{"id":48696,"date":"2025-12-05T12:09:33","date_gmt":"2025-12-05T11:09:33","guid":{"rendered":"https:\/\/www.derivaty.sk\/?p=48696"},"modified":"2025-12-05T12:09:33","modified_gmt":"2025-12-05T11:09:33","slug":"reverzivne-inzinierstvo-a-penetracia-analyza-protokolovych-zranitelnosti-v-systemoch-uas","status":"publish","type":"post","link":"https:\/\/www.vrtulniky.sk\/news\/reverzivne-inzinierstvo-a-penetracia-analyza-protokolovych-zranitelnosti-v-systemoch-uas\/","title":{"rendered":"Reverz\u00edvne in\u017einierstvo a penetr\u00e1cia: Anal\u00fdza protokolov\u00fdch zranite\u013enost\u00ed v syst\u00e9moch UAS"},"content":{"rendered":"<h2>Pre\u010do analyzova\u0165 zranite\u013enosti UAV protokolov<\/h2>\n<p>Bezpilotn\u00e9 lietadl\u00e1 (UAV) sa stali s\u00fa\u010das\u0165ou kritickej infra\u0161trukt\u00fary \u2013 od in\u0161pekci\u00ed energetiky a\u017e po z\u00e1chrann\u00e9 oper\u00e1cie. Komunika\u010dn\u00e9 protokoly, ktor\u00e9 prep\u00e1jaj\u00fa pilotov, autopiloty, senzory a cloudov\u00e9 slu\u017eby, s\u00fa v\u0161ak \u010dasto kombin\u00e1ciou historick\u00fdch n\u00e1vrhov bez silnej kryptografie, propriet\u00e1rnych rozhran\u00ed a odli\u0161n\u00fdch prev\u00e1dzkov\u00fdch scen\u00e1rov. Tento \u010dl\u00e1nok poskytuje systematick\u00fa anal\u00fdzu zranite\u013enost\u00ed UAV protokolov s d\u00f4razom na obranu: modely hrozieb, typick\u00e9 slabiny, metodiky testovania a <em>case studies<\/em> \u00fatokov, ktor\u00e9 sl\u00fa\u017eia na lep\u0161ie pochopenie riz\u00edk a n\u00e1vrh \u00fa\u010dinnej mitig\u00e1cie.<\/p>\n<h2>Ekosyst\u00e9m komunika\u010dn\u00fdch protokolov v UAV<\/h2>\n<p>UAV vyu\u017e\u00edvaj\u00fa viacvrstvov\u00fa komunik\u00e1ciu s heterog\u00e9nnymi kan\u00e1lmi a protokolmi:<\/p>\n<ul>\n<li><strong>Riadiaca linka C2<\/strong> (RC link): propriet\u00e1rne alebo \u0161tandardizovan\u00e9 prenosy v sub-GHz\/2.4\/5 GHz; \u010dasto s n\u00edzkou latenciou a obmedzenou d\u00e1tovou kapacitou.<\/li>\n<li><strong>Telemetria a <em>command<\/em><\/strong>: protokoly ako MAVLink (1\/2), propriet\u00e1rne JSON\/bin\u00e1rne r\u00e1mce nad UDP\/TCP\/seri\u00f3vom.<\/li>\n<li><strong>Video a <em>payload<\/em><\/strong>: RTP\/RTSP, propriet\u00e1rne linky (napr. OFDM), niekedy s adapt\u00edvnym bitratom a FEC.<\/li>\n<li><strong>Identifik\u00e1cia a U-space<\/strong>: priame dia\u013ekov\u00e9 ID, sie\u0165ov\u00e9 slu\u017eby, registr\u00e1cia a geofencing aktualiz\u00e1cie.<\/li>\n<li><strong>GNSS a naviga\u010dn\u00e9 vstupy<\/strong>: nie protokol v zmysle IP stacku, ale kritick\u00fd d\u00e1tov\u00fd tok s vlastnou odolnos\u0165ou vo\u010di ru\u0161eniu\/spoofingu.<\/li>\n<li><strong>Cloud a telemetrick\u00fd backend<\/strong>: MQTT\/HTTPS\/WebSocket API pre flotilov\u00fd mana\u017ement a aktualiz\u00e1cie.<\/li>\n<\/ul>\n<h2>Model \u00fato\u010dn\u00edka a hrozby<\/h2>\n<p>Praktick\u00e9 hodnotenie bezpe\u010dnosti si vy\u017eaduje jasn\u00fd model hrozieb:<\/p>\n<ul>\n<li><strong>Pas\u00edvny protivn\u00edk<\/strong>: odpo\u010d\u00fava, odhaduje metad\u00e1ta, vykon\u00e1va anal\u00fdzu <em>traffic patterns<\/em>.<\/li>\n<li><strong>Akt\u00edvny bl\u00edzky protivn\u00edk<\/strong>: injektuje r\u00e1mce, uskuto\u010d\u0148uje <em>replay<\/em>\/spoofing, <em>deauth<\/em> alebo <em>jam<\/em> v ISM p\u00e1smach.<\/li>\n<li><strong>Proximity insider<\/strong>: do\u010dasn\u00fd pr\u00edstup k pozemnej stanici\/vehiklu (USB\/UART), extrakcia k\u013e\u00fa\u010dov alebo konfigur\u00e1ci\u00ed.<\/li>\n<li><strong>Cloudov\u00fd protivn\u00edk<\/strong>: zneu\u017eitie poveren\u00ed API, pivot cez zranite\u013en\u00fd backend alebo CI\/CD aktualiza\u010dn\u00fd re\u0165azec.<\/li>\n<\/ul>\n<h2>Typick\u00fd povrch \u00fatoku v protokoloch<\/h2>\n<p>Naj\u010dastej\u0161ie slabiny s\u00fa kombin\u00e1ciou kryptografick\u00fdch a protokolov\u00fdch ch\u00fdb:<\/p>\n<ul>\n<li><strong>Autentiz\u00e1cia a integrita<\/strong>: ch\u00fdbaj\u00face alebo slab\u00e9 MAC\/HMAC, nespr\u00e1vna spr\u00e1va nonce, nepodp\u00edsan\u00e9 riadiace pr\u00edkazy.<\/li>\n<li><strong>\u0160ifrovanie<\/strong>: nepovinn\u00e9 alebo neaktu\u00e1lne <em>ciphersuites<\/em>, zdie\u013ean\u00e9 symetrick\u00e9 k\u013e\u00fa\u010de naprie\u010d flotilou.