{"id":10109,"date":"2021-10-01T14:41:47","date_gmt":"2021-10-01T11:41:47","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=10109"},"modified":"2021-10-01T14:41:47","modified_gmt":"2021-10-01T11:41:47","slug":"most-used-lolbins","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/most-used-lolbins\/10109\/","title":{"rendered":"Siber su\u00e7lular\u0131n en \u00e7ok kulland\u0131\u011f\u0131 LOLBin&#8217;ler"},"content":{"rendered":"<p>Siber su\u00e7lular uzun zamand\u0131r Microsoft Windows kullan\u0131c\u0131lar\u0131na sald\u0131rmak i\u00e7in yasal programlar ve i\u015fletim sistemi bile\u015fenleri kullan\u0131yor. Bu teknik, <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/lotl-living-off-the-land\/\" target=\"_blank\" rel=\"noopener\">Living off the Land<\/a> sald\u0131r\u0131s\u0131 olarak biliniyor. Sald\u0131rganlar bu taktik sayesinde bir siber ta\u015fla birka\u00e7 ku\u015f vurmaya, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m ara\u00e7 kiti geli\u015ftirme maliyetini d\u00fc\u015f\u00fcrmeye, i\u015fletim sistemi ayakizlerini minimize etmeye ve faaliyetlerini me\u015fru BT aktiviteleri aras\u0131na gizlemeye \u00e7al\u0131\u015f\u0131yor.<\/p>\n<p>Di\u011fer bir deyi\u015fle, ana hedef, k\u00f6t\u00fc ama\u00e7l\u0131 aktivitelerinin tespit edilmesini zorla\u015ft\u0131rmak. Bu nedenle g\u00fcvenik uzmanlar\u0131 uzun zamand\u0131r potansiyel olarak g\u00fcvenli olmayan y\u00fcr\u00fct\u00fclebilir dosyalar\u0131, komut dosyalar\u0131n\u0131 ve kitapl\u0131klar\u0131 izliyorlar. Hatta <a href=\"https:\/\/github.com\/LOLBAS-Project\" target=\"_blank\" rel=\"noopener nofollow\">GitHub\u2019daki LOLBAS projesi<\/a> alt\u0131nda bir t\u00fcr kay\u0131t da tutuyorlar.<\/p>\n<p>[MDR placeholder] Kaspersky Y\u00f6netilen Tespit ve Yan\u0131t (MDR)[\/MDR placeholder] servisinde geni\u015f bir i\u015f alan\u0131 yelpazesindeki \u00e7ok say\u0131da \u015firketi koruyan meslekta\u015flar\u0131m\u0131z, ger\u00e7ek hayattaki sald\u0131r\u0131larda bu yakla\u015f\u0131m\u0131 s\u0131kl\u0131kla g\u00f6r\u00fcyorlar. <a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/07\/20155845\/MDR_Analyst_Report_Q4-2020.pdf\">Y\u00f6netilen Tespit ve Yan\u0131t Analist Raporu\u2019nda<\/a> modern i\u015fletmelere sald\u0131rmak i\u00e7in en s\u0131k kullan\u0131lan sistem bile\u015fenlerini incelediler. \u0130\u015fte ke\u015ffettikleri:<\/p>\n<h2>Alt\u0131n madalya PowerShell\u2019e<\/h2>\n<p>Komut sat\u0131r\u0131 aray\u00fcz\u00fcne sahip bir komut dosyas\u0131 dili ve yaz\u0131l\u0131m motoru olan PowerShell, Microsoft\u2019un daha g\u00fcvenli ve kontrol edilebilir hale getirme \u00e7abalar\u0131na ra\u011fmen a\u00e7\u0131k ara farkla siber su\u00e7lular aras\u0131nda en yayg\u0131n kullan\u0131lan me\u015fru ara\u00e7 oldu. MDR servisimiz taraf\u0131ndan tan\u0131mlanan olaylar\u0131n %3,3\u2019\u00fc, PowerShell\u2019i k\u00f6t\u00fcye kullanma te\u015febb\u00fcs\u00fc i\u00e7eriyordu. Dahas\u0131, anketi yaln\u0131zca kritik olaylara indirgedi\u011fimizde PowerShell\u2019in her be\u015f olaydan birinde (tam olarak %20,3\u2019\u00fcnde) parma\u011f\u0131 oldu\u011funu g\u00f6r\u00fcyoruz.<\/p>\n<h2>G\u00fcm\u00fc\u015f madalya rundll32.exe\u2019ye<\/h2>\n<p>\u0130kinci s\u0131rada, dinamik ba\u011flant\u0131 kitapl\u0131klar\u0131ndan (DLL\u2019lerden) kod \u00e7al\u0131\u015ft\u0131rmak i\u00e7in kullan\u0131lan rundll32 ana i\u015flemini g\u00f6r\u00fcyoruz. T\u00fcm olaylar\u0131n %2\u2019sine, kritik olaylar\u0131n %5,1\u2019ine kar\u0131\u015fm\u0131\u015f.