 sa mas\u00edvne dos\u0165 pou\u017e\u00edvaj\u00fa. Nako\u013eko injektovan\u00fd javascript (cez XSS zranite\u013enos\u0165) sa vykon\u00e1va na strane klienta, je mo\u017en\u00e9 realizova\u0165 \u00fatoky priamo v intranete, napr\u00edklad za\u00fato\u010di\u0165 na intern\u00fd SVN syst\u00e9m cez dostupn\u00e9 WebDAV rozhranie a docieli\u0165 napr\u00edklad submitnutie ne\u017eelan\u00e9ho k\u00f3du. Mario demon\u0161troval, \u017ee len v Ubuntu 10.10 sa nach\u00e1dza nespo\u010detne ve\u013ea bal\u00edkov zranite\u013en\u00fdch na DOMXSS (napr\u00edklad CouchDB), kedy je mo\u017en\u00e9 pristupova\u0165 priamo na disk. (<a href=\"http:\/\/www.slideshare.net\/x00mario\/dev-and-blind-attacking-the-weakest-link-in-it-security\">slajdy k dispoz\u00edcii<\/a>)<\/p>\n<p>Juraj Bedn\u00e1r, Tom\u00e1\u0161 Za\u0165ko a ja sme tvorili slovensk\u00fa pos\u00e1dku predn\u00e1\u0161aj\u00facich &#8211; Juraj mal prezent\u00e1ciu o DSSH klientovi (<a href=\"http:\/\/slidesha.re\/eFzRF8\">slajdy k dispoz\u00edcii<\/a>), Tom\u00e1\u0161 o pou\u017e\u00edvan\u00fdch bezpe\u010dnostn\u00fdch praktik\u00e1ch a ja o verejne zranite\u013en\u00fdch mas\u00edvne pou\u017e\u00edvan\u00fdch technol\u00f3gi\u00e1ch (<a href=\"http:\/\/www.nethemba.com\/confidence-presentation.pdf\">slajdy k dispoz\u00edcii<\/a>).<\/p>\n<p>Marcell Major z Ma\u010farska mal zauj\u00edmav\u00fa a odborn\u00fa prezent\u00e1ciu o tom, ako je mo\u017en\u00e9 si vytvori\u0165 vlastn\u00fd cracker na hesl\u00e1 (<a href=\"http:\/\/marcellmajor.com\/Hacktivity2010_WritingOwnPasswordCracker.pdf\">slajdy k dispoz\u00edcii<\/a>).<\/p>\n<p>Mateusz Drygas a Tomasz Nowak z Po\u013eska mali prezent\u00e1ciu Discovery and visualization of network protocols with tools for biological sequence alignment, kde predstavili svoj bioinformatick\u00fd softv\u00e9r a met\u00f3dy na rie\u0161enie probl\u00e9mov reverzn\u00e9ho in\u017einierstva. (<a href=\"http:\/\/security.psnc.pl\/files\/confidence_201002.pdf\">slajdy k dispoz\u00edci\u00ed<\/a>)<\/p>\n<p>Raoul Chiesa je pravideln\u00fd predn\u00e1\u0161aj\u00faci na v\u0161etk\u00fdch Confidence konferenci\u00e1ch. Jeho nov\u00e1 zaujimav\u00e1 prezent\u00e1cia sa t\u00fdkala cyberkriminality, cyberzlo\u010dinu z poh\u013eadu hackerov, teda \u013eudi, ktor\u00ed sa v IT bezpe\u010dnosti dobre orientuju.<\/p>\n<p>Nick Nikiforakis mal WebAppSec prezent\u00e1ciu o hackovan\u00ed webov\u00fdch aplik\u00e1ci\u00ed v shared-hosting prostrediach, kde predstavil \u00fatoky ako PHP session spoofing a poisoning (<a href=\"http:\/\/www.securitee.org\/files\/break_webapp.pdf\">slajdy k dispoz\u00edcii<\/a>).<\/p>\n<p>Johaness Dahse mal velmi zauj\u00edmav\u00fa a praktick\u00fa demon\u0161tr\u00e1ciu o tom ako je mo\u017en\u00e9 obfuskova\u0165 SQL k\u00f3d a ob\u00eds\u0165 SQL aplika\u010dn\u00e9 firewally a filtre (napr\u00edklad mod_security, GreenSQL, \u010di PHP IDS) (<a href=\"http:\/\/websec.files.wordpress.com\/2010\/11\/sqli2.pdf\">slajdy k dispoz\u00edcii<\/a>).