<\/li>\n<li><strong>Bezstavov\u00e9 pr\u00edkazy<\/strong>: komand\u00e1 bez sekvencovania\/okien, \u013eahko zneu\u017eite\u013en\u00e9 <em>replay<\/em>.<\/li>\n<li><strong>Broadcast a discovery<\/strong>: nekontrolovan\u00e9 <em>discovery<\/em> pakety, ktor\u00e9 umo\u017e\u0148uj\u00fa enumer\u00e1ciu a <em>service fingerprinting<\/em>.<\/li>\n<li><strong>Kompatibilita a <em>fallback<\/em><\/strong>: zranite\u013en\u00e9 star\u0161ie verzie protokolov zost\u00e1vaj\u00fa povolen\u00e9 kv\u00f4li sp\u00e4tnej kompatibilite.<\/li>\n<\/ul>\n<h2>Metodika bezpe\u010dnostn\u00e9ho testovania (bez poskytnutia zneu\u017eite\u013en\u00fdch detailov)<\/h2>\n<p>Odpor\u00fa\u010dan\u00e1 je etapov\u00e1 metodika zameran\u00e1 na obrann\u00e9 ciele:<\/p>\n<ol>\n<li><strong>Mapovanie akt\u00edv<\/strong>: inventariz\u00e1cia r\u00e1diov\u00fdch rozhran\u00ed, portov a protokolov.<\/li>\n<li><strong>Neinvaz\u00edvne merania<\/strong>: pas\u00edvne zachyt\u00e1vanie metad\u00e1t, latenci\u00ed, periodicity r\u00e1mcov, h\u013eadanie <em>plaintext<\/em> pol\u00ed.<\/li>\n<li><strong>Kontrolovan\u00e9 laborat\u00f3rne \u00fatoky<\/strong>: v RF tienenej komore alebo s attenu\u00e1tormi; z\u00e1sadne bez ohrozenia tret\u00edch str\u00e1n.<\/li>\n<li><strong>Valid\u00e1cia mitig\u00e1ci\u00ed<\/strong>: overenie, \u017ee opatrenia (MAC, sekvencovanie, TLS, certifik\u00e1ty) skuto\u010dne br\u00e1nia triedam \u00fatokov.<\/li>\n<\/ol>\n<h2>Pr\u00edpadov\u00e1 \u0161t\u00fadia A: injekcia pr\u00edkazu do telemetrick\u00e9ho protokolu<\/h2>\n<p><strong>Kontext:<\/strong> Pozemn\u00e1 stanica komunikuje s autopilotom cez UDP na miestnej sieti; pou\u017e\u00edva sa textovo-bin\u00e1rny telemetrick\u00fd protokol bez kryptografickej integrity.<\/p>\n<p><strong>Vektor \u00fatoku:<\/strong> Bl\u00edzky akt\u00edvny protivn\u00edk pozoruje periodick\u00e9 spr\u00e1vy, odvoden\u00edm form\u00e1tu identifikuje pole \u201e<em>COMMAND_LONG<\/em>\u201c-ekvivalent a pok\u00fasi sa o injekciu re\u0165azca pr\u00edkazov (napr. zmena <em>failsafe<\/em> re\u017eimu, <em>mode switch<\/em>).<\/p>\n<p><strong>D\u00f4sledky:<\/strong> Do\u010dasn\u00e9 prevzat\u00e9 riadenie alebo naru\u0161enie bezpe\u010dnostnej logiky pri absencii overenia p\u00f4vodu.<\/p>\n<p><strong>Mitig\u00e1cia:<\/strong> Povinn\u00e9 podp\u00edsanie\/overenie pr\u00edkazov (HMAC s rotuj\u00facimi k\u013e\u00fa\u010dmi), sekvencovanie a okn\u00e1 prij\u00edmania, <em>role-based<\/em> autoriz\u00e1cia pr\u00edkazov na palube, <em>rate limiting<\/em> a <em>command whitelisting<\/em>.<\/p>\n<h2>Pr\u00edpadov\u00e1 \u0161t\u00fadia B: <em>Replay<\/em> legit\u00edmnych r\u00e1mcov C2<\/h2>\n<p><strong>Kontext:<\/strong> RC linka s r\u00e1mcami bez kryptografick\u00e9ho podpisu a bez monot\u00f3nnych \u010d\u00edta\u010dov.<\/p>\n<p><strong>Vektor \u00fatoku:<\/strong> \u00dato\u010dn\u00edk pas\u00edvne zachyt\u00ed sekvenciu \u201ebezpe\u010dn\u00fdch\u201c povelov, n\u00e1sledne ich kr\u00e1tko po sebe op\u00e4tovne odo\u0161le.<\/p>\n<p><strong>D\u00f4sledky:<\/strong> Nepredv\u00eddan\u00fd pohyb, ignorovanie skuto\u010dn\u00fdch vstupov oper\u00e1tora, potenci\u00e1lna destabiliz\u00e1cia letu.<\/p>\n<p><strong>Mitig\u00e1cia:<\/strong> Anti-replay s \u010d\u00edta\u010dmi\/\u010dasov\u00fdmi zna\u010dkami, kryptografick\u00e1 integrita, zviazanie pr\u00edkazov s <em>session key<\/em> a kontextom (napr. identita GCS + ID misie).<\/p>\n<h2>Pr\u00edpadov\u00e1 \u0161t\u00fadia C: <em>Downgrade<\/em> video linku a injekcia overlay<\/h2>\n<p><strong>Kontext:<\/strong> Video link podporuje viac profilov; pri ru\u0161en\u00ed prech\u00e1dza na nezabezpe\u010den\u00fd profil pre kompatibilitu.<\/p>\n<p><strong>Vektor \u00fatoku:<\/strong> N\u00faten\u00fd prechod na <em>fallback<\/em> profil bez end-to-end integrity umo\u017en\u00ed vlo\u017ei\u0165 overlay (falo\u0161n\u00e9 varovania, kurzor, symboly cie\u013eov).<\/p>\n<p><strong>D\u00f4sledky:<\/strong> Zm\u00e4tok oper\u00e1tora, nespr\u00e1vne rozhodnutia pri kritickej misii.<\/p>\n<p><strong>Mitig\u00e1cia:<\/strong> Zak\u00e1zanie nezabezpe\u010den\u00fdch profilov, povinn\u00e1 integrita video streamu (SRTP s autentiz\u00e1ciou), detekcia zmeny profilu s potvrden\u00edm oper\u00e1tora.