<\/p>\n<h2>Bronz madalya birka\u00e7 yard\u0131mc\u0131 programa<\/h2>\n<p>T\u00fcm olaylar\u0131n %1,9\u2019unda ge\u00e7en be\u015f ara\u00e7 bulduk:<\/p>\n<ul>\n<li><strong>Test Authoring and Execution Framework\u2019\u00fcn bir par\u00e7as\u0131 olan te.exe,<\/strong><\/li>\n<li>Uzaktan sistemlerde i\u015flem y\u00fcr\u00fctmeye yarayan bir ara\u00e7 olan PsExec.exe,<\/li>\n<li>Sertifikasyon yetkililerinden bilgi almaya yarayan bir ara\u00e7 olan CertUtil.exe,<\/li>\n<li>Komut sat\u0131r\u0131ndan sistem kayd\u0131na anahtar eklemek ve de\u011fi\u015ftirmek i\u00e7in kullan\u0131labilen Microsoft Registry Console Tool, Reg.exe,<\/li>\n<li>Komut dosyas\u0131 dillerinde komut \u00e7al\u0131\u015ft\u0131rmak i\u00e7in tasarlanan Windows Script Host, wscript.exe<\/li>\n<\/ul>\n<p>Bu be\u015f y\u00fcr\u00fct\u00fclebilir dosya, kritik olaylar\u0131n %7,2\u2019sinde kullan\u0131lm\u0131\u015ft\u0131.<\/p>\n<p>Kaspersky MDR uzmanlar\u0131; msiexec.exe, remote.exe, atbrocker.exe, cscript.exe, netsh.exe, schtasks.exe, excel.exe, print.exe, mshta.exe, msbuild.exe , powerpnt.exe, dllhost.exe, regsvr32.exe, winword.exe, ve shell32.exe\u2019nin de kullan\u0131ld\u0131\u011f\u0131n\u0131 g\u00f6zlemledi.<\/p>\n<p>Y\u00f6netilen Tespit ve Yan\u0131t Analist Raporu\u2019ndan daha fazla sonu\u00e7 i\u00e7in <a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/07\/20155845\/MDR_Analyst_Report_Q4-2020.pdf\">buraya<\/a> bakabilirsiniz.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"mdr\">\n","protected":false},"excerpt":{"rendered":"<p>Siber sald\u0131r\u0131lar genelde yaln\u0131zca yayg\u0131n birka\u00e7 i\u015fletim sistemi bile\u015fenine dayan\u0131yor.  <\/p>\n","protected":false},"author":2581,"featured_media":10110,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194],"tags":[2480,2200,2307,113],"class_list":{"0":"post-10109","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"tag-lolbins","10":"tag-mdr","11":"tag-olaylar","12":"tag-windows"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/most-used-lolbins\/10109\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/most-used-lolbins\/23392\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/most-used-lolbins\/18861\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/most-used-lolbins\/25456\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/most-used-lolbins\/23525\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/most-used-lolbins\/22977\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/most-used-lolbins\/26092\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/most-used-lolbins\/25682\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/most-used-lolbins\/31557\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/most-used-lolbins\/42180\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/most-used-lolbins\/18302\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/most-used-lolbins\/15350\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/most-used-lolbins\/27489\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/most-used-lolbins\/27657\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/most-used-lolbins\/24393\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/most-used-lolbins\/29758\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/most-used-lolbins\/29554\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/windows\/","name":"windows"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10109","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2581"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=10109"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10109\/revisions"}],"predecessor-version":[{"id":10111,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10109\/revisions\/10111"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/10110"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=10109"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=10109"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=10109"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}