{"id":5568,"date":"2020-12-29T12:32:53","date_gmt":"2020-12-29T11:32:53","guid":{"rendered":"https:\/\/nethemba.com\/?p=5568"},"modified":"2020-12-29T12:34:27","modified_gmt":"2020-12-29T11:34:27","slug":"prirucka-nasho-zakaznika-iii","status":"publish","type":"post","link":"https:\/\/nethemba.com\/sk\/prirucka-nasho-zakaznika-iii\/","title":{"rendered":"Pr\u00edru\u010dka n\u00e1\u0161ho z\u00e1kazn\u00edka III"},"content":{"rendered":"<p>Toto je tretie pokra\u010dovanie \u010dl\u00e1nku <a href=\"https:\/\/nethemba.com\/sk\/prirucka-nasho-zakaznika-i\/\" rel=\"external noopener noreferrer\" data-wpel-link=\"external\">Pr\u00edru\u010dka n\u00e1\u0161ho z\u00e1kazn\u00edka I<\/a> a <a href=\"https:\/\/nethemba.com\/sk\/prirucka-nasho-zakaznika-ii\/\">Pr\u00edru\u010dka n\u00e1\u0161ho z\u00e1kazn\u00edka II<\/a>.<\/p>\n<h1><span style=\"font-weight: 400;\"><a id=\"BugBounty\"><\/a>Opakovan\u00e9 testy a bug bounty program<\/span><\/h1>\n<p><span style=\"font-weight: 400;\">V\u00fdsledky vykonan\u00e9ho penetra\u010dn\u00e9ho testu alebo bezpe\u010dnostn\u00e9ho auditu sa vz\u0165ahuj\u00fa v\u017edy len na konkr\u00e9tny d\u00e1tum, kedy z\u00e1kazn\u00edk od n\u00e1s obdr\u017e\u00ed v\u00fdsledn\u00fa spr\u00e1vu. My, ani \u017eiadna in\u00e1 IT security firma na svete nedok\u00e1\u017ee garantova\u0165, \u017ee dan\u00e1 aplik\u00e1cia nebude vyhackovan\u00e1 hne\u010f na druh\u00fd de\u0148, kedy si objav\u00ed nejak\u00e1 nov\u00e1 kritick\u00e1 zranite\u013enos\u0165. Preto je potrebn\u00e9 pravideln\u00e9 testovanie vo forme opakovan\u00fdch testov.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Na kontinu\u00e1lne testovanie aplik\u00e1cii (ide\u00e1lne na vyplnenie \u010dasov\u00fdch medzier medzi opakovan\u00fdmi testami) odpor\u00fa\u010dame pou\u017ei\u0165 tzv. bug bounty platformu. To je syst\u00e9m, kde s\u00fa zaregistrovan\u00ed tis\u00edcky hackerov, ktor\u00ed sa v aplik\u00e1ci\u00e1ch sna\u017eia h\u013eada\u0165 bezpe\u010dnostn\u00e9 zranite\u013enosti a z\u00edska\u0165 za to odmenu. Ak finan\u010dn\u00fa odmenu za odhalenie zranite\u013enosti vo va\u0161ej aplik\u00e1cii nastav\u00edte na dostato\u010dne motivuj\u00facu, tak t\u00fdm zabezpe\u010d\u00edte, \u017ee tis\u00edcky o\u010d\u00ed bud\u00fa ma\u0165 ekonomick\u00fa incent\u00edvu prakticky nonstop h\u013eada\u0165 a nahlasova\u0165 v\u00e1m nov\u00e9 zranite\u013enosti vo va\u0161ej aplik\u00e1cii.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Ako bug bounty platformu m\u00f4\u017eete pou\u017ei\u0165 <\/span><a href=\"https:\/\/hacktrophy.com\"><span style=\"font-weight: 400;\">Hacktrophy<\/span><\/a><span style=\"font-weight: 400;\">, \u010do je unik\u00e1tne bug bounty rie\u0161enie v strednej Eur\u00f3pe, ktor\u00fa spolu so spolo\u010dnos\u0165ou <a href=\"https:\/\/citadelo.com\">Citadelo<\/a> partnersky aj technologicky zastre\u0161ujeme.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">V\u00e1\u0161 web alebo webov\u00fa aplik\u00e1ciu odpor\u00fa\u010dame nasadi\u0165 v bug bounty platforme hne\u010f potom ako si oprav\u00edte v\u0161etky chyby, ktor\u00e9 odhal\u00ed n\u00e1\u0161 penetra\u010dn\u00fd test alebo bezpe\u010dnostn\u00fd audit.<\/span><\/p>\n<h1><span style=\"font-weight: 400;\"><a id=\"OSCE\"><\/a>Ak\u00e9 technologick\u00e9 certifik\u00e1ty by mali ma\u0165 etick\u00ed hackeri?<\/span><\/h1>\n<p><span style=\"font-weight: 400;\">IT bezpe\u010dnostn\u00fd sektor je zahlten\u00fd r\u00f4znymi bezpe\u010dnostn\u00fdmi certifik\u00e1tmi s r\u00f4znou kvalitou.