<\/p>\n<h2>Pr\u00edpadov\u00e1 \u0161t\u00fadia D: <em>Deauthentication<\/em> pozemnej stanice vo Wi-Fi re\u017eime<\/h2>\n<p><strong>Kontext:<\/strong> UAV vytv\u00e1ra ad-hoc\/AP sie\u0165 pre GCS; management r\u00e1mce nie s\u00fa chr\u00e1nen\u00e9.<\/p>\n<p><strong>Vektor \u00fatoku:<\/strong> \u00dato\u010dn\u00edk generuje <em>deauth<\/em> r\u00e1mce, ktor\u00e9 do\u010dasne odpoja GCS a vytvoria okno na prebratie spojenia alebo na vyvolanie <em>failsafe<\/em>.<\/p>\n<p><strong>D\u00f4sledky:<\/strong> Strata C2 linky, n\u00fadzov\u00e9 re\u017eimy, skr\u00e1tenie v\u00fddr\u017ee vplyvom opakovan\u00e9ho pripojovania.<\/p>\n<p><strong>Mitig\u00e1cia:<\/strong> 802.11w (ochrana management r\u00e1mcov), pevn\u00e9 sp\u00e1rovanie zariaden\u00ed, <em>channel hopping<\/em> s koordin\u00e1ciou, preferencia odolnej\u0161\u00edch fyzick\u00fdch vrstiev pre C2.<\/p>\n<h2>Pr\u00edpadov\u00e1 \u0161t\u00fadia E: zneu\u017eitie OTA aktualiza\u010dn\u00e9ho re\u0165azca<\/h2>\n<p><strong>Kontext:<\/strong> UAV a GCS podporuj\u00fa OTA aktualiz\u00e1cie; podpisy firmware nie s\u00fa striktne vynucovan\u00e9 alebo sa pou\u017e\u00edva zdielan\u00fd testovac\u00ed certifik\u00e1t.<\/p>\n<p><strong>Vektor \u00fatoku:<\/strong> \u00dato\u010dn\u00edk v kontrolovanom prostred\u00ed pods\u00fava modifikovan\u00fa bin\u00e1rku alebo men\u00ed URL endpoint.<\/p>\n<p><strong>D\u00f4sledky:<\/strong> Pretrv\u00e1vaj\u00faca kompromit\u00e1cia, \u00fanik k\u013e\u00fa\u010dov, zmena parametrov letu.<\/p>\n<p><strong>Mitig\u00e1cia:<\/strong> Povinn\u00e9 podpisy s overen\u00edm re\u0165azca d\u00f4very, <em>rollback protection<\/em>, oddelen\u00e9 part\u00edcie, <em>secure boot<\/em> s HW kotvou d\u00f4very, inventariz\u00e1cia verzi\u00ed a revok\u00e1cie.<\/p>\n<h2>Pr\u00edpadov\u00e1 \u0161t\u00fadia F: sie\u0165ov\u00e9 dia\u013ekov\u00e9 ID \u2013 spoofing a preplnenie<\/h2>\n<p><strong>Kontext:<\/strong> Implement\u00e1cia sie\u0165ov\u00e9ho\/direktn\u00e9ho dia\u013ekov\u00e9ho ID bez silnej verifik\u00e1cie p\u00f4vodu.<\/p>\n<p><strong>Vektor \u00fatoku:<\/strong> Generovanie falo\u0161n\u00fdch ident\u00edt a pol\u00f4h, <em>flooding<\/em> lok\u00e1lnej telemetrie a mapov\u00fdch klientov.<\/p>\n<p><strong>D\u00f4sledky:<\/strong> Opera\u010dn\u00fd chaos, zahltenie monitorovac\u00edch n\u00e1strojov, maskovanie re\u00e1lnych dronov.<\/p>\n<p><strong>Mitig\u00e1cia:<\/strong> Kryptograficky viazan\u00e9 identifik\u00e1tory, overenie lok\u00e1lnej konzistencie (viac senzorov), r\u00fdchla filtr\u00e1cia a <em>rate limiting<\/em> v klientoch, <em>anomaly scoring<\/em> polohov\u00fdch \u00fadajov.<\/p>\n<h2>Pr\u00edpadov\u00e1 \u0161t\u00fadia G: later\u00e1lny pohyb cez pozemn\u00fa stanicu<\/h2>\n<p><strong>Kontext:<\/strong> GCS be\u017e\u00ed na v\u0161eobecnom OS s \u010fal\u0161\u00edmi slu\u017ebami; protokoly UAV s\u00fa pr\u00edstupn\u00e9 lok\u00e1lne.<\/p>\n<p><strong>Vektor \u00fatoku:<\/strong> Kompromit\u00e1cia GCS (napr. cez zastaran\u00fd plugin), pr\u00edstup k tajomstv\u00e1m (API tokeny, k\u013e\u00fa\u010de) a n\u00e1sledn\u00e1 manipul\u00e1cia s telemetriou \u010di pr\u00edkazmi.<\/p>\n<p><strong>D\u00f4sledky:<\/strong> \u00datok s legitimn\u00fdmi povereniami, \u0165a\u017eko odl\u00ed\u0161ite\u013en\u00fd od be\u017enej prev\u00e1dzky.<\/p>\n<p><strong>Mitig\u00e1cia:<\/strong> <em>Hardening<\/em> GCS (sandboxing, least-privilege), izol\u00e1cia sie\u0165ov\u00fdch segmentov, <em>hardware-backed<\/em> \u00faschova k\u013e\u00fa\u010dov, oddelenie \u00fa\u010dtov a MF autentiz\u00e1cia do cloudu.<\/p>\n<h2>Kryptografick\u00e9 z\u00e1sady pre UAV protokoly<\/h2>\n<p>Navrhujte protokoly s povinnou ochranou u\u017e v z\u00e1klade:<\/p>\n<ul>\n<li><strong>Vz\u00e1jomn\u00e1 autentiz\u00e1cia<\/strong> medzi GCS a UAV (certifik\u00e1ty, ECDH, <em>mutual TLS<\/em> alebo \u013eahk\u00e9 AEAD pre n\u00edzku latenciu).<\/li>\n<li><strong>Integrita a anti-replay<\/strong>: sekvencovanie, nonce, okn\u00e1 akcept\u00e1cie, rot\u00e1cia k\u013e\u00fa\u010dov viazan\u00e1 na misiu.<\/li>\n<li><strong>Oddelenie rol\u00ed<\/strong>: granularita opr\u00e1vnen\u00ed (oper\u00e1tor, pozorovate\u013e, \u00fadr\u017eba) a lok\u00e1lne <em>policy<\/em> na palube.<\/li>\n<li><strong>Bezpe\u010dn\u00fd <em>fallback<\/em><\/strong>: nikdy nie do neautentizovan\u00e9ho re\u017eimu; rad\u0161ej degrad\u00e1cia funkcionality ne\u017e strata integrity.<\/li>\n<\/ul>\n<h2>RF a fyzick\u00e1 vrstva: odolnos\u0165 a detekcia<\/h2>\n<p>Protokolov\u00e1 bezpe\u010dnos\u0165 sa opiera o fyziku:<\/p>\n<ul>\n<li><strong>Viackan\u00e1lov\u00e9 a smerov\u00e9 pr\u00edstupy<\/strong>: zni\u017euj\u00fa \u00fa\u010dinnos\u0165 ru\u0161enia a cielen\u00e9ho <em>injection<\/em>.<\/li>\n<li><strong>Spektr\u00e1lny monitoring<\/strong>: v\u010das deteguje anom\u00e1lie (<em>jamming<\/em>, ne\u0161tandardn\u00e9 modul\u00e1cie) a sp\u00fa\u0161\u0165a <em>failsafe<\/em> politiky.<\/li>\n<li><strong>FEC a diversity<\/strong>: zni\u017euj\u00fa dopad \u00fatokov s obmedzenou silou a n\u00e1hodn\u00fdm ru\u0161en\u00edm.<\/li>\n<\/ul>\n<h2>Detekcia incidentov a telemetrick\u00e1 forenzika<\/h2>\n<p>Bez detekcie a d\u00f4kazov je obrana ne\u00fapln\u00e1:<\/p>\n<ul>\n<li><strong>Podpisov\u00e9 a behavior\u00e1lne IDS<\/strong> na GCS aj v cloude; pravidl\u00e1 pre abnorm\u00e1lne sekvencie pr\u00edkazov.<\/li>\n<li><strong>\u010casovan\u00e9 a kryptograficky viazan\u00e9 logy<\/strong> pr\u00edkazov a udalost\u00ed na palube (WORM \u00falo\u017eisko).<\/li>\n<li><strong>Post-mortem korel\u00e1cia<\/strong> RF z\u00e1znamov, telemetrie a syst\u00e9mov\u00fdch logov s cie\u013eom rekon\u0161truova\u0165 re\u0165azec udalost\u00ed.<\/li>\n<\/ul>\n<h2>Bezpe\u010dn\u00fd \u017eivotn\u00fd cyklus a spr\u00e1va k\u013e\u00fa\u010dov<\/h2>\n<p>Bezpe\u010dnos\u0165 protokolov stoj\u00ed na spr\u00e1vnej spr\u00e1ve tajomstiev:<\/p>\n<ul>\n<li><strong>Provisioning<\/strong> unik\u00e1tnych k\u013e\u00fa\u010dov pri v\u00fdrobe s HW ochranou (TPM\/SE), nikdy nie glob\u00e1lne k\u013e\u00fa\u010de pre flotilu.<\/li>\n<li><strong>Rot\u00e1cia a revok\u00e1cia<\/strong> viazan\u00e1 na misie\/\u010das, s mo\u017enos\u0165ou n\u00fadzov\u00e9ho zneplatnenia.<\/li>\n<li><strong>Bezpe\u010dn\u00e9 OTA<\/strong>: podpisy, verifika\u010dn\u00e9 re\u0165azce, <em>rollback protection<\/em>.<\/li>\n<\/ul>\n<h2>\u0160pecifik\u00e1 flot\u00edl a rojov<\/h2>\n<p>V multi-UAV scen\u00e1roch sa rizik\u00e1 n\u00e1sobia:<\/p>\n<ul>\n<li><strong>Vz\u00e1jomn\u00e1 d\u00f4vera uzlov<\/strong>: <em>zero-trust<\/em> princ\u00edpy, kr\u00e1tko\u017eij\u00face l\u00edstky (capability tokens) pre intern\u00e9 slu\u017eby.<\/li>\n<li><strong>Odolnos\u0165 proti byzantsk\u00fdm uzlom<\/strong>: konsenzus toleruj\u00faci zlyhania pre zdie\u013ean\u00e9 mapy a rozhodovanie, kv\u00f3ty na broadcast.<\/li>\n<li><strong>Koordinovan\u00fd <em>failover<\/em><\/strong>: strata jedn\u00e9ho uzla neotvor\u00ed zadn\u00e9 vr\u00e1tka k celej sieti.<\/li>\n<\/ul>\n<h2>Regula\u010dn\u00fd kontext a s\u00falad<\/h2>\n<p>Implement\u00e1cie musia sp\u013a\u0148a\u0165 lok\u00e1lne po\u017eiadavky na r\u00e1diov\u00e9 rozhrania, dia\u013ekov\u00e9 ID a ochranu osobn\u00fdch \u00fadajov. Forenzn\u00e9 a auditn\u00e9 mechanizmy musia re\u0161pektova\u0165 z\u00e1konn\u00e9 r\u00e1mce (uchov\u00e1vanie z\u00e1znamov, pr\u00edstup org\u00e1nov v pr\u00edpade incidentu) a z\u00e1sady <em>privacy by design<\/em>.<\/p>\n<h2>Metodika hodnotenia rizika a metriky<\/h2>\n<p>Na kvantifik\u00e1ciu pokroku v bezpe\u010dnosti protokolov odpor\u00fa\u010dame metriky:<\/p>\n<ul>\n<li><strong>MTTD\/MTTR<\/strong> pre incidenty s\u00favisiace s komunik\u00e1ciou.<\/li>\n<li><strong>Pokrytie bezpe\u010dnostn\u00fdch kontrol<\/strong> (autentiz\u00e1cia, integrita, anti-replay) naprie\u010d kan\u00e1lmi.<\/li>\n<li><strong>Percento kryptograficky chr\u00e1nen\u00fdch pr\u00edkazov<\/strong> a <strong>podiel unik\u00e1tnych k\u013e\u00fa\u010dov<\/strong> vo flotile.<\/li>\n<li><strong>\u00daspe\u0161nos\u0165 <em>red-team<\/em> scen\u00e1rov<\/strong> v kontrolovanom teste pred a po mitig\u00e1ci\u00e1ch.<\/li>\n<\/ul>\n<h2>Osved\u010den\u00e9 postupy (best practices) pre v\u00fdrobcov a prev\u00e1dzkovate\u013eov<\/h2>\n<ul>\n<li>\u201e<strong>Secure by default<\/strong>\u201c: zak\u00e1\u017ete nezabezpe\u010den\u00e9 profily a odstra\u0148ujte <em>fallback<\/em> do plaintextu.<\/li>\n<li><strong>Vz\u00e1jomn\u00e1 autentiz\u00e1cia a integrita<\/strong> pre v\u0161etky C2\/telemetrick\u00e9 pr\u00edkazy; sekvencovanie a <em>anti-replay<\/em>.