<\/p>\n<p>Chema Alonso z Madridu mal ve\u013emi vtipn\u00fa prezent\u00e1ciu o projekte FOCA, ktor\u00fd slu\u017e\u00ed na zbieranie inform\u00e1ci\u00ed &#8211; footprinting\/fingerprint (nielen) po\u010das penetra\u010dn\u00e9ho testu. FOCA je n\u00e1stroj, ktor\u00fd umo\u017e\u0148uje vyh\u013ead\u00e1va\u0165 v DNS cache, svetov\u00fdch vyh\u013ead\u00e1va\u010doch, software recognition vyhlad\u00e1va\u010doch ako SHODAN apod. Jeho cie\u013eom je z\u00edska\u0165 \u010do najviac inform\u00e1ci\u00ed z verejne dostupn\u00fdch zdrojov (<a href=\"http:\/\/www.dep.uaemex.mx\/fca\/simposium\/ChemaAlonso-Informatica64.pdf\">slajdy k dispoz\u00edcii<\/a>).<\/p>\n<p>Andzej Dereszwoski mal prezent\u00e1ciu o vysoko cielen\u00fdch \u00fatokoch vo\u010di korpor\u00e1ci\u00e1m\u00a0 &#8211; pou\u017eit\u00edm \u0161pecializovan\u00fdch trojanov na z\u00edskanie pr\u00edstupu do internej siete. Cie\u013eom prezent\u00e1cie nebolo pop\u00edsa\u0165 konkr\u00e9tne exploitovacie met\u00f3dy, ale hlb\u0161ie analyzova\u0165 v\u00fdvoj, pou\u017eitie a mo\u017enosti tak\u00fdchto trojanov (<a href=\"https:\/\/media.blackhat.com\/bh-eu-10\/presentations\/Dereszowski\/BlackHat-EU-2010-Dereszowski-Targeted-Attacks-slides.pdf\">slajdy k dispoz\u00edcii<\/a>).<\/p>\n<p>Pre fan\u00fa\u0161ikov Oracle L\u00e1szl\u00f3 T\u00f3th z Budape\u0161ti mal ve\u013emi odborn\u00fa prezent\u00e1ciu Oracle Post Exploitation Techniques (<a href=\"http:\/\/www.soonerorlater.hu\/download\/hacktivity_lt_2010_en.pdf\">slajdy k dispoz\u00edcii<\/a>).<\/p>\n<p>Jedna z najzauj\u00edmavej\u0161\u00edch a naj\u0161okuj\u00facej\u0161\u00edch prezent\u00e1ci\u00ed bola predn\u00e1\u0161ka Moskov\u010dana <a href=\"http:\/\/en.wikipedia.org\/wiki\/Dmitry_Sklyarov\">Dmitryho Sklyarova<\/a> &#8222;Forging Canon Original Decision Data&#8220;. \u00c1no, ide presne o toho ist\u00e9ho rusa, ktor\u00fd v roku 2001 sp\u00f4sobil medzin\u00e1rodn\u00fd americko-rusk\u00fd konflikt, kedy ho po jeho prezent\u00e1cii na Blackhate, kde odprezentoval svoj n\u00e1stroj na konvertovanie Adobe Secure e-Book form\u00e1tu do PDF (ktor\u00fd poru\u0161il viacero copyright ochr\u00e1n), bol zatknut\u00fd americkou pol\u00edciou a dr\u017ean\u00fd v USA a\u017e 6 mesiacov. Nakoniec bol americk\u00fdm s\u00fadom osloboden\u00fd (nako\u013eko americk\u00fd z\u00e1kon neporu\u0161il ako cudz\u00ed pr\u00edslu\u0161n\u00edk vedome) a mohol sa slobodne vr\u00e1ti\u0165 do Ruska. V uvedenom \u010dase sa spustilo na svete viacero <a href=\"http:\/\/www.freesklyarov.org\/\">pet\u00edci\u00ed<\/a>za jeho oslobodenie.<\/p>\n<p>Jeho prezent\u00e1cia demon\u0161trovala ako je mo\u017en\u00e9 podvrhn\u00fa\u0165 &#8222;Original Decision Data&#8220;, ktor\u00e9 identifikuj\u00fa originalitu danej fotografie. S\u00fa\u010dasn\u00e9 Canon fotoapar\u00e1ty toti\u017e digit\u00e1lne podpisuj\u00fa jednotliv\u00e9 fotografie, tak\u017ee je mo\u017en\u00e9 (pomocou \u0161pecializovan\u00fdch hardverov\u00fdch verifika\u010dn\u00fdch zariaden\u00ed) odhali\u0165, \u010di dan\u00e1 fotografia je prav\u00e1 (odfoten\u00e1 dan\u00fdm fotoapar\u00e1tom) alebo upravovan\u00e1 (napr\u00edklad vo Photoshope). Dmitry vydumpoval norm\u00e1lne ne\u010ditateln\u00fd firmware fotoapar\u00e1tu pomocou blikania LEDky (po jednotk\u00e1ch a nul\u00e1ch!), ktor\u00fd n\u00e1sledne oddebugoval a analyzoval. Z\u00edskal HMAC k\u013e\u00fa\u010d, ktor\u00fd