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Hne\u010f na za\u010diatku je potrebn\u00e9 podotkn\u00fa\u0165, \u017ee ISACA certifik\u00e1ty nijako nes\u00favisia s penetra\u010dn\u00fdmi testovan\u00edm alebo technologick\u00fdmi bezpe\u010dnostn\u00fdmi auditmi. Podobne CISSP je len senior mana\u017e\u00e9rsky security certifik\u00e1t a nijako nereflektuje technologick\u00e9 znalosti etick\u00fdch hackerov. Tie\u017e existuj\u00fa \u201chackersk\u00e9\u201d certifik\u00e1ty s pochybnou kvalitou (ako napr\u00edklad CEH) od spolo\u010dnosti EC Council, ktor\u00e1 bola opakovane vyhackovan\u00e1 (\u010do m\u00f4\u017ee o jej certifik\u00e1toch prezr\u00e1dza\u0165 v\u0161eli\u010do).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Zrejme za najkvalitnej\u0161\u00ed hackersk\u00fd certifik\u00e1t poklad\u00e1me OSCE (Offensive Security Certified Expert), ktor\u00fdm disponuje v\u00e4\u010d\u0161ina na\u0161ich etick\u00fdch hackerov. Napriek tomu na\u0161i certifikovan\u00ed experti vidia v \u201cOffensive Security\u201d p\u00e1r probl\u00e9mov (ich sumariz\u00e1ciu <\/span><a href=\"https:\/\/nethemba.com\/why-i-no-longer-endorse-offensive-security\/\"><span style=\"font-weight: 400;\">n\u00e1jdete tu<\/span><\/a><span style=\"font-weight: 400;\">).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Plat\u00ed pravidlo, \u017ee ak etick\u00fd hacker je schopn\u00fd samostatnej tvorby zlo\u017eitej\u0161\u00edch exploitov, tak by mal sp\u013a\u0148a\u0165 minim\u00e1lne predpoklady na profesion\u00e1lne zvl\u00e1dnutie penetra\u010dn\u00e9ho testovania. Toto obn\u00e1\u0161a, \u017ee mus\u00ed vedie\u0165 programova\u0165 v nejakom skriptovacom jazyku a disponova\u0165 slu\u0161n\u00fdmi znalos\u0165ami opera\u010dn\u00fdch syst\u00e9mov \u010di webov\u00fdch technol\u00f3gii. Mal by ma\u0165 tie\u017e detailne na\u0161tudovan\u00e9 testovacie pr\u00edru\u010dky a manu\u00e1ly (napr\u00edklad OWASP).<\/span><\/p>\n<h1><span style=\"font-weight: 400;\"><a id=\"MostFreeCompany\"><\/a>Pre\u010do pr\u00e1ve testy u \u201cslobodnej\u201d firmy?<\/span><\/h1>\n<p><span style=\"font-weight: 400;\">Jedna z k\u013e\u00fa\u010dov\u00fdch v\u00fdhod \u0161peci\u00e1lnej na\u0161ej spolo\u010dnosti je, \u017ee fungujeme na tzv. voluntaryistickej b\u00e1ze &#8211; na\u0161i testeri si dobrovo\u013ene vyberaj\u00fa projekty, na ktor\u00fdch chc\u00fa participova\u0165. Nikoho do ni\u010doho nen\u00fatime.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Pre v\u00e1s ako z\u00e1kazn\u00edka z toho vypl\u00fdva, \u017ee na rozdiel od in\u00fdch firiem, na\u0161i experti pre v\u00e1s pracuj\u00fa preto, \u017ee sa tak dobrovo\u013ene rozhodli. Nie preto, \u017ee im to z poz\u00edcie \u0161\u00e9fa niekto nan\u00fatil.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Toto sa \u0161peci\u00e1lne prejavuje vo zv\u00fd\u0161enej motiv\u00e1cii a kvalite na\u0161ej pr\u00e1ce, ktor\u00e1 je prirodzene vy\u0161\u0161ia, ke\u010f si ju \u013eudia dobrovo\u013ene vyber\u00fa ako v situ\u00e1cii, kedy im je nan\u00faten\u00e1, ako to b\u00fdva praxou v be\u017en\u00fdch korpor\u00e1ci\u00e1ch.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Tie\u017e to znamen\u00e1, \u017ee kv\u00f4li tomu, \u017ee si u n\u00e1s \u013eudia dobrovo\u013ene vyberaj\u00fa projekty, na ktor\u00fdch participuj\u00fa, tak ako firma m\u00e1me minim\u00e1lnu fluktu\u00e1ciu zamestnancov. T\u00fdm p\u00e1dom v\u00e4\u010d\u0161ina na\u0161ich testerov s\u00fa ostrie\u013ean\u00ed experti, ktor\u00ed maj\u00fa roky sk\u00fasenost\u00ed s IT bezpe\u010dnos\u0165ou.