<\/li>\n<li><strong>Segment\u00e1cia a <em>least privilege<\/em><\/strong> na GCS a v cloudovom backende.<\/li>\n<li><strong>RF hygiena<\/strong>: spektr\u00e1lny monitoring, smerov\u00e9 ant\u00e9ny, kan\u00e1lov\u00e1 diverzita.<\/li>\n<li><strong>Forenzne pou\u017eite\u013en\u00e9 logy<\/strong> s ochranou integrity a synchronizovan\u00fdm \u010dasom.<\/li>\n<li><strong>Priebe\u017en\u00e9 penetra\u010dn\u00e9 testy<\/strong> v bezpe\u010dn\u00fdch podmienkach a \u0161kolenia oper\u00e1torov na rozpoznanie sign\u00e1lov \u00fatoku.<\/li>\n<\/ul>\n<p>UAV protokoly \u010delia \u0161pecifick\u00e9mu spektru riz\u00edk \u2013 od injekcie pr\u00edkazov a <em>replay<\/em> \u00fatokov a\u017e po zneu\u017eitie OTA re\u0165azcov a dia\u013ekov\u00e9ho ID. Dobre navrhnut\u00e9 obrann\u00e9 opatrenia, ktor\u00e9 kombinuj\u00fa kryptografiu, robustn\u00fd n\u00e1vrh protokolov, RF odolnos\u0165 a d\u00f4sledn\u00fa forenziku, dok\u00e1\u017eu v\u00fdrazne zn\u00ed\u017ei\u0165 pravdepodobnos\u0165 aj dopady incidentov. K\u013e\u00fa\u010dom je pozera\u0165 sa na bezpe\u010dnos\u0165 holisticky: zahrn\u00fa\u0165 \u013eud\u00ed, procesy, zariadenia, r\u00e1diov\u00e9 prostredie a cloud \u2013 a kontinu\u00e1lne overova\u0165, \u017ee implementovan\u00e9 kontroly skuto\u010dne funguj\u00fa v re\u00e1lnych, dynamick\u00fdch podmienkach.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Anal\u00fdza \u00fatokov na UAV protokoly a praktick\u00e9 odpor\u00fa\u010dania na hardening, audit a v\u010dasn\u00e9 opravovanie zranite\u013enost\u00ed.<\/p>\n","protected":false},"author":38,"featured_media":88696,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2629],"tags":[2517,2540,2541,2542,2543,2544,2545,2546],"class_list":["post-48696","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-drony","tag-audit","tag-hardening","tag-mitm","tag-patching","tag-pripadove-studie","tag-replay","tag-sifrovanie","tag-zranitelnosti-uav-protokolov"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Reverz\u00edvne in\u017einierstvo a penetr\u00e1cia: Anal\u00fdza protokolov\u00fdch zranite\u013enost\u00ed v syst\u00e9moch UAS - Podnik\u00e1m, lietam a relaxujem<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.vrtulniky.sk\/news\/reverzivne-inzinierstvo-a-penetracia-analyza-protokolovych-zranitelnosti-v-systemoch-uas\/\" \/>\n<meta property=\"og:locale\" content=\"sk_SK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Reverz\u00edvne in\u017einierstvo a penetr\u00e1cia: Anal\u00fdza protokolov\u00fdch zranite\u013enost\u00ed v syst\u00e9moch UAS - Podnik\u00e1m, lietam a relaxujem\" \/>\n<meta property=\"og:description\" content=\"Anal\u00fdza \u00fatokov na UAV protokoly a praktick\u00e9 odpor\u00fa\u010dania na hardening, audit a v\u010dasn\u00e9 opravovanie zranite\u013enost\u00ed.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.vrtulniky.sk\/news\/reverzivne-inzinierstvo-a-penetracia-analyza-protokolovych-zranitelnosti-v-systemoch-uas\/\" \/>\n<meta property=\"og:site_name\" content=\"Podnik\u00e1m, lietam a relaxujem\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/vrtulniky\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-05T11:09:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.vrtulniky.sk\/news\/wp-content\/uploads\/2022\/08\/vrtulniky-sk.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Luk\u00e1\u0161 Kroc\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Autor\" \/>\n\t<meta name=\"twitter:data1\" content=\"Luk\u00e1\u0161 Kroc\" \/>\n\t<meta name=\"twitter:label2\" content=\"Predpokladan\u00fd \u010das \u010d\u00edtania\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 min\u00fat\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.vrtulniky.sk\\\/news\\\/reverzivne-inzinierstvo-a-penetracia-analyza-protokolovych-zranitelnosti-v-systemoch-uas\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.vrtulniky.sk\\\/news\\\/reverzivne-inzinierstvo-a-penetracia-analyza-protokolovych-zranitelnosti-v-systemoch-uas\\\/\"},\"author\":{\"name\":\"Luk\u00e1\u0161 Kroc\",\"@id\":\"https:\\\/\\\/www.vrtulniky.sk\\\/news\\\/#\\\/schema\\\/person\\\/cb79e77c4df94a6073f4b575fa42fadb\"},\"headline\":\"Reverz\u00edvne