{"id":13932,"date":"2025-11-03T20:11:33","date_gmt":"2025-11-03T17:11:33","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=13932"},"modified":"2025-11-03T20:11:33","modified_gmt":"2025-11-03T17:11:33","slug":"wiretap-battering-ram-tee-attacks","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/wiretap-battering-ram-tee-attacks\/13932\/","title":{"rendered":"Sunucu altyap\u0131s\u0131nda TEE&#8217;leri hacklemek"},"content":{"rendered":"<p>Modern sunucu i\u015flemcileri, \u00f6zellikle hassas bilgileri i\u015flemek i\u00e7in <a href=\"https:\/\/en.wikipedia.org\/wiki\/Trusted_execution_environment\" target=\"_blank\" rel=\"noopener nofollow\">g\u00fcvenilir y\u00fcr\u00fctme ortam\u0131<\/a> (TEE) \u00f6zelli\u011fine sahiptir. Bir\u00e7ok TEE uygulamas\u0131 vard\u0131r, ancak bu tart\u0131\u015fma ile en alakal\u0131 olan ikisi \u015f\u00f6yledir: Intel Software Guard eXtensions (SGX) ve AMD Secure Encrypted Virtualization (SEV). Neredeyse ayn\u0131 anda, biri ABD\u2019de, di\u011feri Avrupa\u2019da bulunan iki ayr\u0131 ara\u015ft\u0131rma ekibi, bu iki uygulamay\u0131 k\u00f6t\u00fcye kullanmak i\u00e7in birbirine \u00e7ok benzer (ancak farkl\u0131) y\u00f6ntemler ke\u015ffetti. Ama\u00e7lar\u0131, rastgele eri\u015fim belle\u011finde tutulan \u015fifrelenmi\u015f verilere eri\u015fim sa\u011flamakt\u0131. Bu sonu\u00e7lar\u0131n ayr\u0131nt\u0131lar\u0131n\u0131 anlatan bilimsel makaleler birka\u00e7 g\u00fcn arayla yay\u0131nland\u0131:<\/p>\n<ul>\n<li><a href=\"https:\/\/wiretap.fail\/\" target=\"_blank\" rel=\"noopener nofollow\">WireTap: DRAM Veri Yolu Interposition y\u00f6ntemiyle Sunucu SGX\u2019i K\u0131rmak<\/a>, Intel Software Guard eXtensions (SGX) sisteminin ba\u015far\u0131l\u0131 bir \u015fekilde hacklenmesini ayr\u0131nt\u0131larla anlatan ABD\u2019li ara\u015ft\u0131rmac\u0131lar\u0131n \u00e7al\u0131\u015fmas\u0131d\u0131r. Bunu, i\u015flemci ile DDR4 RAM mod\u00fcl\u00fc aras\u0131ndaki veri al\u0131\u015fveri\u015fini keserek ba\u015fard\u0131lar.<\/li>\n<li><a href=\"https:\/\/batteringram.eu\/\" target=\"_blank\" rel=\"noopener nofollow\">Battering RAM<\/a>\u2018de, Bel\u00e7ika ve Birle\u015fik Krall\u0131k\u2019tan bilim adamlar\u0131, i\u015flemci ile DDR4 RAM mod\u00fcl\u00fc aras\u0131ndaki veri aktar\u0131m s\u00fcrecini manip\u00fcle ederek Intel SGX\u2019i ve AMD\u2019nin benzer g\u00fcvenlik sistemi SEV-SNP\u2019yi de ba\u015far\u0131yla ele ge\u00e7irdiler.<\/li>\n<\/ul>\n<h2>Bir TEE\u2019yi Hacklemek<\/h2>\n<p>Bahsedilen teknolojilerin her ikisi de (Intel SGX ve AMD SEV), sistem tamamen tehlikeye girse bile verileri koruyacak \u015fekilde tasarlanm\u0131\u015ft\u0131r. Bu nedenle, ara\u015ft\u0131rmac\u0131lar sald\u0131rgan\u0131n; sunucunun yaz\u0131l\u0131m ve donan\u0131m\u0131na tam eri\u015fim ve arad\u0131klar\u0131 gizli verilere, \u00f6rne\u011fin o sunucuda \u00e7al\u0131\u015fan bir sanal makinede bulunan verilere tam eri\u015fim gibi tam hareket \u00f6zg\u00fcrl\u00fc\u011f\u00fcne sahip olaca\u011f\u0131 varsay\u0131m\u0131ndan yola \u00e7\u0131kt\u0131lar.<\/p>\n<p>Bu senaryoda, Intel SGX ve AMD SEV\u2019nin belirli s\u0131n\u0131rlamalar\u0131 kritik hale gelir. Bunun bir \u00f6rne\u011fi, belirli bir girdi veri dizisinin her zaman tam olarak ayn\u0131 \u015fifrelenmi\u015f \u00e7\u0131kt\u0131 veri dizisini \u00fcretti\u011fi bir algoritma \u00a0olan deterministik \u015fifrelemenin kullan\u0131lmas\u0131d\u0131r. Sald\u0131rgan yaz\u0131l\u0131ma tam eri\u015fime sahip oldu\u011fundan, TEE\u2019ye rastgele veriler girebilir. Sald\u0131rgan, \u015fifrelenmi\u015f bilgilere de eri\u015febiliyorsa, bu iki veri setini kar\u015f\u0131la\u015ft\u0131rarak kullan\u0131lan \u00f6zel anahtar\u0131 hesaplayabilir. Bu da, ayn\u0131 mekanizma ile \u015fifrelenmi\u015f di\u011fer verileri de\u015fifre etmelerini sa\u011flayacakt\u0131r.<\/p>\n<p>Ancak zorluk, \u015fifrelenmi\u015f verileri nas\u0131l okuyaca\u011f\u0131m\u0131zd\u0131r. Bu veriler RAM\u2019de bulunur ve yaln\u0131zca i\u015flemci onlara do\u011frudan eri\u015febilir. Teorik k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m, bellekte \u015fifrelenmeden \u00f6nce yaln\u0131zca orijinal bilgileri g\u00f6r\u00fcr. Bu, ara\u015ft\u0131rmac\u0131lar\u0131n farkl\u0131 yakla\u015f\u0131mlarla ele ald\u0131klar\u0131 ana zorluktur. Basit ve do\u011frudan bir \u00e7\u00f6z\u00fcm, <em>i\u015flemciden RAM mod\u00fcl\u00fcne aktar\u0131lan verilerin donan\u0131m d\u00fczeyinde yakalanmas\u0131d\u0131r<\/em>.<\/p>\n<p>Nas\u0131l \u00e7al\u0131\u015f\u0131yor? Bellek mod\u00fcl\u00fc \u00e7\u0131kar\u0131l\u0131r ve ard\u0131ndan bir ara par\u00e7a kullan\u0131larak yeniden tak\u0131l\u0131r. Bu ara par\u00e7a da \u00f6zel bir cihaza, yani bir mant\u0131k analiz\u00f6r\u00fcne ba\u011flan\u0131r. