{"id":10139,"date":"2021-10-11T14:49:23","date_gmt":"2021-10-11T11:49:23","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=10139"},"modified":"2021-10-14T18:46:42","modified_gmt":"2021-10-14T15:46:42","slug":"what-is-spookjs","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/what-is-spookjs\/10139\/","title":{"rendered":"Spook.js, bir korku masal\u0131"},"content":{"rendered":"<p>Bakt\u0131\u011f\u0131n\u0131zda, kimlik av\u0131 sald\u0131r\u0131s\u0131n\u0131n bir mant\u0131\u011f\u0131 vard\u0131r: Bir ba\u011flant\u0131ya t\u0131klars\u0131n\u0131z, k\u00f6t\u00fc niyetli bir sayfaya gidersiniz, baz\u0131 bilgileri girersiniz ve bu bilgileriniz bir sald\u0131rgan taraf\u0131ndan \u00e7al\u0131n\u0131r. Peki bir de \u015funu d\u00fc\u015f\u00fcn\u00fcn: Bir ba\u011flant\u0131ya t\u0131kl\u0131yorsunuz ve verileriniz bir sald\u0131rgan taraf\u0131ndan \u00e7al\u0131n\u0131yor. Evet do\u011fru, bug\u00fcn, kurban\u0131n herhangi bir \u015fey yapmas\u0131na gerek kalmadan temel bir CPU \u00f6zelli\u011finden yararlanarak veri \u00e7alan k\u00f6t\u00fc ama\u00e7l\u0131 sayfalardan bahsediyoruz. Ve bu s\u00f6z konusu g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131n d\u00fczeltilmesi, imkans\u0131z de\u011filse bile olduk\u00e7a zor.<\/p>\n<p>2018\u2019de ara\u015ft\u0131rmac\u0131lar, Spectre g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131n ilk iki t\u00fcr\u00fcn\u00fc ortaya \u00e7\u0131kararak a\u00e7\u0131ktan faydalanman\u0131n teorik olarak m\u00fcmk\u00fcn oldu\u011funu kan\u0131tlad\u0131lar. \u00dc\u00e7 y\u0131l sonra, Eyl\u00fcl 2021\u2019de, Spectre v1.1\u2019in kullan\u0131ld\u0131\u011f\u0131 ger\u00e7ek hayattaki ilk sald\u0131r\u0131y\u0131 g\u00f6rd\u00fck. Spook.js olarak bilinen sald\u0131r\u0131 olduk\u00e7a karma\u015f\u0131k bir konsepte sahip olsa da elimizden geldi\u011fince bunu basitle\u015ftirmeye \u00e7al\u0131\u015faca\u011f\u0131z.<\/p>\n<h2>Spectre v1\u2019in ge\u00e7mi\u015fi<\/h2>\n<p>Bu aileye ait ilk iki sald\u0131r\u0131n\u0131n \u2014 Spectre ve Meltdown \u2014 haberi <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/two-severe-vulnerabilities-found-in-intels-hardware\/4586\/\" target=\"_blank\" rel=\"noopener\">2018\u2019de geldi<\/a>. Sald\u0131r\u0131lar, t\u00fcm modern CPU\u2019larda bulunan, komut y\u00fcr\u00fctmeyi h\u0131zland\u0131rmak i\u00e7in tasarlanm\u0131\u015f dallanma \u00f6ng\u00f6r\u00fcs\u00fc (branch prediction) mekanizmas\u0131ndan yararlan\u0131yordu.<\/p>\n<div id=\"attachment_10141\" style=\"width: 730px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-10141\" class=\"wp-image-10141 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2021\/10\/11143407\/what-is-spookjs-1.png\" alt=\"\" width=\"720\" height=\"380\"><p id=\"caption-attachment-10141\" class=\"wp-caption-text\">Spectre g\u00fcvenlik a\u00e7\u0131\u011f\u0131 logosu<\/p><\/div>\n<p>Bir kullan\u0131c\u0131, bir internet sitesinde oturum a\u00e7mak i\u00e7in parolas\u0131n\u0131 girdi\u011finde arkada, parola do\u011fruysa bir dizi komut, do\u011fru olmamas\u0131 durumunda ise ba\u015fka bir dizi komut y\u00fcr\u00fct\u00fcl\u00fcr. Bununla birlikte \u2014 dallanma \u00f6ng\u00f6r\u00fcs\u00fcn\u00fcn devreye girdi\u011fi yer tam da buras\u0131d\u0131r \u2014 do\u011fru olup olmad\u0131\u011f\u0131na ili\u015fkin geri d\u00f6n\u00fc\u015f almadan \u00f6nce CPU, b\u00fcy\u00fck olas\u0131l\u0131kla \u00e7al\u0131\u015ft\u0131rmas\u0131 gerekti\u011fini d\u00fc\u015f\u00fcnen komut setini y\u00fcr\u00fctmeye ba\u015flar.