in\u017einierstvo a penetr\u00e1cia: Anal\u00fdza protokolov\u00fdch zranite\u013enost\u00ed v syst\u00e9moch UAS\",\"datePublished\":\"2025-12-05T11:09:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.vrtulniky.sk\\\/news\\\/reverzivne-inzinierstvo-a-penetracia-analyza-protokolovych-zranitelnosti-v-systemoch-uas\\\/\"},\"wordCount\":1860,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.vrtulniky.sk\\\/news\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.vrtulniky.sk\\\/news\\\/reverzivne-inzinierstvo-a-penetracia-analyza-protokolovych-zranitelnosti-v-systemoch-uas\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.vrtulniky.sk\\\/news\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/vzdelavanie-vysoka-skola-8696.jpg\",\"keywords\":[\"audit\",\"hardening\",\"MITM\",\"patching\",\"pr\u00edpadov\u00e9 \u0161t\u00fadie\",\"replay\",\"\u0161ifrovanie\",\"zranite\u013enosti UAV protokolov\"],\"articleSection\":[\"Drony\"],\"inLanguage\":\"sk-SK\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.vrtulniky.sk\\\/news\\\/reverzivne-inzinierstvo-a-penetracia-analyza-protokolovych-zranitelnosti-v-systemoch-uas\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.vrtulniky.sk\\\/news\\\/reverzivne-inzinierstvo-a-penetracia-analyza-protokolovych-zranitelnosti-v-systemoch-uas\\\/\",\"url\":\"https:\\\/\\\/www.vrtulniky.sk\\\/news\\\/reverzivne-inzinierstvo-a-penetracia-analyza-protokolovych-zranitelnosti-v-systemoch-uas\\\/\",\"name\":\"Reverz\u00edvne in\u017einierstvo a penetr\u00e1cia: Anal\u00fdza protokolov\u00fdch zranite\u013enost\u00ed v syst\u00e9moch UAS - Podnik\u00e1m, lietam a relaxujem\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.vrtulniky.sk\\\/news\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.vrtulniky.sk\\\/news\\\/reverzivne-inzinierstvo-a-penetracia-analyza-protokolovych-zranitelnosti-v-systemoch-uas\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.vrtulniky.sk\\\/news\\\/reverzivne-inzinierstvo-a-penetracia-analyza-protokolovych-zranitelnosti-v-systemoch-uas\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.vrtulniky.sk\\\/news\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/vzdelavanie-vysoka-skola-8696.jpg\",\"datePublished\":\"2025-12-05T11:09:33+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.vrtulniky.sk\\\/news\\\/reverzivne-inzinierstvo-a-penetracia-analyza-protokolovych-zranitelnosti-v-systemoch-uas\\\/#breadcrumb\"},\"inLanguage\":\"sk-SK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.vrtulniky.sk\\\/news\\\/reverzivne-inzinierstvo-a-penetracia-analyza-protokolovych-zranitelnosti-v-systemoch-uas\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/www.vrtulniky.sk\\\/news\\\/reverzivne-inzinierstvo-a-penetracia-analyza-protokolovych-zranitelnosti-v-systemoch-uas\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.vrtulniky.sk\\\/news\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/vzdelavanie-vysoka-skola-8696.jpg\",\"contentUrl\":\"https:\\\/\\\/www.vrtulniky.sk\\\/news\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/vzdelavanie-vysoka-skola-8696.jpg\",\"width\":1536,\"height\":1024,\"caption\":\"Reverz\u00edvne in\u017einierstvo a penetr\u00e1cia: Anal\u00fdza protokolov\u00fdch zranite\u013enost\u00ed v syst\u00e9moch UAS\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.vrtulniky.sk\\\/news\\\/reverzivne-inzinierstvo-a-penetracia-analyza-protokolovych-zranitelnosti-v-systemoch-uas\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.vrtulniky.sk\\\/news\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Reverz\u00edvne in\u017einierstvo a penetr\u00e1cia: Anal\u00fdza protokolov\u00fdch zranite\u013enost\u00ed v syst\u00e9moch UAS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.vrtulniky.sk\\\/news\\\/#website\",\"url\":\"https:\\\/\\\/www.vrtulniky.sk\\\/news\\\/\",\"name\":\"Podnik\u00e1m, lietam a relaxujem\",\"description\":\"Vrtu\u013en\u00edky.sk\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.vrtulniky.sk\\\/news\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.vrtulniky.sk\\\/news\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sk-SK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.vrtulniky.sk\\\/news\\\/#organization\",\"name\":\"Podnik\u00e1m, lietam