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Viac inform\u00e1cii o na\u0161om modeli pr\u00e1ce n\u00e1jdete v prezent\u00e1cii <\/span><a href=\"https:\/\/slides.com\/nethemba\/the-most-free-company#\/\"><span style=\"font-weight: 400;\">The Most Free Company<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Toto je tretie pokra\u010dovanie \u010dl\u00e1nku Pr\u00edru\u010dka n\u00e1\u0161ho z\u00e1kazn\u00edka I a Pr\u00edru\u010dka n\u00e1\u0161ho z\u00e1kazn\u00edka II. Opakovan\u00e9 testy a bug bounty program V\u00fdsledky vykonan\u00e9ho penetra\u010dn\u00e9ho testu alebo bezpe\u010dnostn\u00e9ho auditu sa vz\u0165ahuj\u00fa v\u017edy len na konkr\u00e9tny d\u00e1tum, kedy z\u00e1kazn\u00edk od n\u00e1s obdr\u017e\u00ed v\u00fdsledn\u00fa spr\u00e1vu. My, ani \u017eiadna in\u00e1 IT security firma na svete nedok\u00e1\u017ee garantova\u0165, \u017ee dan\u00e1 aplik\u00e1cia [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":5574,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[2870,13],"tags":[511,2868,1017,2869,902,40,496,513],"class_list":["post-5568","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-uncategorized-sk","tag-bezpecnostne-audity-sk","tag-eticke-hackovanie","tag-hacktrophy","tag-it-bezpecnostne-sluzby","tag-osce","tag-owasp","tag-penetracne-testy-sk","tag-socialne-inzinierstvo-sk"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Pr\u00edru\u010dka n\u00e1\u0161ho z\u00e1kazn\u00edka III - Nethemba<\/title>\n<meta name=\"description\" content=\"Opakovan\u00e9 testy a bug bounty programy. Ak\u00e9 technologick\u00e9 certifik\u00e1ty by mali ma\u0165 etick\u00ed hackeri? Pre\u010do pr\u00e1ve testy u \u201cslobodnej\u201d firmy?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nethemba.com\/sk\/prirucka-nasho-zakaznika-iii\/\" \/>\n<meta property=\"og:locale\" content=\"sk_SK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Pr\u00edru\u010dka n\u00e1\u0161ho z\u00e1kazn\u00edka III - Nethemba\" \/>\n<meta property=\"og:description\" content=\"Opakovan\u00e9 testy a bug bounty programy. Ak\u00e9 technologick\u00e9 certifik\u00e1ty by mali ma\u0165 etick\u00ed hackeri? Pre\u010do pr\u00e1ve testy u \u201cslobodnej\u201d firmy?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nethemba.com\/sk\/prirucka-nasho-zakaznika-iii\/\" \/>\n<meta property=\"og:site_name\" content=\"Nethemba\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/nethemba\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-29T11:32:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-12-29T11:34:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nethemba.com\/wp-content\/uploads\/2020\/12\/Nethemba_Hacktrophy.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1263\" \/>\n\t<meta property=\"og:image:height\" content=\"803\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Pavol Lupt\u00e1k\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@nethemba\" \/>\n<meta name=\"twitter:site\" content=\"@nethemba\" \/>\n<meta name=\"twitter:label1\" content=\"Autor\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pavol Lupt\u00e1k\" \/>\n\t<meta name=\"twitter:label2\" content=\"Predpokladan\u00fd \u010das \u010d\u00edtania\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 