<\/p>\n<p>\u00d6rne\u011fimizde, parola daha \u00f6nce y\u00fczlerce kez do\u011fru girildiyse, CPU bu sefer de farkl\u0131 olmayaca\u011f\u0131n\u0131 varsayar. CPU\u2019nun \u00f6ng\u00f6r\u00fcs\u00fc do\u011fru \u00e7\u0131karsa, kullan\u0131c\u0131 bir performans art\u0131\u015f\u0131 sa\u011flam\u0131\u015f olur. Yanl\u0131\u015f \u00e7\u0131karsa da, CPU varsay\u0131msal olarak y\u00fcr\u00fct\u00fclen komutlar\u0131 atar ve di\u011fer komut setini \u00e7al\u0131\u015ft\u0131r\u0131r.<\/p>\n<p>Bir Spectre g\u00fcvenlik a\u00e7\u0131\u011f\u0131 sald\u0131r\u0131s\u0131nda, program\u0131n eri\u015fimi olmayan bir veri alan\u0131n\u0131 okuma giri\u015fiminde bulunulur. Sald\u0131r\u0131n\u0131n ilk a\u015famas\u0131nda, a\u00e7\u0131k eri\u015fim veri alanlar\u0131na \u00e7oklu \u00e7a\u011fr\u0131lar yap\u0131l\u0131r, bu sayede dallanma \u00f6ng\u00f6r\u00fc sistemi yasakl\u0131 okuma i\u015flemini de ger\u00e7ekle\u015ftirecek \u015fekilde \u201ce\u011fitilir\u201d. Dallanma \u00f6ng\u00f6r\u00fcs\u00fc kullan\u0131larak CPU, ger\u00e7ekten okumas\u0131na izin verilen verileri okumak isteyen programa al\u0131\u015fk\u0131n oldu\u011fu i\u00e7in i\u015flemi \u00f6nceden ger\u00e7ekle\u015ftirir. Ancak yap\u0131lan bir kontrol, program\u0131n verilere eri\u015fiminin yasak oldu\u011funu ortaya \u00e7\u0131kar\u0131r ve bunun sonucunda varsay\u0131msal olarak y\u00fcr\u00fct\u00fclen hesaplamalar at\u0131l\u0131r. Buraya kadar her \u015fey yolunda \u2014 ancak CPU taraf\u0131ndan okunan veriler bir s\u00fcre CPU\u2019nun kendi belle\u011fi olan \u00f6nbellekte saklanmaya devam eder.<\/p>\n<p>\u0130\u015fin ilgin\u00e7 k\u0131sm\u0131 da bundan sonra ba\u015flar: CPU\u2019nun \u00f6nbelle\u011finden gizli verileri do\u011frudan okuman\u0131n hi\u00e7bir yolu olmad\u0131\u011f\u0131ndan, k\u00f6t\u00fc niyetli s\u00fcre\u00e7, bu verileri \u00e7almak i\u00e7in yan kanal sald\u0131r\u0131s\u0131(side-channel attack) ad\u0131 verilen bir sald\u0131r\u0131 ba\u015flat\u0131r. Bu sald\u0131r\u0131da belirli bilgilere eri\u015fim h\u0131z\u0131 \u00f6l\u00e7\u00fcl\u00fcr. Veri g\u00f6rece olarak k\u00fc\u00e7\u00fckse, bu, verilerin \u00f6nbellekte tutuldu\u011fu anlam\u0131na gelir. B\u00fcy\u00fckse, normal RAM\u2019den y\u00fcklenir. Bir dizi okuma denemesi, gizli bilgilerin s\u0131zmas\u0131na neden olur.