{"id":5980,"date":"2024-08-08T12:37:01","date_gmt":"2024-08-08T10:37:01","guid":{"rendered":"https:\/\/bezpecnevofirme.eset.com\/sk\/?p=5980"},"modified":"2024-08-08T12:40:52","modified_gmt":"2024-08-08T10:40:52","slug":"male-ale-sikovne-5-najlepsich-vreckovych-zariadeni-pre-etickych-hackerov","status":"publish","type":"post","link":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/male-ale-sikovne-5-najlepsich-vreckovych-zariadeni-pre-etickych-hackerov\/","title":{"rendered":"Mal\u00e9, ale \u0161ikovn\u00e9: 5\u00a0najlep\u0161\u00edch vreckov\u00fdch zariaden\u00ed pre etick\u00fdch hackerov"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"536\" src=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/08\/Hacking-gadgets_1200x628-no-text--1024x536.png\" alt=\"BVF nastroje na eticke hackovanie nahladovy obrazok\" class=\"wp-image-5981\" srcset=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/08\/Hacking-gadgets_1200x628-no-text--1024x536.png 1024w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/08\/Hacking-gadgets_1200x628-no-text--300x157.png 300w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/08\/Hacking-gadgets_1200x628-no-text--768x402.png 768w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/08\/Hacking-gadgets_1200x628-no-text--370x194.png 370w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/08\/Hacking-gadgets_1200x628-no-text--760x398.png 760w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/08\/Hacking-gadgets_1200x628-no-text-.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><em>T\u00fdchto p\u00e4\u0165 v\u00fdkonn\u00fdch n\u00e1strojov m\u00f4\u017ee pom\u00f4c\u0165 bezpe\u010dnostn\u00fdm pracovn\u00edkom pri identifik\u00e1cii slab\u00fdch miest vo firemnej bezpe\u010dnosti, ako aj amat\u00e9rskym etick\u00fdm hackerom pri zlep\u0161ovan\u00ed ich znalost\u00ed o\u00a0kybernetickej ochrane.<\/em><\/p>\n\n\n\n<p>Zatia\u013e \u010do \u00falohou modr\u00fdch t\u00edmov je br\u00e1ni\u0165 sa, \u010derven\u00e9 t\u00edmy \u00fato\u010dia. Maj\u00fa v\u0161ak spolo\u010dn\u00fd cie\u013e \u2013 pom\u00f4c\u0165 identifikova\u0165 a\u00a0odstr\u00e1ni\u0165 medzery v\u00a0obrannom mechanizme organiz\u00e1ci\u00ed sk\u00f4r, ako ich zneu\u017eij\u00fa kybernetick\u00ed zlo\u010dinci. Cvi\u010denia ur\u010den\u00e9 pre modr\u00e9 a\u00a0\u010derven\u00e9 t\u00edmy prin\u00e1\u0161aj\u00fa neocenite\u013en\u00e9 poznatky o\u00a0technick\u00fdch, procedur\u00e1lnych a\u00a0\u013eudsk\u00fdch aspektoch zabezpe\u010denia a\u00a0v\u00a0kone\u010dnom d\u00f4sledku m\u00f4\u017eu organiz\u00e1ci\u00e1m pom\u00f4c\u0165 odrazi\u0165 skuto\u010dn\u00e9 \u00fatoky.<\/p>\n\n\n\n<p>Predstav\u00edme v\u00e1m p\u00e4\u0165 najmodernej\u0161\u00edch kompaktn\u00fdch n\u00e1strojov, ktor\u00e9 m\u00f4\u017eu pri zdokona\u013eovan\u00ed svojich zru\u010dnost\u00ed alebo vykon\u00e1van\u00ed pr\u00e1ce vyu\u017ei\u0165 \u010derven\u00e9 t\u00edmy \u010di etick\u00ed hackeri.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">1. Raspberry Pi 5<\/h2>\n\n\n\n<p>Najm\u00e4 v\u010faka svojej v\u0161estrannosti, v\u00fdkonu a&nbsp;\u017eiv\u00e9mu komunitn\u00e9mu ekosyst\u00e9mu sa Raspberry Pi stal ob\u013e\u00faben\u00fdm n\u00e1strojom IT&nbsp;profesion\u00e1lov, \u0161tudentov aj nad\u0161encov.<\/p>\n\n\n\n<p>Raspberry Pi je cenovo dostupn\u00fd jednodoskov\u00fd po\u010d\u00edta\u010d, do\u00a0ktor\u00e9ho je mo\u017en\u00e9 nahra\u0165 r\u00f4zne n\u00e1stroje na\u00a0penetra\u010dn\u00e9 testovanie a\u00a0ktor\u00fd pln\u00ed viacero \u00faloh. M\u00f4\u017ee sa napr\u00edklad premeni\u0165 na\u00a0sie\u0165ov\u00fd analyz\u00e1tor, zachyt\u00e1va\u0165 pakety na\u00a0podrobn\u00fa anal\u00fdzu alebo sp\u00fa\u0161\u0165a\u0165 skripty na\u00a0automatizovan\u00e9 bezpe\u010dnostn\u00e9 testy. Je tie\u017e ide\u00e1lny na\u00a0testovanie n\u00e1strojov v\u00a0re\u00e1lnom a\u00a0dynamickom prostred\u00ed aj na\u00a0anal\u00fdzu zariaden\u00ed internetu vec\u00ed (IoT), identifikuj\u00fac tak zranite\u013enosti sk\u00f4r, ako ich kybernetick\u00ed zlo\u010dinci stihn\u00fa zneu\u017ei\u0165.