min\u00faty\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/nethemba.com\/sk\/prirucka-nasho-zakaznika-iii\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/nethemba.com\/sk\/prirucka-nasho-zakaznika-iii\/\"},\"author\":{\"name\":\"Pavol Lupt\u00e1k\",\"@id\":\"https:\/\/nethemba.com\/de\/#\/schema\/person\/5f4ba68c8e1a2013d30e0804245b8234\"},\"headline\":\"Pr\u00edru\u010dka n\u00e1\u0161ho z\u00e1kazn\u00edka III\",\"datePublished\":\"2020-12-29T11:32:53+00:00\",\"dateModified\":\"2020-12-29T11:34:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/nethemba.com\/sk\/prirucka-nasho-zakaznika-iii\/\"},\"wordCount\":724,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/nethemba.com\/sk\/prirucka-nasho-zakaznika-iii\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/nethemba.com\/wp-content\/uploads\/2020\/12\/Nethemba_Hacktrophy.png\",\"keywords\":[\"bezpe\u010dnostn\u00e9 audity\",\"etick\u00e9 hackovanie\",\"Hacktrophy\",\"it bezpe\u010dnostn\u00e9 slu\u017eby\",\"OSCE\",\"OWASP\",\"penetra\u010dn\u00e9 testy\",\"soci\u00e1lne in\u017einierstvo\"],\"articleSection\":[\"Blog\",\"Uncategorized @sk\"],\"inLanguage\":\"sk-SK\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/nethemba.com\/sk\/prirucka-nasho-zakaznika-iii\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/nethemba.com\/sk\/prirucka-nasho-zakaznika-iii\/\",\"url\":\"https:\/\/nethemba.com\/sk\/prirucka-nasho-zakaznika-iii\/\",\"name\":\"Pr\u00edru\u010dka n\u00e1\u0161ho z\u00e1kazn\u00edka III - Nethemba\",\"isPartOf\":{\"@id\":\"https:\/\/nethemba.com\/de\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/nethemba.com\/sk\/prirucka-nasho-zakaznika-iii\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/nethemba.com\/sk\/prirucka-nasho-zakaznika-iii\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/nethemba.com\/wp-content\/uploads\/2020\/12\/Nethemba_Hacktrophy.png\",\"datePublished\":\"2020-12-29T11:32:53+00:00\",\"dateModified\":\"2020-12-29T11:34:27+00:00\",\"author\":{\"@id\":\"https:\/\/nethemba.com\/de\/#\/schema\/person\/5f4ba68c8e1a2013d30e0804245b8234\"},\"description\":\"Opakovan\u00e9 testy a bug bounty programy. Ak\u00e9 technologick\u00e9 certifik\u00e1ty by mali ma\u0165 etick\u00ed hackeri? Pre\u010do pr\u00e1ve testy u \u201cslobodnej\u201d firmy?\",\"breadcrumb\":{\"@id\":\"https:\/\/nethemba.com\/sk\/prirucka-nasho-zakaznika-iii\/#breadcrumb\"},\"inLanguage\":\"sk-SK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/nethemba.com\/sk\/prirucka-nasho-zakaznika-iii\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\/\/nethemba.com\/sk\/prirucka-nasho-zakaznika-iii\/#primaryimage\",\"url\":\"https:\/\/nethemba.com\/wp-content\/uploads\/2020\/12\/Nethemba_Hacktrophy.png\",\"contentUrl\":\"https:\/\/nethemba.com\/wp-content\/uploads\/2020\/12\/Nethemba_Hacktrophy.png\",\"width\":1263,\"height\":803},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/nethemba.com\/sk\/prirucka-nasho-zakaznika-iii\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/nethemba.com\/sk\/domov\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Pr\u00edru\u010dka n\u00e1\u0161ho z\u00e1kazn\u00edka III\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/nethemba.com\/de\/#website\",\"url\":\"https:\/\/nethemba.com\/de\/\",\"name\":\"Nethemba\",\"description\":\"We care about your security\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/nethemba.com\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sk-SK\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/nethemba.com\/de\/#\/schema\/person\/5f4ba68c8e1a2013d30e0804245b8234\",\"name\":\"Pavol Lupt\u00e1k\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/978b23022518d076eaa243b375d2e0272af4f00dd502ce79cc357276d9bc2495?