<\/p>\n<p>Sonu\u00e7 olarak ya\u015fanan, tek \u00e7\u00f6z\u00fcm\u00fc dallanma \u00f6ng\u00fcr\u00fcs\u00fcn\u00fcn tamamen devre d\u0131\u015f\u0131 b\u0131rak\u0131lmas\u0131 olan ve dolay\u0131s\u0131yla performans\u0131 ciddi \u015fekilde etkileyen temel bir CPU hatas\u0131d\u0131r. Bununla birlikte, Spectre sald\u0131r\u0131lar\u0131nda:<\/p>\n<ul>\n<li>Sald\u0131rgan\u0131n, hedef bilgisayarda veya mobil cihazda program kodunu \u00e7al\u0131\u015ft\u0131rabilmesi,<\/li>\n<li>Sald\u0131r\u0131n\u0131n, ba\u015far\u0131l\u0131 bir sald\u0131r\u0131 i\u00e7in gereken ko\u015fullar\u0131 olu\u015fturacak \u015fekilde kodlanm\u0131\u015f belirli bir hedef programa sahip olmas\u0131,<\/li>\n<li>Sald\u0131r\u0131 ba\u015far\u0131l\u0131 bir \u015fekilde ger\u00e7ekle\u015ftirilmi\u015f olsa bile, verinin \u00e7\u0131kar\u0131lmas\u0131n\u0131n olduk\u00e7a yava\u015f (saniyede onlarca veya y\u00fczlerce bayt) ve okuma hatalar\u0131n\u0131n imkans\u0131z olmaktan \u00e7ok uzak olmas\u0131,<\/li>\n<li>Genel olarak, parolalar, \u015fifreleme anahtarlar\u0131 vb. gibi ele ge\u00e7irilmesi ama\u00e7lanan gizli verilerin \u00e7al\u0131nmas\u0131n\u0131n bir dizi ko\u015fula ba\u011fl\u0131 olmas\u0131 gibi s\u0131n\u0131rlamalar s\u00f6z konusudur.<\/li>\n<\/ul>\n<h2>Spook.js \u2014 Spectre v1\u2019in ger\u00e7ek hayattaki uygulamas\u0131<\/h2>\n<p>Spectre\u2019nin o kadar da tehlikeli olmad\u0131\u011f\u0131 sonucuna varabiliriz. Sonu\u00e7ta, bir sald\u0131rgan hedef bilgisayarda kod \u00e7al\u0131\u015ft\u0131rabiliyorsa, ayr\u0131cal\u0131klar\u0131 y\u00fckseltmek ve verileri \u00e7almak i\u00e7in i\u015fletim sistemindeki veya y\u00fckl\u00fc programlardaki \u00e7ok say\u0131daki g\u00fcvenlik a\u00e7\u0131\u011f\u0131ndan birini kullanmak sald\u0131rgan a\u00e7\u0131s\u0131ndan \u00e7ok daha kolay bir tercih olurdu.<\/p>\n<p>Bu do\u011fru olsa da g\u00fcn\u00fcm\u00fcz web sayfalar\u0131nda, kullan\u0131c\u0131n\u0131n bilgisayar\u0131nda ve taray\u0131c\u0131da y\u00fcr\u00fct\u00fclen b\u00fcy\u00fck miktarda program kodu yer al\u0131yor. Spook.js sald\u0131r\u0131lar\u0131 da Spectre v1 g\u00fcvenlik a\u00e7\u0131\u011f\u0131ndan bu \u015fekilde yararlan\u0131yor: Vir\u00fcsl\u00fc bir sayfa y\u00fckleniyor, taray\u0131c\u0131 kodu y\u00fcr\u00fct\u00fcyor ve siber su\u00e7lu gizli verileri \u00e7al\u0131yor.<\/p>\n<p><a href=\"https:\/\/www.spookjs.com\/\" target=\"_blank\" rel=\"noopener nofollow\">Raporu<\/a> haz\u0131rlayanlar uygulanabilir baz\u0131 sald\u0131r\u0131lar\u0131 g\u00f6sterdiler. \u0130lk \u00f6nce Tumblr\u2019dan bir kullan\u0131c\u0131 parolas\u0131n\u0131 \u00e7ald\u0131lar. Ard\u0131ndan, Lastpass\u2019tan veri \u00e7ald\u0131lar. \u00dc\u00e7\u00fcnc\u00fc olarak da bir Google sunucusundaki \u00f6zel depolama alan\u0131ndan, kullan\u0131c\u0131 taraf\u0131ndan y\u00fcklenen bir g\u00f6rseli ele ge\u00e7irdiler.<\/p>\n<p>Bunlar\u0131n hepsi, Google Chrome taray\u0131c\u0131s\u0131ndaki bir \u00f6zellik sayesinde m\u00fcmk\u00fcn oluyordu. Spectre ile ilgili bilgilerin yay\u0131nlanmas\u0131n\u0131n ard\u0131ndan Chrome\u2019un geli\u015ftiricileri, internet sitelerinin izole edilmi\u015f \u015fekilde y\u00fcklenmesini mecbur k\u0131larak olas\u0131 sald\u0131r\u0131lar\u0131 \u00f6nlemeye y\u00f6nelik \u00f6nlemler ald\u0131. B\u00f6ylece her bir internet sitesi kendi s\u00fcrecini olu\u015fturdu\u011fundan, bir sayfadaki k\u00f6t\u00fc ama\u00e7l\u0131 kodun, ba\u015fka bir kaynaktan veri \u00e7almak i\u00e7in kullan\u0131lmas\u0131 m\u00fcmk\u00fcn olmuyor. Ancak bunun da bir istisnas\u0131 bulunuyor: Ayn\u0131 sitedeki veya alan ad\u0131ndaki birden \u00e7ok sayfa, ortak bir taray\u0131c\u0131 i\u015fleminde grupland\u0131r\u0131ld\u0131\u011f\u0131 i\u00e7in bunlardan birinde k\u00f6t\u00fc ama\u00e7l\u0131 kod (kod JavaScript ile yaz\u0131ld\u0131\u011f\u0131 i\u00e7in sald\u0131r\u0131n ad\u0131nda .js bulunuyor) \u00e7al\u0131\u015ft\u0131r\u0131ld\u0131\u011f\u0131nda, di\u011fer sayfalardaki veriler \u00e7al\u0131nabiliyor.<\/p>\n<h3>Tumblr\u2019daki Spectre.js sald\u0131r\u0131s\u0131<\/h3>\n<p>Kolektif bir blog olan Tumblr\u2019da k\u00f6t\u00fc ama\u00e7l\u0131 kod bar\u0131nd\u0131rmak, en az\u0131ndan teoride m\u00fcmk\u00fcn. Bu \u015fekilde, bir sekmede a\u00e7\u0131k olan k\u00f6t\u00fc ama\u00e7l\u0131 bir sayfayla birlikte, bir kullan\u0131c\u0131n\u0131n ba\u015fka bir sekmede Tumblr hesab\u0131na giri\u015f yapmaya \u00e7al\u0131\u015fmas\u0131 halinde, taray\u0131c\u0131 kullan\u0131c\u0131 ad\u0131n\u0131 ve parolas\u0131n\u0131 kaydeder ve otomatik olarak doldurur \u2014 k\u00f6t\u00fc ama\u00e7l\u0131 kod daha sonra bu bilgileri \u00e7alabilir.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/bP9Hquj5PH4?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<p>Bir sald\u0131r\u0131, Spectre g\u00fcvenlik a\u00e7\u0131\u011f\u0131ndan yararlanarak, ayn\u0131 siteye ait ba\u015fka bir sekmeyle y\u00fczeysel olarak etkile\u015fime girebilir ve dolayl\u0131 yollarla veri \u00e7alabilir. Bu yakla\u015f\u0131m ile ger\u00e7ekle\u015ftirilen ba\u015far\u0131l\u0131 bir sald\u0131r\u0131, neredeyse ard\u0131nda hi\u00e7 iz b\u0131rakmaz.<\/p>\n<h3>LastPass\u201dteki Specter.js sald\u0131r\u0131s\u0131<\/h3>\n<p>LastPass parola y\u00f6neticisine y\u00f6nelik ger\u00e7ekle\u015ftirilen sald\u0131r\u0131, Spectre v1 kullanan veri \u00e7alma kodunun Google Chrome\u2019daki k\u00f6t\u00fc ama\u00e7l\u0131 bir uzant\u0131ya yerle\u015ftirilmi\u015f olmas\u0131 bak\u0131m\u0131ndan di\u011ferlerinden ayr\u0131l\u0131yordu. Taray\u0131c\u0131da LastPass uzant\u0131s\u0131 da \u00e7al\u0131\u015f\u0131yordu ve baz\u0131 durumlarda, uzant\u0131lar da ortak bir taray\u0131c\u0131 i\u015fleminde y\u00fcr\u00fct\u00fcl\u00fcr, bu da veri h\u0131rs\u0131zl\u0131\u011f\u0131n\u0131 m\u00fcmk\u00fcn k\u0131lar.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/yz_s4k1zGwA?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<h3>Google Cloud Storage\u2019daki Spectre.js sald\u0131r\u0131s\u0131<\/h3>\n<p>Google\u2019\u0131n bulut depolama alan\u0131na yap\u0131lan sald\u0131r\u0131lara ili\u015fkin \u00f6rnekte ise; bir taray\u0131c\u0131 sekmesinde sites.google.com\u2019da bar\u0131nd\u0131r\u0131lan k\u00f6t\u00fc ama\u00e7l\u0131 bir sayfa yer al\u0131rken, di\u011fer sekmede kullan\u0131c\u0131lar\u0131n, G Suite hizmetindeki \u00f6zel depolama alanlar\u0131na g\u00f6r\u00fcnt\u00fc dosyalar\u0131 y\u00fcklemeleri sa\u011flan\u0131yordu. Bu senaryoda sald\u0131rgan, k\u00f6t\u00fc ama\u00e7l\u0131 kodu kullanarak kullan\u0131c\u0131lar\u0131n y\u00fckledi\u011fi g\u00f6r\u00fcnt\u00fc dosyalar\u0131na eri\u015fme imkan\u0131na sahip oluyor.