je rovnak\u00fd pre jeden model dan\u00e9ho fotoapar\u00e1tu (a odli\u0161n\u00fd pre ka\u017ed\u00fd model). So znalos\u0165ou tohto kl\u00fa\u010da dok\u00e1zal podvrhn\u00fa\u0165 vlastn\u00e9 ODD data (podpis) a dan\u00fa fotografiu t\u00fdm p\u00e1dom upravi\u0165 pod\u013ea \u013eubovo\u013ee. Dmitry sa rozhodol t\u00fato v\u00e1\u017enu zranite\u013enos\u0165 (ktor\u00e1 sa t\u00fdka v\u0161etk\u00fdch s\u00fa\u010dasn\u00fdch Canon fotoapar\u00e1tov) publikova\u0165 prv\u00fdkr\u00e1t na Confidence konferencii, \u010do n\u00e1s ve\u013emi te\u0161\u00ed (<a href=\"http:\/\/www.elcomsoft.com\/presentations\/Forging_Canon_Original_Decision_Data.pdf\">slajdy k dispoz\u00edcii<\/a>).<\/p>\n<p>Lukasz Bromirski mal vy\u010derp\u00e1vaj\u00facu prezent\u00e1ciu o bezpe\u010dnosti IPv6 (<a href=\"http:\/\/lukasz.bromirski.net\/docs\/prezos\/confidence2010\/ipv6_insecurity.pdf\">slajdy k dispoz\u00edcii<\/a>).<\/p>\n<p>Alexey Sintsov a Alexandr Polyakov mali prezent\u00e1ciu o bezpe\u010dnostn\u00fdch zranite\u013enostiach v <a href=\"http:\/\/www.owasp.org\/index.php\/Testing_for_business_logic_%28OWASP-BL-001%29\">biznis logike aplik\u00e1ci\u00ed<\/a>, ktor\u00e9 m\u00f4\u017eu jednoducho vies\u0165 ku kompletn\u00e9mu kompromitovaniu aplik\u00e1cie aj napriek tomu, \u017ee v\u0161etky vstupy (a v\u00fdstupy) s\u00fa korektne o\u0161etrovan\u00e9. Tento druh zranite\u013enosti demon\u0161trovali na existuj\u00facom mas\u00edvne pou\u017e\u00edvanom RDBMS syst\u00e9me.<\/p>\n<p>Confidence ukon\u010dila svojou prezent\u00e1ciou \u0161armantn\u00e1 Sharon Conheady z \u00cdrska, ktor\u00e1 demon\u0161trovala, \u017ee soci\u00e1lne in\u017einierstvo st\u00e1le nestr\u00e1ca na aktu\u00e1lnosti &#8211; pr\u00e1ve naopak, je \u010d\u00edm \u010falej t\u00fdm sofistikovanej\u0161ie a v\u017edy v bezpe\u010dnostom syst\u00e9me predstavuje najslab\u0161\u00ed zneu\u017eite\u013en\u00fd \u010dl\u00e1nok. Pri kombin\u00e1ci\u00ed s tradi\u010dn\u00fdmi met\u00f3dami hackovania m\u00f4\u017ee by\u0165 soci\u00e1lne in\u017einierstvo extr\u00e9mne nebezpe\u010dn\u00e9. Sharon uk\u00e1zala, ako bude vyzera\u0165 soci\u00e1lne in\u017einierstvo v bud\u00facnosti\u00a0 (napr\u00edklad silne vyu\u017e\u00edva\u0165 vlastnosti soci\u00e1lnych siet\u00ed, SEO, datamining a korela\u010dn\u00e9 n\u00e1stroje, Social Engineering Toolkit, ..) (<a href=\"http:\/\/milano.securitysummit.it\/upload\/file\/atti%20milano%202010\/18%20marzo\/16.%20C0NHEADY.pdf\">slajdy k dispoz\u00edcii<\/a>).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Pred dvomi t\u00fd\u017ed\u0148ami skon\u010dil \u00f4smy ro\u010dn\u00edk medzin\u00e1rodnej IT bezpe\u010dnostnej technologickej konferencie Confidence 2.0, ktor\u00e1 sa ale v Prahe konala \u00faplne prv\u00fdkr\u00e1t. Konferencie sa z\u00fa\u010dastnilo mno\u017estvo nad\u0161encov z cel\u00e9ho sveta, ve\u013ek\u00e1 \u00fa\u010das\u0165 bola z Po\u013eska (viac ako 70 \u013eud\u00ed), ako aj zo Slovenska, \u010di Ma\u010farska. Pozvan\u00ed predn\u00e1\u0161aj\u00faci pricestovali z 25 r\u00f4znych kraj\u00edn z cel\u00e9ho sveta. Aj [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[11],"tags":[505,75,506,490,507],"class_list":["post-1175","post","type-post","status-publish","format-standard","hentry","category-unkategorisiert","tag-bezpecnostne-audity-de","tag-confidence-de","tag-it-bezpecnostna-konferencia-de","tag-penetracne-testy-de","tag-socialne-inzinierstvo-de"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ako dopadol prv\u00fd Confidence v Prahe - Nethemba<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nethemba.com\/de\/ako-dopadol-prvy-confidence-v-prahe\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ako dopadol prv\u00fd Confidence v Prahe - Nethemba\" \/>\n<meta property=\"og:description\" content=\"Pred dvomi t\u00fd\u017ed\u0148ami skon\u010dil \u00f4smy ro\u010dn\u00edk medzin\u00e1rodnej IT bezpe\u010dnostnej technologickej konferencie Confidence 2.0, ktor\u00e1 sa ale v Prahe konala \u00faplne prv\u00fdkr\u00e1t. Konferencie sa z\u00fa\u010dastnilo mno\u017estvo nad\u0161encov z cel\u00e9ho sveta, ve\u013ek\u00e1 \u00fa\u010das\u0165 bola z Po\u013eska (viac ako 70 \u013eud\u00ed), ako aj zo Slovenska, \u010di Ma\u010farska. Pozvan\u00ed predn\u00e1\u0161aj\u00faci pricestovali z 25 r\u00f4znych kraj\u00edn z cel\u00e9ho sveta. Aj [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nethemba.com\/de\/ako-dopadol-prvy-confidence-v-prahe\/\" \/>\n<meta property=\"og:site_name\" content=\"Nethemba\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/nethemba\" \/>\n<meta property=\"article:published_time\" content=\"2010-12-14T11:12:59+00:00\" \/>\n<meta name=\"author\" content=\"Pavol Lupt\u00e1k\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@nethemba\" \/>\n<meta name=\"twitter:site\" content=\"@nethemba\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pavol Lupt\u00e1k\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"7\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nethemba.com\\\/de\\\/ako-dopadol-prvy-confidence-v-prahe\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nethemba.com\\\/de\\\/ako-dopadol-prvy-confidence-v-prahe\\\/\"},\"author\":{\"name\":\"Pavol Lupt\u00e1k\",\"@id\":\"https:\\\/\\\/nethemba.com\\\/de\\\/#\\\/schema\\\/person\\\/5f4ba68c8e1a2013d30e0804245b8234\"},\"headline\":\"Ako dopadol prv\u00fd Confidence v Prahe\",\"datePublished\":\"2010-12-14T11:12:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nethemba.com\\\/de\\\/ako-dopadol-prvy-confidence-v-prahe\\\/\"},\"wordCount\":1337,\"commentCount\":0,\"keywords\":[\"bezpe\u010dnostn\u00e9 audity\",\"confidence\",\"it bezpe\u010dnostn\u00e1 konferencia\",\"penetra\u010dn\u00e9 testy\",\"soci\u00e1lne in\u017einierstvo\"],\"articleSection\":[\"Unkategorisiert\"],\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nethemba.com\\\/de\\\/ako-dopadol-prvy-confidence-v-prahe\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nethemba.com\\\/de\\\/ako-dopadol-prvy-confidence-v-prahe\\\/\",\"url\":\"https:\\\/\\\/nethemba.com\\\/de\\\/ako-dopadol-prvy-confidence-v-prahe\\\/\",\"name\":\"Ako dopadol prv\u00fd Confidence v Prahe - Nethemba\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nethemba.com\\\/de\\\/#website\"},\"datePublished\":\"2010-12-14T11:12:59+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/nethemba.com\\\/de\\\/#\\\/schema\\\/person\\\/5f4ba68c8e1a2013d30e0804245b8234\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nethemba.com\\\/de\\\/ako-dopadol-prvy-confidence-v-prahe\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nethemba.com\\\/de\\\/ako-dopadol-prvy-confidence-v-prahe\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nethemba.com\\\/de\\\/ako-dopadol-prvy-confidence-v-prahe\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nethemba.com\\\/de\\\/home-new-2025\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ako dopadol prv\u00fd Confidence v Prahe\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nethemba.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/nethemba.com\\\/de\\\/\",\"name\":\"Nethemba\",\"description\":\"We care about your security\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nethemba.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nethemba.com\\\/de\\\/#\\\/schema\\\/person\\\/5f4ba68c8e1a2013d30e0804245b8234\",\"name\":\"Pavol Lupt\u00e1k\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/978b23022518d076eaa243b375d2e0272af4f00dd502ce79cc357276d9bc2495?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/978b23022518d076eaa243b375d2e0272af4f00dd502ce79cc357276d9bc2495?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/978b23022518d076eaa243b375d2e0272af4f00dd502ce79cc357276d9bc2495?s=96&d=mm&r=g\",\"caption\":\"Pavol Lupt\u00e1k\"},\"sameAs\":[\"https:\\\/\\\/www.nethemba.com\\\/\"],\"url\":\"https:\\\/\\\/nethemba.com\\\/de\\\/author\\\/nethemba-admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ako dopadol prv\u00fd Confidence v Prahe - Nethemba","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nethemba.com\/de\/ako-dopadol-prvy-confidence-v-prahe\/","og_locale":"de_DE","og_type":"article","og_title":"Ako dopadol prv\u00fd Confidence v Prahe - Nethemba","og_description":"Pred dvomi t\u00fd\u017ed\u0148ami skon\u010dil \u00f4smy ro\u010dn\u00edk medzin\u00e1rodnej IT bezpe\u010dnostnej technologickej konferencie Confidence 2.0, ktor\u00e1 sa ale v Prahe konala \u00faplne prv\u00fdkr\u00e1t. Konferencie sa z\u00fa\u010dastnilo mno\u017estvo nad\u0161encov z cel\u00e9ho sveta, ve\u013ek\u00e1 \u00fa\u010das\u0165 bola z Po\u013eska (viac ako 70 \u013eud\u00ed), ako aj zo Slovenska, \u010di Ma\u010farska. Pozvan\u00ed predn\u00e1\u0161aj\u00faci pricestovali z 25 r\u00f4znych kraj\u00edn z cel\u00e9ho sveta. Aj [&hellip;]","og_url":"https:\/\/nethemba.com\/de\/ako-dopadol-prvy-confidence-v-prahe\/","og_site_name":"Nethemba","article_publisher":"https:\/\/www.facebook.com\/nethemba","article_published_time":"2010-12-14T11:12:59+00:00","author":"Pavol Lupt\u00e1k","twitter_card":"summary_large_image","twitter_creator":"@nethemba","twitter_site":"@nethemba","twitter_misc":{"Verfasst von":"Pavol Lupt\u00e1k","Gesch\u00e4tzte Lesezeit":"7\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nethemba.com\/de\/ako-dopadol-prvy-confidence-v-prahe\/#article","isPartOf":{"@id":"https:\/\/nethemba.com\/de\/ako-dopadol-prvy-confidence-v-prahe\/"},"author":{"name":"Pavol Lupt\u00e1k","@id":"https:\/\/nethemba.com\/de\/#\/schema\/person\/5f4ba68c8e1a2013d30e0804245b8234"},"headline":"Ako dopadol prv\u00fd