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"944\" height=\"532\" src=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/08\/image.png\" alt=\"\" class=\"wp-image-5982\" srcset=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/08\/image.png 944w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/08\/image-300x169.png 300w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/08\/image-768x433.png 768w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/08\/image-370x209.png 370w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/08\/image-760x428.png 760w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/08\/image-270x152.png 270w\" sizes=\"auto, (max-width: 944px) 100vw, 944px\" \/><\/figure>\n\n\n\n<div style=\"height:5px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-text-align-center\"><em>Obr\u00e1zok \u010d.\u00a01. Raspberry Pi 5 (Zdroj:\u00a0<\/em><a href=\"https:\/\/www.raspberrypi.com\/products\/\"><em>Raspberry Pi<\/em><\/a><em>)<\/em><\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Raspberry Pi podporuje r\u00f4zne opera\u010dn\u00e9 syst\u00e9my prisp\u00f4soben\u00e9 rozli\u010dn\u00fdm \u00fa\u010delom a&nbsp;preferenci\u00e1m pou\u017e\u00edvate\u013eov. Jeho ofici\u00e1lny opera\u010dn\u00fd syst\u00e9m Raspberry Pi OS (predt\u00fdm Raspbian) je zalo\u017een\u00fd na&nbsp;distrib\u00facii Debian Linux a&nbsp;je optimalizovan\u00fd pre architekt\u00faru ARM.<\/p>\n\n\n\n<p>Dostupn\u00e9 s\u00fa aj \u010fal\u0161ie popul\u00e1rne distrib\u00facie, ako je Kali Linux, ktor\u00e9 s\u00fa \u0161peci\u00e1lne vytvoren\u00e9 na&nbsp;\u00fa\u010dely penetra\u010dn\u00e9ho testovania a&nbsp;bezpe\u010dnostn\u00fdch auditov. Tieto distrib\u00facie zah\u0155\u0148aj\u00fa s\u00fabor n\u00e1strojov na&nbsp;kontrolu siete, vyhodnocovanie zranite\u013enost\u00ed, bezdr\u00f4tov\u00e9 \u00fatoky a&nbsp;\u010fal\u0161ie.<\/p>\n\n\n\n<p>Ni\u017e\u0161ie uv\u00e1dzame nieko\u013eko zauj\u00edmav\u00fdch n\u00e1strojov a&nbsp;projektov, ktor\u00e9 m\u00f4\u017eu vyu\u017e\u00edva\u0165 Raspberry Pi ako z\u00e1kladn\u00fa hardv\u00e9rov\u00fa platformu:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>FruityWifi:<\/strong> Sl\u00fa\u017ei na\u00a0audit bezdr\u00f4tov\u00fdch siet\u00ed a\u00a0umo\u017e\u0148uje pokro\u010dil\u00e9 \u00fatoky prostredn\u00edctvom webov\u00e9ho rozhrania.<\/li>\n\n\n\n<li><strong>Ha-Pi:<\/strong> Poskytuje n\u00e1stroje na\u00a0penetra\u010dn\u00e9 testovanie vr\u00e1tane bal\u00edka Aircrack-ng a\u00a0projektu Metasploit.<\/li>\n\n\n\n<li><strong>Raspberry Pwn:<\/strong> Zah\u0155\u0148a n\u00e1stroje, ako s\u00fa Scapy, Wireshark a\u00a0tcpdump.<\/li>\n\n\n\n<li><strong>Wireless Attack Toolkit (WAT):<\/strong> Vykon\u00e1va penetra\u010dn\u00e9 testovanie bezdr\u00f4tov\u00fdch siet\u00ed na\u00a0platform\u00e1ch s\u00a0architekt\u00farou ARM.<\/li>\n\n\n\n<li><strong>PwnPi:<\/strong> Zjednodu\u0161en\u00e1 verzia Debian Wheezy na\u00a0penetra\u010dn\u00e9 testovanie.<\/li>\n\n\n\n<li><strong>NetPi:<\/strong> Projekt zameran\u00fd na\u00a0v\u00fdvoj sie\u0165ov\u00e9ho analyz\u00e1tora s\u00a0komer\u010dn\u00fdmi funkciami.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">2. HackRF One<\/h2>\n\n\n\n<p>HackRF One je pre nad\u0161encov aj profesion\u00e1lov zaoberaj\u00facich sa r\u00e1diov\u00fdmi frekvenciami v\u0161estrann\u00fdm pomocn\u00edkom. Toto open-source zariadenie umo\u017e\u0148uje v\u0161etk\u00fdm od&nbsp;zvedav\u00fdch laikov a\u017e po&nbsp;sk\u00fasen\u00fdch odborn\u00edkov ponori\u0165 sa do&nbsp;nevidite\u013en\u00e9ho \u0161umu r\u00e1diov\u00fdch frekvenci\u00ed, ako aj oboznamova\u0165 sa a&nbsp;manipulova\u0165 s&nbsp;vlnami, ktor\u00e9 pren\u00e1\u0161aj\u00fa na\u0161e ob\u013e\u00faben\u00e9 hudobn\u00e9 stanice \u010di d\u00f4le\u017eit\u00e9 komunika\u010dn\u00e9 sign\u00e1ly.<\/p>\n\n\n\n<p>Toto jednodoskov\u00e9 perif\u00e9rne zariadenie SDR je navrhnut\u00e9 tak, aby bolo univerz\u00e1lne, a&nbsp;dok\u00e1zalo vysiela\u0165 aj prij\u00edma\u0165 sign\u00e1ly od&nbsp;1&nbsp;MHz do&nbsp;6&nbsp;GHz. V\u010faka tomuto \u0161irok\u00e9mu rozsahu tak m\u00f4\u017eete experimentova\u0165 prakticky s&nbsp;ak\u00fdmko\u013evek typom bezdr\u00f4tovej komunik\u00e1cie, od&nbsp;r\u00e1dia AM\/FM cez Wi-Fi a\u017e po&nbsp;satelitn\u00e9 sign\u00e1ly. Je to takmer ako keby ste mali k\u013e\u00fa\u010de ku&nbsp;v\u0161etk\u00fdm bezdr\u00f4tov\u00fdm protokolom, ktor\u00e9 kedy vznikli, a&nbsp;to v&nbsp;jednom kompaktnom vyhotoven\u00ed.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"746\" height=\"562\" src=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/08\/image-1.png\" alt=\"\" class=\"wp-image-5983\" srcset=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/08\/image-1.png 746w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/08\/image-1-300x226.png 300w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/08\/image-1-370x279.png 370w\" sizes=\"auto, (max-width: 746px) 100vw, 746px\" \/><\/figure>\n\n\n\n<div style=\"height:5px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-text-align-center\"><em>Obr\u00e1zok \u010d.\u00a02. HackRF One (Zdroj:\u00a0<\/em><a href=\"https:\/\/www.adafruit.com\/product\/3583\"><em>Adafruit<\/em><\/a><em>)<\/em><\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Napriek pokro\u010dil\u00fdm mo\u017enostiam je HackRF One prenosn\u00fd a&nbsp;dostato\u010dne robustn\u00fd n\u00e1stroj na&nbsp;pr\u00e1cu v&nbsp;ter\u00e9ne, tak\u017ee umo\u017e\u0148uje IT&nbsp;odborn\u00edkom testova\u0165 zranite\u013enosti bezdr\u00f4tov\u00fdch siet\u00ed a&nbsp;in\u017einierom v&nbsp;odbore r\u00e1diov\u00fdch frekvenci\u00ed rie\u0161i\u0165 probl\u00e9my so&nbsp;sign\u00e1lom za&nbsp;pochodu.<\/p>\n\n\n\n<p>Okrem in\u00e9ho umo\u017e\u0148uje vyhodnocova\u0165 bezpe\u010dnos\u0165 bezdr\u00f4tov\u00fdch syst\u00e9mov, vykon\u00e1va\u0165 replay \u00fatoky a&nbsp;sk\u00fama\u0165 zranite\u013enosti zariaden\u00ed IoT. Patr\u00ed sem emul\u00e1cia a&nbsp;anal\u00fdza dia\u013ekov\u00fdch ovl\u00e1da\u010dov, alarmov a&nbsp;in\u00fdch zariaden\u00ed, manipul\u00e1cia s&nbsp;GPS sign\u00e1lmi, komunik\u00e1cia s&nbsp;RFID tagmi, anal\u00fdza sign\u00e1lov a sledovanie satelitnej komunik\u00e1cie.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">3. WiFi Pineapple<\/h2>\n\n\n\n<p>Je pravda, \u017ee na\u00a0toto elegantn\u00e9 zariadenie, ktor\u00e9 vyzer\u00e1 ako ne\u0161kodn\u00fd router, budete potrebova\u0165 v\u00e4\u010d\u0161ie vrecko, no pom\u00f4\u017ee v\u00e1m s\u00a0odhalen\u00edm skryt\u00fdch tajomstiev bezdr\u00f4tov\u00fdch siet\u00ed. WiFi Pineapple sa pou\u017e\u00edva na\u00a0sk\u00famanie bezpe\u010dnosti bezdr\u00f4tov\u00fdch siet\u00ed simul\u00e1ciou be\u017en\u00e9ho pr\u00edstupov\u00e9ho bodu s\u00a0cie\u013eom nal\u00e1ka\u0165 na\u00a0pripojenie ni\u010d netu\u0161iacich pou\u017e\u00edvate\u013eov. M\u00e1 dve sie\u0165ov\u00e9 rozhrania: jedno na\u00a0poskytovanie pr\u00edstupu na\u00a0internet a\u00a0druh\u00e9 na\u00a0komunik\u00e1ciu s\u00a0okolit\u00fdmi zariadeniami Wi-Fi.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"762\" height=\"562\" src=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/08\/image-2.png\" alt=\"\" class=\"wp-image-5984\" srcset=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/08\/image-2.png 762w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/08\/image-2-300x221.png 300w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/08\/image-2-370x273.png 370w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/08\/image-2-760x561.png 760w\" sizes=\"auto, (max-width: 762px) 100vw, 762px\" \/><\/figure>\n\n\n\n<div style=\"height:5px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-text-align-center\"><em>Obr\u00e1zok \u010d.