<\/p>\n<div id=\"attachment_10142\" style=\"width: 502px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-10142\" class=\"wp-image-10142 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2021\/10\/11143523\/what-is-spookjs-2.png\" alt=\"\" width=\"492\" height=\"216\"><p id=\"caption-attachment-10142\" class=\"wp-caption-text\">Orijinal g\u00f6rsel (solda) ve bir Spook.js sald\u0131r\u0131s\u0131 kullan\u0131larak Google bulut depolama alan\u0131ndan \u00e7al\u0131nan g\u00f6rsel. <a href=\"https:\/\/www.spookjs.com\/files\/spook-js.pdf\" target=\"_blank\" rel=\"noopener nofollow\">Kaynak<\/a><\/p><\/div>\n<p>\u00a0<\/p>\n<h2>Y\u00f6nteme ili\u015fkin s\u0131n\u0131rlamalar<\/h2>\n<p>Ara\u015ft\u0131rmac\u0131lar, Intel\u2019in g\u00fcncel bir ka\u00e7 i\u015flemcisi ile yeni ARM tabanl\u0131 Apple M1 de dahil olmak \u00fczere farkl\u0131 CPU\u2019larda sald\u0131r\u0131n\u0131n nas\u0131l ger\u00e7ekle\u015ftirilebilece\u011fini g\u00f6sterdiler. T\u00fcm hepsinde sald\u0131r\u0131lar, Google Chrome\u2019da ger\u00e7ekle\u015ftirildi. Temelde Spook.js sald\u0131r\u0131s\u0131n\u0131n ger\u00e7ekle\u015ftirilebilmesini sa\u011flayan \u015fey, taray\u0131c\u0131n\u0131n sahip oldu\u011fu e\u015fsiz birka\u00e7 \u00f6zellik oldu\u011fu i\u00e7in bu durum, Microsoft Edge gibi di\u011fer Chromium tabanl\u0131 taray\u0131c\u0131lar\u0131 da sald\u0131r\u0131ya a\u00e7\u0131k getiriyor.<\/p>\n<p>Bununla birlikte sald\u0131r\u0131 baz\u0131 s\u0131n\u0131rlamalara sahip. Birincisi, veri h\u0131rs\u0131zl\u0131\u011f\u0131ndaki d\u00fc\u015f\u00fck h\u0131z (CPU\u2019ya ba\u011fl\u0131 olarak saniyede 400-600 bayt), bu nedenle son g\u00f6sterilen \u00f6rnekteki hedef dosya olduk\u00e7a k\u00fc\u00e7\u00fck boyuta sahip. \u0130kincisi ise, CPU \u00f6nbelle\u011finden veri \u00e7alarken \u00e7ok say\u0131da hatan\u0131n ortaya \u00e7\u0131kmas\u0131. Verilerde %4\u2019e varan oranda hata ile kar\u015f\u0131la\u015fmak m\u00fcmk\u00fcn; ki bu da \u00e7al\u0131nan g\u00f6r\u00fcnt\u00fcde bozulmalar olu\u015fmas\u0131na neden oluyor.<\/p>\n<p>Sald\u0131r\u0131, AMD i\u015flemcilerde veya JavaScript motoru farkl\u0131 \u00e7al\u0131\u015fan Mozilla Firefox\u2019ta i\u015fe yaram\u0131yor. Ara\u015ft\u0131rmac\u0131lar, AMD \u00e7iplerine ve Firefox taray\u0131c\u0131s\u0131na y\u00f6nelik ba\u015far\u0131l\u0131 bir sald\u0131r\u0131 olas\u0131l\u0131\u011f\u0131n\u0131 tamamen g\u00f6z ard\u0131 etmemekle birlikte bunun i\u00e7in daha fazla \u00e7aba harcamak gerekti\u011fini do\u011fruluyorlar.<\/p>\n<p>Son olarak, bir sald\u0131r\u0131n\u0131n ger\u00e7ekle\u015ftirilebilmesi i\u00e7in kolektif blog veya dosya bar\u0131nd\u0131rma \u00f6rne\u011finde oldu\u011fu gibi, ayn\u0131 alan ad\u0131na sahip bir sayfaya k\u00f6t\u00fc ama\u00e7l\u0131 kod y\u00fcklenmesi gerekiyor. Y\u00f6ntemin bir bankan\u0131n internet sitesinde uygulanmas\u0131 \u00e7ok da m\u00fcmk\u00fcn g\u00f6r\u00fcnm\u00fcyor.