Confidence v Prahe","datePublished":"2010-12-14T11:12:59+00:00","mainEntityOfPage":{"@id":"https:\/\/nethemba.com\/de\/ako-dopadol-prvy-confidence-v-prahe\/"},"wordCount":1337,"commentCount":0,"keywords":["bezpe\u010dnostn\u00e9 audity","confidence","it bezpe\u010dnostn\u00e1 konferencia","penetra\u010dn\u00e9 testy","soci\u00e1lne in\u017einierstvo"],"articleSection":["Unkategorisiert"],"inLanguage":"de","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nethemba.com\/de\/ako-dopadol-prvy-confidence-v-prahe\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nethemba.com\/de\/ako-dopadol-prvy-confidence-v-prahe\/","url":"https:\/\/nethemba.com\/de\/ako-dopadol-prvy-confidence-v-prahe\/","name":"Ako dopadol prv\u00fd Confidence v Prahe - Nethemba","isPartOf":{"@id":"https:\/\/nethemba.com\/de\/#website"},"datePublished":"2010-12-14T11:12:59+00:00","author":{"@id":"https:\/\/nethemba.com\/de\/#\/schema\/person\/5f4ba68c8e1a2013d30e0804245b8234"},"breadcrumb":{"@id":"https:\/\/nethemba.com\/de\/ako-dopadol-prvy-confidence-v-prahe\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nethemba.com\/de\/ako-dopadol-prvy-confidence-v-prahe\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/nethemba.com\/de\/ako-dopadol-prvy-confidence-v-prahe\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nethemba.com\/de\/home-new-2025\/"},{"@type":"ListItem","position":2,"name":"Ako dopadol prv\u00fd Confidence v Prahe"}]},{"@type":"WebSite","@id":"https:\/\/nethemba.com\/de\/#website","url":"https:\/\/nethemba.com\/de\/","name":"Nethemba","description":"We care about your security","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nethemba.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Person","@id":"https:\/\/nethemba.com\/de\/#\/schema\/person\/5f4ba68c8e1a2013d30e0804245b8234","name":"Pavol Lupt\u00e1k","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/978b23022518d076eaa243b375d2e0272af4f00dd502ce79cc357276d9bc2495?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/978b23022518d076eaa243b375d2e0272af4f00dd502ce79cc357276d9bc2495?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/978b23022518d076eaa243b375d2e0272af4f00dd502ce79cc357276d9bc2495?s=96&d=mm&r=g","caption":"Pavol Lupt\u00e1k"},"sameAs":["https:\/\/www.nethemba.com\/"],"url":"https:\/\/nethemba.com\/de\/author\/nethemba-admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nethemba.com\/de\/wp-json\/wp\/v2\/posts\/1175","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nethemba.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nethemba.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nethemba.com\/de\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/nethemba.com\/de\/wp-json\/wp\/v2\/comments?post=1175"}],"version-history":[{"count":0,"href":"https:\/\/nethemba.com\/de\/wp-json\/wp\/v2\/posts\/1175\/revisions"}],"wp:attachment":[{"href":"https:\/\/nethemba.com\/de\/wp-json\/wp\/v2\/media?parent=1175"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nethemba.com\/de\/wp-json\/wp\/v2\/categories?post=1175"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nethemba.com\/de\/wp-json\/wp\/v2\/tags?post=1175"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}