\u00a03. WiFi Pineapple Mark VII (Zdroj: <\/em><a href=\"https:\/\/shop.hak5.org\/products\/wifi-pineapple\"><em>Hak5<\/em><\/a><em>)<\/em><\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Jadrom WiFi Pineapple je vlastn\u00fd opera\u010dn\u00fd syst\u00e9m Pineapple OS. Je zalo\u017een\u00fd na&nbsp;Linuxe a&nbsp;\u0161peci\u00e1lne ur\u010den\u00fd na&nbsp;bezdr\u00f4tov\u00e9 penetra\u010dn\u00e9 testovanie, pri\u010dom sa dod\u00e1va s&nbsp;mno\u017estvom v\u00fdkonn\u00fdch n\u00e1strojov. Opera\u010dn\u00fd syst\u00e9m Pineapple OS poskytuje stabiln\u00e9 a&nbsp;efekt\u00edvne prostredie, ktor\u00e9 zabezpe\u010duje bezprobl\u00e9mov\u00e9 fungovanie zariadenia po\u010das komplexn\u00fdch bezpe\u010dnostn\u00fdch kontrol.<\/p>\n\n\n\n<p>Hlavn\u00e9 \u00fa\u010dely:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>\u00datoky typu \u201eevil twin\u201c:<\/strong> Vytv\u00e1ra falo\u0161n\u00e9 pr\u00edstupov\u00e9 body na\u00a0zachyt\u00e1vanie sie\u0165ovej komunik\u00e1cie a\u00a0zhroma\u017e\u010fovanie citliv\u00fdch inform\u00e1ci\u00ed.<\/li>\n\n\n\n<li><strong>Deauth testy:<\/strong> Vynucuje odpojenie od\u00a0legit\u00edmnych siet\u00ed a\u00a0umo\u017e\u0148uje tak \u00fatoky typu \u201eman-in-the-middle\u201c.<\/li>\n\n\n\n<li><strong>Bezpe\u010dnostn\u00e9 kontroly:<\/strong> Identifikuje zranite\u013enosti a\u00a0medzery v\u00a0konfigur\u00e1cii bezdr\u00f4tov\u00fdch siet\u00ed.<\/li>\n\n\n\n<li><strong>Kontrolovan\u00e9 \u00fatoky:<\/strong> Pom\u00e1ha spr\u00e1vcom pochopi\u0165 a\u00a0vytvori\u0165 lep\u0161ie bezpe\u010dnostn\u00e9 politiky.<\/li>\n\n\n\n<li><strong>V\u0161estrann\u00e1 funk\u010dnos\u0165:<\/strong> Poskytuje r\u00f4zne automatizovan\u00e9 a\u00a0manu\u00e1lne n\u00e1stroje na\u00a0penetra\u010dn\u00e9 testovanie bezdr\u00f4tov\u00fdch siet\u00ed.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">4. Deauther Watch<\/h2>\n\n\n\n<p>N\u00e1zov hovor\u00ed za\u00a0v\u0161etko. Toto nosite\u013en\u00e9 zariadenie s\u00a0integrovan\u00fdmi funkciami na\u00a0vykon\u00e1vanie deautentiza\u010dn\u00fdch \u00fatokov na\u00a0siete Wi-Fi nar\u00fa\u0161a Wi-Fi pripojenie medzi zariaden\u00edm (napr\u00edklad smartf\u00f3nom, prenosn\u00fdm po\u010d\u00edta\u010dom alebo zariaden\u00edm IoT) a\u00a0Wi-Fi routerom odosielan\u00edm \u0161peci\u00e1lne vytvoren\u00fdch deautentiza\u010dn\u00fdch paketov.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"944\" height=\"532\" src=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/08\/image-3.png\" alt=\"\" class=\"wp-image-5985\" srcset=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/08\/image-3.png 944w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/08\/image-3-300x169.png 300w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/08\/image-3-768x433.png 768w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/08\/image-3-370x209.png 370w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/08\/image-3-760x428.png 760w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/08\/image-3-270x152.png 270w\" sizes=\"auto, (max-width: 944px) 100vw, 944px\" \/><\/figure>\n\n\n\n<div style=\"height:5px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-text-align-center\"><em>Obr\u00e1zok \u010d.\u00a04. DSTIKE Deauther Watch V3S (Zdroj:\u00a0<\/em><a href=\"https:\/\/dstike.com\/products\/dstike-deauther-watch-v3s\"><em>DSTIKE<\/em><\/a><em>)<\/em><\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Okrem toho m\u00f4\u017ee by\u0165 zariadenie Deauther Watch vybaven\u00e9 funkciami, ako je skenovanie a\u00a0monitorovanie siet\u00ed Wi-Fi a\u00a0zachyt\u00e1vanie paketov na\u00a0detekciu zranite\u013enost\u00ed \u010di monitorovanie sie\u0165ovej aktivity. Softv\u00e9r Deauther V3 s\u00a0\u010dipom ESP8266 poskytuje rozhranie pr\u00edkazov\u00e9ho riadka (CLI) cez USB a\u00a0testuje siete WiFi s\u00a0frekvenciou 2,4\u00a0GHz na\u00a0pr\u00edtomnos\u0165 zranite\u013enost\u00ed.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">5. Ubertooth One<\/h2>\n\n\n\n<p>Ubertooth One je ur\u010den\u00fd predov\u0161etk\u00fdm na\u00a0monitorovanie komunik\u00e1cie a\u00a0anal\u00fdzu paketov Bluetooth, ako aj na\u00a0testovanie zariaden\u00ed IoT s\u00a0technol\u00f3giou Bluetooth. Toto open-source zariadenie podporuje r\u00f4zne scen\u00e1re testovania zabezpe\u010denia a\u00a0jeho schopnosti presahuj\u00fa typick\u00e9 adapt\u00e9ry Bluetooth \u2013 patr\u00ed medzi ne napr\u00edklad zachyt\u00e1vanie citliv\u00fdch inform\u00e1ci\u00ed vymie\u0148an\u00fdch prostredn\u00edctvom pripojen\u00ed Bluetooth.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"936\" height=\"472\" src=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/08\/image-4.png\" alt=\"\" class=\"wp-image-5986\" srcset=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/08\/image-4.png 936w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/08\/image-4-300x151.png 300w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/08\/image-4-768x387.png 768w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/08\/image-4-370x187.png 370w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/08\/image-4-760x383.png 760w\" sizes=\"auto, (max-width: 936px) 100vw, 936px\" \/><\/figure>\n\n\n\n<div style=\"height:5px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-text-align-center\"><em>Obr\u00e1zok \u010d.\u00a05. Ubertooth One (Zdroj: <\/em><a href=\"https:\/\/greatscottgadgets.com\/ubertoothone\/\"><em>Great Scott Gadgets<\/em><\/a><em>)<\/em><\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Je zalo\u017een\u00e9 na\u00a0platforme GreatFET a\u00a0zah\u0155\u0148a v\u00fdkonn\u00fd r\u00e1diofrekven\u010dn\u00fd transceiver. Zariadenie Ubertooth One funguje v\u00a0p\u00e1sme ISM s\u00a0frekvenciou 2,4\u00a0GHz a\u00a0podporuje protokoly Bluetooth Low Energy (BLE) a\u00a0Classic Bluetooth, tak\u017ee je dostato\u010dne univerz\u00e1lne na\u00a0to, aby dok\u00e1zalo pracova\u0165 so\u00a0\u0161irokou \u0161k\u00e1lou aplik\u00e1ci\u00ed.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Z\u00e1ver<\/h2>\n\n\n\n<p>Tak ako pri v\u0161etk\u00fdch podobn\u00fdch pom\u00f4ckach, aj tu s\u00fa prvorad\u00e9 etick\u00e9 aspekty. Zariadenia je nutn\u00e9 pou\u017e\u00edva\u0165 v\u00a0prostrediach a\u00a0situ\u00e1ci\u00e1ch, v\u00a0ktor\u00fdch je to povolen\u00e9, napr\u00edklad v\u00a0kontrolovan\u00fdch testovac\u00edch prostrediach alebo na\u00a0vzdel\u00e1vacie \u00fa\u010dely. Ich vyu\u017e\u00edvanie na\u00a0vykon\u00e1vanie neschv\u00e1len\u00fdch \u00fatokov je v\u00a0mnoh\u00fdch jurisdikci\u00e1ch nez\u00e1konn\u00e9 a\u00a0m\u00f4\u017ee ma\u0165 v\u00e1\u017ene n\u00e1sledky. Organiz\u00e1cie zasa musia ma\u0165 zaveden\u00fa kombin\u00e1ciu technick\u00fdch opatren\u00ed, polit\u00edk a\u00a0takt\u00edk na\u00a0vzdel\u00e1vanie zamestnancov s\u00a0cie\u013eom chr\u00e1ni\u0165 sa pred neopr\u00e1vnen\u00fdm pou\u017e\u00edvan\u00edm t\u00fdchto zariaden\u00ed vo\u00a0svojich sie\u0165ach.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>T\u00fdchto p\u00e4\u0165 v\u00fdkonn\u00fdch n\u00e1strojov pom\u00f4\u017ee bezpe\u010dnostn\u00fdm pracovn\u00edkom pri identifik\u00e1cii slab\u00fdch miest vo firemnej bezpe\u010dnosti, ako aj amat\u00e9rskym etick\u00fdm hackerom pri zlep\u0161ovan\u00ed ich znalost\u00ed o\u00a0kybernetickej ochrane.<\/p>\n","protected":false},"author":8,"featured_media":5987,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[140,105],"tags":[],"class_list":["post-5980","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-desifrujeme-pre-vas","category-firemna-bezpecnost"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Mal\u00e9, ale \u0161ikovn\u00e9: 5 top zariaden\u00ed pre etick\u00fdch hackerov | ESET<\/title>\n<meta name=\"description\" content=\"Tieto n\u00e1stroje m\u00f4\u017eu pom\u00f4c\u0165 bezpe\u010dnostn\u00fdm pracovn\u00edkom pri identifik\u00e1cii slab\u00fdch miest, ako aj amat\u00e9rskym etick\u00fdm hackerom pri zlep\u0161ovan\u00ed sa.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/male-ale-sikovne-5-najlepsich-vreckovych-zariadeni-pre-etickych-hackerov\/\" \/>\n<meta property=\"og:locale\" content=\"sk_SK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mal\u00e9, ale \u0161ikovn\u00e9: 5 top zariaden\u00ed pre etick\u00fdch hackerov | ESET\" \/>\n<meta property=\"og:description\" content=\"Tieto n\u00e1stroje m\u00f4\u017eu pom\u00f4c\u0165 bezpe\u010dnostn\u00fdm pracovn\u00edkom pri identifik\u00e1cii slab\u00fdch miest, ako aj amat\u00e9rskym etick\u00fdm hackerom pri zlep\u0161ovan\u00ed sa.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/male-ale-sikovne-5-najlepsich-vreckovych-zariadeni-pre-etickych-hackerov\/\" \/>\n<meta property=\"og:site_name\" content=\"Bezpe\u010dne vo firme | ESET\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-08T10:37:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-08T10:40:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/08\/Hacking-gadgets_1200x628-no-text-1-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"igorkmit\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Autor\" \/>\n\t<meta name=\"twitter:data1\" content=\"igorkmit\" \/>\n\t<meta name=\"twitter:label2\" content=\"Predpokladan\u00fd \u010das \u010d\u00edtania\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 min\u00fat\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/male-ale-sikovne-5-najlepsich-vreckovych-zariadeni-pre-etickych-hackerov\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/male-ale-sikovne-5-najlepsich-vreckovych-zariadeni-pre-etickych-hackerov\\\/\"},\"author\":{\"name\":\"igorkmit\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/person\\\/0b6eea8250c76790569dbea41b2810a3\"},\"headline\":\"Mal\u00e9, ale \u0161ikovn\u00e9: 5\u00a0najlep\u0161\u00edch vreckov\u00fdch zariaden\u00ed pre etick\u00fdch hackerov\",\"datePublished\":\"2024-08-08T10:37:01+00:00\",\"dateModified\":\"2024-08-08T10:40:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/male-ale-sikovne-5-najlepsich-vreckovych-zariadeni-pre-etickych-hackerov\\\/\"},\"wordCount\":1481,\"publisher\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/male-ale-sikovne-5-najlepsich-vreckovych-zariadeni-pre-etickych-hackerov\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2024\\\/08\\\/Hacking-gadgets_1200x628-no-text-1-1.png\",\"articleSection\":[\"De\u0161ifrujeme pre v\u00e1s\",\"Firemn\u00e1 bezpe\u010dnos\u0165\"],\"inLanguage\":\"sk-SK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/male-ale-sikovne-5-najlepsich-vreckovych-zariadeni-pre-etickych-hackerov\\\/\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/male-ale-sikovne-5-najlepsich-vreckovych-zariadeni-pre-etickych-hackerov\\\/\",\"name\":\"Mal\u00e9, ale \u0161ikovn\u00e9: 5 top zariaden\u00ed pre etick\u00fdch hackerov | ESET\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/male-ale-sikovne-5-najlepsich-vreckovych-zariadeni-pre-etickych-hackerov\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/male-ale-sikovne-5-najlepsich-vreckovych-zariadeni-pre-etickych-hackerov\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2024\\\/08\\\/Hacking-gadgets_1200x628-no-text-1-1.png\",\"datePublished\":\"2024-08-08T10:37:01+00:00\",\"dateModified\":\"2024-08-08T10:40:52+00:00\",\"description\":\"Tieto n\u00e1stroje m\u00f4\u017eu pom\u00f4c\u0165 bezpe\u010dnostn\u00fdm pracovn\u00edkom pri identifik\u00e1cii slab\u00fdch miest, ako aj amat\u00e9rskym etick\u00fdm hackerom pri zlep\u0161ovan\u00ed sa.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/male-ale-sikovne-5-najlepsich-vreckovych-zariadeni-pre-etickych-hackerov\\\/#breadcrumb\"},\"inLanguage\":\"sk-SK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/male-ale-sikovne-5-najlepsich-vreckovych-zariadeni-pre-etickych-hackerov\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/male-ale-sikovne-5-najlepsich-vreckovych-zariadeni-pre-etickych-hackerov\\\/#primaryimage\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2024\\\/08\\\/Hacking-gadgets_1200x628-no-text-1-1.png\",\"contentUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2024\\\/08\\\/Hacking-gadgets_1200x628-no-text-1-1.png\",\"width\":1200,\"height\":628,\"caption\":\"BVF n\u00e1stroje