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/978b23022518d076eaa243b375d2e0272af4f00dd502ce79cc357276d9bc2495?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/978b23022518d076eaa243b375d2e0272af4f00dd502ce79cc357276d9bc2495?s=96&d=mm&r=g\",\"caption\":\"Pavol Lupt\u00e1k\"},\"sameAs\":[\"https:\/\/www.nethemba.com\/\"],\"url\":\"https:\/\/nethemba.com\/sk\/author\/nethemba-admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Pr\u00edru\u010dka n\u00e1\u0161ho z\u00e1kazn\u00edka III - Nethemba","description":"Opakovan\u00e9 testy a bug bounty programy. Ak\u00e9 technologick\u00e9 certifik\u00e1ty by mali ma\u0165 etick\u00ed hackeri? Pre\u010do pr\u00e1ve testy u \u201cslobodnej\u201d firmy?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nethemba.com\/sk\/prirucka-nasho-zakaznika-iii\/","og_locale":"sk_SK","og_type":"article","og_title":"Pr\u00edru\u010dka n\u00e1\u0161ho z\u00e1kazn\u00edka III - Nethemba","og_description":"Opakovan\u00e9 testy a bug bounty programy. Ak\u00e9 technologick\u00e9 certifik\u00e1ty by mali ma\u0165 etick\u00ed hackeri? Pre\u010do pr\u00e1ve testy u \u201cslobodnej\u201d firmy?","og_url":"https:\/\/nethemba.com\/sk\/prirucka-nasho-zakaznika-iii\/","og_site_name":"Nethemba","article_publisher":"https:\/\/www.facebook.com\/nethemba","article_published_time":"2020-12-29T11:32:53+00:00","article_modified_time":"2020-12-29T11:34:27+00:00","og_image":[{"width":1263,"height":803,"url":"https:\/\/nethemba.com\/wp-content\/uploads\/2020\/12\/Nethemba_Hacktrophy.png","type":"image\/png"}],"author":"Pavol Lupt\u00e1k","twitter_card":"summary_large_image","twitter_creator":"@nethemba","twitter_site":"@nethemba","twitter_misc":{"Autor":"Pavol Lupt\u00e1k","Predpokladan\u00fd \u010das \u010d\u00edtania":"4 min\u00faty"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nethemba.com\/sk\/prirucka-nasho-zakaznika-iii\/#article","isPartOf":{"@id":"https:\/\/nethemba.com\/sk\/prirucka-nasho-zakaznika-iii\/"},"author":{"name":"Pavol Lupt\u00e1k","@id":"https:\/\/nethemba.com\/de\/#\/schema\/person\/5f4ba68c8e1a2013d30e0804245b8234"},"headline":"Pr\u00edru\u010dka n\u00e1\u0161ho z\u00e1kazn\u00edka III","datePublished":"2020-12-29T11:32:53+00:00","dateModified":"2020-12-29T11:34:27+00:00","mainEntityOfPage":{"@id":"https:\/\/nethemba.com\/sk\/prirucka-nasho-zakaznika-iii\/"},"wordCount":724,"commentCount":0,"image":{"@id":"https:\/\/nethemba.com\/sk\/prirucka-nasho-zakaznika-iii\/#primaryimage"},"thumbnailUrl":"https:\/\/nethemba.com\/wp-content\/uploads\/2020\/12\/Nethemba_Hacktrophy.png","keywords":["bezpe\u010dnostn\u00e9 audity","etick\u00e9 hackovanie","Hacktrophy","it bezpe\u010dnostn\u00e9 slu\u017eby","OSCE","OWASP","penetra\u010dn\u00e9 testy","soci\u00e1lne in\u017einierstvo"],"articleSection":["Blog","Uncategorized @sk"],"inLanguage":"sk-SK","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nethemba.com\/sk\/prirucka-nasho-zakaznika-iii\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nethemba.com\/sk\/prirucka-nasho-zakaznika-iii\/","url":"https:\/\/nethemba.com\/sk\/prirucka-nasho-zakaznika-iii\/","name":"Pr\u00edru\u010dka n\u00e1\u0161ho z\u00e1kazn\u00edka III - Nethemba","isPartOf":{"@id":"https:\/\/nethemba.