a relaxujem\",\"url\":\"https:\\\/\\\/www.vrtulniky.sk\\\/news\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/www.vrtulniky.sk\\\/news\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.vrtulniky.sk\\\/news\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/news-vrtulniky-sk-logo-e1660318023553.png\",\"contentUrl\":\"https:\\\/\\\/www.vrtulniky.sk\\\/news\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/news-vrtulniky-sk-logo-e1660318023553.png\",\"width\":201,\"height\":200,\"caption\":\"Podnik\u00e1m, lietam a relaxujem\"},\"image\":{\"@id\":\"https:\\\/\\\/www.vrtulniky.sk\\\/news\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/vrtulniky\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.vrtulniky.sk\\\/news\\\/#\\\/schema\\\/person\\\/cb79e77c4df94a6073f4b575fa42fadb\",\"name\":\"Luk\u00e1\u0161 Kroc\",\"url\":\"https:\\\/\\\/www.vrtulniky.sk\\\/news\\\/author\\\/lukas-kroc\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Reverz\u00edvne in\u017einierstvo a penetr\u00e1cia: Anal\u00fdza protokolov\u00fdch zranite\u013enost\u00ed v syst\u00e9moch UAS - Podnik\u00e1m, lietam a relaxujem","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.vrtulniky.sk\/news\/reverzivne-inzinierstvo-a-penetracia-analyza-protokolovych-zranitelnosti-v-systemoch-uas\/","og_locale":"sk_SK","og_type":"article","og_title":"Reverz\u00edvne in\u017einierstvo a penetr\u00e1cia: Anal\u00fdza protokolov\u00fdch zranite\u013enost\u00ed v syst\u00e9moch UAS - Podnik\u00e1m, lietam a relaxujem","og_description":"Anal\u00fdza \u00fatokov na UAV protokoly a praktick\u00e9 odpor\u00fa\u010dania na hardening, audit a v\u010dasn\u00e9 opravovanie zranite\u013enost\u00ed.","og_url":"https:\/\/www.vrtulniky.sk\/news\/reverzivne-inzinierstvo-a-penetracia-analyza-protokolovych-zranitelnosti-v-systemoch-uas\/","og_site_name":"Podnik\u00e1m, lietam a relaxujem","article_publisher":"https:\/\/www.facebook.com\/vrtulniky\/","article_published_time":"2025-12-05T11:09:33+00:00","og_image":[{"width":1400,"height":900,"url":"https:\/\/www.vrtulniky.sk\/news\/wp-content\/uploads\/2022\/08\/vrtulniky-sk.jpg","type":"image\/jpeg"}],"author":"Luk\u00e1\u0161 Kroc","twitter_card":"summary_large_image","twitter_misc":{"Autor":"Luk\u00e1\u0161 Kroc","Predpokladan\u00fd \u010das \u010d\u00edtania":"9 min\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.vrtulniky.sk\/news\/reverzivne-inzinierstvo-a-penetracia-analyza-protokolovych-zranitelnosti-v-systemoch-uas\/#article","isPartOf":{"@id":"https:\/\/www.vrtulniky.sk\/news\/reverzivne-inzinierstvo-a-penetracia-analyza-protokolovych-zranitelnosti-v-systemoch-uas\/"},"author":{"name":"Luk\u00e1\u0161 Kroc","@id":"https:\/\/www.vrtulniky.sk\/news\/#\/schema\/person\/cb79e77c4df94a6073f4b575fa42fadb"},"headline":"Reverz\u00edvne in\u017einierstvo a penetr\u00e1cia: Anal\u00fdza protokolov\u00fdch zranite\u013enost\u00ed v syst\u00e9moch UAS","datePublished":"2025-12-05T11:09:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.vrtulniky.sk\/news\/reverzivne-inzinierstvo-a-penetracia-analyza-protokolovych-zranitelnosti-v-systemoch-uas\/"},"wordCount":1860,"commentCount":0,"publisher":{"@id":"https:\/\/www.vrtulniky.sk\/news\/#organization"},"image":{"@id":"https:\/\/www.vrtulniky.sk\/news\/reverzivne-inzinierstvo-a-penetracia-analyza-protokolovych-zranitelnosti-v-systemoch-uas\/#primaryimage"},"thumbnailUrl":"https:\/\/www.vrtulniky.sk\/news\/wp-content\/uploads\/2025\/12\/vzdelavanie-vysoka-skola-8696.jpg","keywords":["audit","hardening","MITM","patching","pr\u00edpadov\u00e9 \u0161t\u00fadie","replay","\u0161ifrovanie","zranite\u013enosti UAV protokolov"],"articleSection":["Drony"],"inLanguage":"sk-SK","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.vrtulniky.sk\/news\/reverzivne-inzinierstvo-a-penetracia-analyza-protokolovych-zranitelnosti-v-systemoch-uas\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.vrtulniky.sk\/news\/reverzivne-inzinierstvo-a-penetracia-analyza-protokolovych-zranitelnosti-v-systemoch-uas\/","url":"https:\/\/www.vrtulniky.sk\/news\/reverzivne-inzinierstvo-a-penetracia-analyza-protokolovych-zranitelnosti-v-systemoch-uas\/","name":"Reverz\u00edvne in\u017einierstvo a penetr\u00e1cia: Anal\u00fdza protokolov\u00fdch