<\/p>\n<h2>Pani\u011fe gerek yok<\/h2>\n<p>Ara\u015ft\u0131rmac\u0131lar\u0131n, ilk kez Spectre g\u00fcvenlik a\u00e7\u0131klar\u0131ndan birinin kullan\u0131lmas\u0131na ili\u015fkin olduk\u00e7a ger\u00e7ek\u00e7i bir senaryoyu ortaya koymas\u0131 nedeniyle Spook.js konusunda y\u00fcr\u00fct\u00fclen \u00e7al\u0131\u015fma olduk\u00e7a b\u00fcy\u00fck \u00f6nem arz ediyor. Bununla birlikte, ger\u00e7ek hayatta b\u00f6yle bir sald\u0131r\u0131 ya\u015fanmas\u0131 da d\u00fc\u015f\u00fck bir olas\u0131l\u0131k. Birincisi, bu ara\u015ft\u0131rman\u0131n ard\u0131ndan Google Chrome geli\u015ftiricileri, y\u00fcklenen siteleri izole etme mekanizmas\u0131n\u0131 g\u00fc\u00e7lendirdiler. \u0130kincisi ise siber su\u00e7lular\u0131n bu y\u00f6ntemi kullanabilmek i\u00e7in modern CPU\u2019lar\u0131n d\u00fc\u015f\u00fck seviye \u00e7al\u0131\u015fmalar\u0131 (low-level) hakk\u0131nda ciddi bilgi sahibi olmas\u0131 gerekirken, kullan\u0131c\u0131 verilerini \u00e7alma konusunda geleneksel k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlardan sosyal m\u00fchendisli\u011fe kadar \u00e7ok daha kolay y\u00f6ntemler mevcut.<\/p>\n<p>Bilimsel bir \u00e7al\u0131\u015fma olarak Spook.js, internet sitesi g\u00fcvenli\u011fi konusunda sundu\u011fu yeni \u00f6nerilerle (\u00f6rne\u011fin, raporu yazanlar yetkilendirme sayfalar\u0131n\u0131n ayr\u0131 bir alan ad\u0131na ta\u015f\u0131nmas\u0131n\u0131 \u00f6neriyor) yaz\u0131l\u0131m ortam\u0131nda de\u011fi\u015fikli\u011fe neden oldu. Sonraki \u00e7al\u0131\u015fmalarda, sald\u0131r\u0131lar\u0131 biraz daha kolayla\u015ft\u0131racak y\u00f6ntemler ortaya \u00e7\u0131kabilecek olsa da bu y\u00f6ntemler, b\u00fcy\u00fck olas\u0131l\u0131kla g\u00fcvenli\u011fin daha fazla geli\u015fmesini sa\u011flayacakt\u0131r. Spectre tipi g\u00fcvenlik a\u00e7\u0131klar\u0131ndan toplu olarak yararlanmak m\u00fcmk\u00fcn olsa bile, koruma ara\u00e7lar\u0131 her bir k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m i\u00e7in ayn\u0131 kalmaya devam eder. G\u00fcvenlik \u00fcr\u00fcnleri \u00fcreticilerinin yapaca\u011f\u0131 \u015fey, y\u00fcr\u00fct\u00fclmeden \u00f6nce izlenecek ve engellenecekler listesine yeni sald\u0131r\u0131 t\u00fcrlerini eklemektir.<\/p>\n<p>Ara\u015ft\u0131rmac\u0131lar\u0131n bir g\u00fcn, Spectre benzeri g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131n t\u00fcm modern BT ekosisteminde b\u00fcy\u00fck bir \u00e7al\u0131\u015fma y\u00fcr\u00fct\u00fclmesini gerektirecek bir \u00f6zelli\u011fine rastlamalar\u0131 da m\u00fcmk\u00fcn. Ancak \u015fimdilik bu pek olas\u0131 g\u00f6r\u00fcnm\u00fcyor. Bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131n teoriden uygulanabilir bir sald\u0131r\u0131 a\u015famas\u0131na (ve bu durumda bile, bir\u00e7ok s\u0131n\u0131rlamaya sahip bir sald\u0131r\u0131) gelmesinin \u00fc\u00e7 y\u0131l s\u00fcrd\u00fc\u011f\u00fcn\u00fc unutmayal\u0131m.<\/p>\n<p>Spectre ayr\u0131ca, \u00e7al\u0131nan verilerden elde edilecek potansiyel faydan\u0131n operasyon maliyetlerini a\u015ft\u0131\u011f\u0131 hedefli sald\u0131r\u0131lar i\u00e7in de kullan\u0131labilir. Bu senaryo i\u015fletmenize ba\u011fl\u0131 olsa bile farkl\u0131 i\u00e7erikler i\u00e7in farkl\u0131 taray\u0131c\u0131lar kullanarak bu sald\u0131r\u0131lar\u0131 basit\u00e7e zorla\u015ft\u0131rabilirsiniz. \u00d6rne\u011fin, hassas bilgiler i\u00e7eren sayfalar\u0131 ve web hizmetlerini \u00e7evrimi\u00e7i e\u011flence i\u00e7in kulland\u0131\u011f\u0131n\u0131z taray\u0131c\u0131da a\u00e7may\u0131n. Tercihen, gizli bilgileri yal\u0131t\u0131lm\u0131\u015f bir ortamda, sanal bir makinede veya ayr\u0131 bir ayg\u0131tta i\u015fleyin.