na etick\u00e9 hackovanie ilustra\u010dn\u00fd obr\u00e1zok\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/male-ale-sikovne-5-najlepsich-vreckovych-zariadeni-pre-etickych-hackerov\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Domovsk\u00e1 str\u00e1nka\",\"item\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mal\u00e9, ale \u0161ikovn\u00e9: 5\u00a0najlep\u0161\u00edch vreckov\u00fdch zariaden\u00ed pre etick\u00fdch hackerov\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#website\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/\",\"name\":\"Bezpe\u010dne vo firme | ESET\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sk-SK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#organization\",\"name\":\"Bezpe\u010dne vo firme | ESET\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/08\\\/BVF_logo_svg_new.svg\",\"contentUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/08\\\/BVF_logo_svg_new.svg\",\"caption\":\"Bezpe\u010dne vo firme | ESET\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/person\\\/0b6eea8250c76790569dbea41b2810a3\",\"name\":\"igorkmit\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g\",\"caption\":\"igorkmit\"},\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/author\\\/igorkmit\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mal\u00e9, ale \u0161ikovn\u00e9: 5 top zariaden\u00ed pre etick\u00fdch hackerov | ESET","description":"Tieto n\u00e1stroje m\u00f4\u017eu pom\u00f4c\u0165 bezpe\u010dnostn\u00fdm pracovn\u00edkom pri identifik\u00e1cii slab\u00fdch miest, ako aj amat\u00e9rskym etick\u00fdm hackerom pri zlep\u0161ovan\u00ed sa.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/male-ale-sikovne-5-najlepsich-vreckovych-zariadeni-pre-etickych-hackerov\/","og_locale":"sk_SK","og_type":"article","og_title":"Mal\u00e9, ale \u0161ikovn\u00e9: 5 top zariaden\u00ed pre etick\u00fdch hackerov | ESET","og_description":"Tieto n\u00e1stroje m\u00f4\u017eu pom\u00f4c\u0165 bezpe\u010dnostn\u00fdm pracovn\u00edkom pri identifik\u00e1cii slab\u00fdch miest, ako aj amat\u00e9rskym etick\u00fdm hackerom pri zlep\u0161ovan\u00ed sa.","og_url":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/male-ale-sikovne-5-najlepsich-vreckovych-zariadeni-pre-etickych-hackerov\/","og_site_name":"Bezpe\u010dne vo firme | ESET","article_published_time":"2024-08-08T10:37:01+00:00","article_modified_time":"2024-08-08T10:40:52+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/08\/Hacking-gadgets_1200x628-no-text-1-1.png","type":"image\/png"}],"author":"igorkmit","twitter_card":"summary_large_image","twitter_misc":{"Autor":"igorkmit","Predpokladan\u00fd \u010das \u010d\u00edtania":"7 min\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/male-ale-sikovne-5-najlepsich-vreckovych-zariadeni-pre-etickych-hackerov\/#article","isPartOf":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/male-ale-sikovne-5-najlepsich-vreckovych-zariadeni-pre-etickych-hackerov\/"},"author":{"name":"igorkmit","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/person\/0b6eea8250c76790569dbea41b2810a3"},"headline":"Mal\u00e9, ale \u0161ikovn\u00e9: 5\u00a0najlep\u0161\u00edch vreckov\u00fdch zariaden\u00ed pre etick\u00fdch hackerov","datePublished":"2024-08-08T10:37:01+00:00","dateModified":"2024-08-08T10:40:52+00:00","mainEntityOfPage":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/male-ale-sikovne-5-najlepsich-vreckovych-zariadeni-pre-etickych-hackerov\/"},"wordCount":1481,"publisher":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/male-ale-sikovne-5-najlepsich-vreckovych-zariadeni-pre-etickych-hackerov\/#primaryimage"},"thumbnailUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/08\/Hacking-gadgets_1200x628-no-text-1-1.png","articleSection":["De\u0161ifrujeme pre v\u00e1s","Firemn\u00e1 bezpe\u010dnos\u0165"],"inLanguage":"sk-SK"},{"@type":"WebPage","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/male-ale-sikovne-5-najlepsich-vreckovych-zariadeni-pre-etickych-hackerov\/","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/male-ale-sikovne-5-najlepsich-vreckovych-zariadeni-pre-etickych-hackerov\/","name":"Mal\u00e9, ale \u0161ikovn\u00e9: 5 top zariaden\u00ed pre etick\u00fdch hackerov | ESET","isPartOf":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/male-ale-sikovne-5-najlepsich-vreckovych-zariadeni-pre-etickych-hackerov\/#primaryimage"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/male-ale-sikovne-5-najlepsich-vreckovych-zariadeni-pre-etickych-hackerov\/#primaryimage"},"thumbnailUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/08\/Hacking-gadgets_1200x628-no-text-1-1.png","datePublished":"2024-08-08T10:37:01+00:00","dateModified":"2024-08-08T10:40:52+00:00","description":"Tieto n\u00e1stroje m\u00f4\u017eu pom\u00f4c\u0165 bezpe\u010dnostn\u00fdm pracovn\u00edkom pri identifik\u00e1cii slab\u00fdch miest, ako aj amat\u00e9rskym etick\u00fdm hackerom pri zlep\u0161ovan\u00ed sa.","breadcrumb":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/male-ale-sikovne-5-najlepsich-vreckovych-zariadeni-pre-etickych-hackerov\/#breadcrumb"},"inLanguage":"sk-SK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/male-ale-sikovne-5-najlepsich-vreckovych-zariadeni-pre-etickych-hackerov\/"]}]},{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/male-ale-sikovne-5-najlepsich-vreckovych-zariadeni-pre-etickych-hackerov\/#primaryimage","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/08\/Hacking-gadgets_1200x628-no-text-1-1.png","contentUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/08\/Hacking-gadgets_1200x628-no-text-1-1.png","width":1200,"height":628,"caption":"BVF n\u00e1stroje na etick\u00e9 hackovanie ilustra\u010dn\u00fd obr\u00e1zok"},{"@type":"BreadcrumbList","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/male-ale-sikovne-5-najlepsich-vreckovych-zariadeni-pre-etickych-hackerov\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Domovsk\u00e1 str\u00e1nka","item":"https:\/\/bezpecnevofirme.eset.com\/sk\/"},{"@type":"ListItem","position":2,"name":"Mal\u00e9, ale \u0161ikovn\u00e9: 5\u00a0najlep\u0161\u00edch vreckov\u00fdch zariaden\u00ed pre etick\u00fdch hackerov"}]},{"@type":"WebSite","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#website","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/","name":"Bezpe\u010dne vo firme | ESET","description":"","publisher":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bezpecnevofirme.eset.com\/sk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sk-SK"},{"@type":"Organization","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization","name":"Bezpe\u010dne vo firme | ESET","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/","logo":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/logo\/image\/","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/BVF_logo_svg_new.svg","contentUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/BVF_logo_svg_new.svg","caption":"Bezpe\u010dne vo firme | ESET"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/person\/0b6eea8250c76790569dbea41b2810a3","name":"igorkmit","image":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/secure.gravatar.com\/avatar\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g","caption":"igorkmit"},"url":"https:\/\/bezpecnevofirme.eset.com\/sk\/author\/igorkmit\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/5980","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/comments?post=5980"}],"version-history":[{"count":2,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/5980\/revisions"}],"predecessor-version":[{"id":5990,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/5980\/revisions\/5990"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/media\/5987"}],"wp:attachment":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/media?parent=5980"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/categories?post=5980"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/tags?post=5980"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}