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nethemba.com\/sk\/prirucka-nasho-zakaznika-iii\/#primaryimage"},"image":{"@id":"https:\/\/nethemba.com\/sk\/prirucka-nasho-zakaznika-iii\/#primaryimage"},"thumbnailUrl":"https:\/\/nethemba.com\/wp-content\/uploads\/2020\/12\/Nethemba_Hacktrophy.png","datePublished":"2020-12-29T11:32:53+00:00","dateModified":"2020-12-29T11:34:27+00:00","author":{"@id":"https:\/\/nethemba.com\/de\/#\/schema\/person\/5f4ba68c8e1a2013d30e0804245b8234"},"description":"Opakovan\u00e9 testy a bug bounty programy. Ak\u00e9 technologick\u00e9 certifik\u00e1ty by mali ma\u0165 etick\u00ed hackeri? Pre\u010do pr\u00e1ve testy u \u201cslobodnej\u201d firmy?","breadcrumb":{"@id":"https:\/\/nethemba.com\/sk\/prirucka-nasho-zakaznika-iii\/#breadcrumb"},"inLanguage":"sk-SK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nethemba.com\/sk\/prirucka-nasho-zakaznika-iii\/"]}]},{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/nethemba.com\/sk\/prirucka-nasho-zakaznika-iii\/#primaryimage","url":"https:\/\/nethemba.com\/wp-content\/uploads\/2020\/12\/Nethemba_Hacktrophy.png","contentUrl":"https:\/\/nethemba.com\/wp-content\/uploads\/2020\/12\/Nethemba_Hacktrophy.png","width":1263,"height":803},{"@type":"BreadcrumbList","@id":"https:\/\/nethemba.com\/sk\/prirucka-nasho-zakaznika-iii\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nethemba.com\/sk\/domov\/"},{"@type":"ListItem","position":2,"name":"Pr\u00edru\u010dka n\u00e1\u0161ho z\u00e1kazn\u00edka III"}]},{"@type":"WebSite","@id":"https:\/\/nethemba.com\/de\/#website","url":"https:\/\/nethemba.com\/de\/","name":"Nethemba","description":"We care about your security","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nethemba.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sk-SK"},{"@type":"Person","@id":"https:\/\/nethemba.com\/de\/#\/schema\/person\/5f4ba68c8e1a2013d30e0804245b8234","name":"Pavol Lupt\u00e1k","image":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/secure.gravatar.com\/avatar\/978b23022518d076eaa243b375d2e0272af4f00dd502ce79cc357276d9bc2495?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/978b23022518d076eaa243b375d2e0272af4f00dd502ce79cc357276d9bc2495?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/978b23022518d076eaa243b375d2e0272af4f00dd502ce79cc357276d9bc2495?s=96&d=mm&r=g","caption":"Pavol Lupt\u00e1k"},"sameAs":["https:\/\/www.nethemba.com\/"],"url":"https:\/\/nethemba.com\/sk\/author\/nethemba-admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nethemba.com\/sk\/wp-json\/wp\/v2\/posts\/5568","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nethemba.com\/sk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nethemba.com\/sk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nethemba.com\/sk\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/nethemba.com\/sk\/wp-json\/wp\/v2\/comments?post=5568"}],"version-history":[{"count":0,"href":"https:\/\/nethemba.com\/sk\/wp-json\/wp\/v2\/posts\/5568\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nethemba.com\/sk\/wp-json\/wp\/v2\/media\/5574"}],"wp:attachment":[{"href":"https:\/\/nethemba.com\/sk\/wp-json\/wp\/v2\/media?parent=5568"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nethemba.com\/sk\/wp-json\/wp\/v2\/categories?post=5568"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nethemba.com\/sk\/wp-json\/wp\/v2\/tags?post=5568"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}