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksc\">\n","protected":false},"excerpt":{"rendered":"<p>Spectre tabanl\u0131 ilk uygulanabilir sald\u0131r\u0131 olan Spook.js nas\u0131l ger\u00e7ekle\u015ftiriliyor?<\/p>\n","protected":false},"author":665,"featured_media":10140,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1351],"tags":[16,22,790,1109,1505,2484],"class_list":{"0":"post-10139","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-chrome","9":"tag-google","10":"tag-guvenlik-aciklari","11":"tag-saldirilar","12":"tag-spectre","13":"tag-spook-js"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/what-is-spookjs\/10139\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/what-is-spookjs\/23412\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/what-is-spookjs\/18890\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/what-is-spookjs\/9481\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/what-is-spookjs\/25477\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/what-is-spookjs\/23554\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/what-is-spookjs\/22989\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/what-is-spookjs\/26107\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/what-is-spookjs\/25703\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/what-is-spookjs\/31583\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/what-is-spookjs\/42202\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/what-is-spookjs\/17812\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/what-is-spookjs\/18218\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/what-is-spookjs\/27503\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/what-is-spookjs\/31722\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/what-is-spookjs\/27672\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/what-is-spookjs\/24395\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/what-is-spookjs\/29770\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/what-is-spookjs\/29565\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/guvenlik-aciklari\/","name":"g\u00fcvenlik a\u00e7\u0131klar\u0131"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10139","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/665"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=10139"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10139\/revisions"}],"predecessor-version":[{"id":10163,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10139\/revisions\/10163"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/10140"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=10139"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=10139"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=10139"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}