zranite\u013enost\u00ed v syst\u00e9moch UAS - Podnik\u00e1m, lietam a relaxujem","isPartOf":{"@id":"https:\/\/www.vrtulniky.sk\/news\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.vrtulniky.sk\/news\/reverzivne-inzinierstvo-a-penetracia-analyza-protokolovych-zranitelnosti-v-systemoch-uas\/#primaryimage"},"image":{"@id":"https:\/\/www.vrtulniky.sk\/news\/reverzivne-inzinierstvo-a-penetracia-analyza-protokolovych-zranitelnosti-v-systemoch-uas\/#primaryimage"},"thumbnailUrl":"https:\/\/www.vrtulniky.sk\/news\/wp-content\/uploads\/2025\/12\/vzdelavanie-vysoka-skola-8696.jpg","datePublished":"2025-12-05T11:09:33+00:00","breadcrumb":{"@id":"https:\/\/www.vrtulniky.sk\/news\/reverzivne-inzinierstvo-a-penetracia-analyza-protokolovych-zranitelnosti-v-systemoch-uas\/#breadcrumb"},"inLanguage":"sk-SK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.vrtulniky.sk\/news\/reverzivne-inzinierstvo-a-penetracia-analyza-protokolovych-zranitelnosti-v-systemoch-uas\/"]}]},{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/www.vrtulniky.sk\/news\/reverzivne-inzinierstvo-a-penetracia-analyza-protokolovych-zranitelnosti-v-systemoch-uas\/#primaryimage","url":"https:\/\/www.vrtulniky.sk\/news\/wp-content\/uploads\/2025\/12\/vzdelavanie-vysoka-skola-8696.jpg","contentUrl":"https:\/\/www.vrtulniky.sk\/news\/wp-content\/uploads\/2025\/12\/vzdelavanie-vysoka-skola-8696.jpg","width":1536,"height":1024,"caption":"Reverz\u00edvne in\u017einierstvo a penetr\u00e1cia: Anal\u00fdza protokolov\u00fdch zranite\u013enost\u00ed v syst\u00e9moch UAS"},{"@type":"BreadcrumbList","@id":"https:\/\/www.vrtulniky.sk\/news\/reverzivne-inzinierstvo-a-penetracia-analyza-protokolovych-zranitelnosti-v-systemoch-uas\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.vrtulniky.sk\/news\/"},{"@type":"ListItem","position":2,"name":"Reverz\u00edvne in\u017einierstvo a penetr\u00e1cia: Anal\u00fdza protokolov\u00fdch zranite\u013enost\u00ed v syst\u00e9moch UAS"}]},{"@type":"WebSite","@id":"https:\/\/www.vrtulniky.sk\/news\/#website","url":"https:\/\/www.vrtulniky.sk\/news\/","name":"Podnik\u00e1m, lietam a relaxujem","description":"Vrtu\u013en\u00edky.sk","publisher":{"@id":"https:\/\/www.vrtulniky.sk\/news\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.vrtulniky.sk\/news\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sk-SK"},{"@type":"Organization","@id":"https:\/\/www.vrtulniky.sk\/news\/#organization","name":"Podnik\u00e1m, lietam a relaxujem","url":"https:\/\/www.vrtulniky.sk\/news\/","logo":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/www.vrtulniky.sk\/news\/#\/schema\/logo\/image\/","url":"https:\/\/www.vrtulniky.sk\/news\/wp-content\/uploads\/2022\/08\/news-vrtulniky-sk-logo-e1660318023553.png","contentUrl":"https:\/\/www.vrtulniky.sk\/news\/wp-content\/uploads\/2022\/08\/news-vrtulniky-sk-logo-e1660318023553.png","width":201,"height":200,"caption":"Podnik\u00e1m, lietam a relaxujem"},"image":{"@id":"https:\/\/www.vrtulniky.sk\/news\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/vrtulniky\/"]},{"@type":"Person","@id":"https:\/\/www.vrtulniky.sk\/news\/#\/schema\/person\/cb79e77c4df94a6073f4b575fa42fadb","name":"Luk\u00e1\u0161 Kroc","url":"https:\/\/www.vrtulniky.sk\/news\/author\/lukas-kroc\/"}]}},"_links":{"self":[{"href":"https:\/\/www.vrtulniky.sk\/news\/wp-json\/wp\/v2\/posts\/48696","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.vrtulniky.sk\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.vrtulniky.sk\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.vrtulniky.sk\/news\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/www.vrtulniky.sk\/news\/wp-json\/wp\/v2\/comments?post=48696"}],"version-history":[{"count":0,"href":"https:\/\/www.vrtulniky.sk\/news\/wp-json\/wp\/v2\/posts\/48696\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.vrtulniky.sk\/news\/wp-json\/wp\/v2\/media\/88696"}],"wp:attachment":[{"href":"https:\/\/www.vrtulniky.sk\/news\/wp-json\/wp\/v2\/media?parent=48696"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.vrtulniky.sk\/news\/wp-json\/wp\/v2\/categories?post=48696"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.vrtulniky.sk\/news\/wp-json\/wp\/v2\/tags?post=48696"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}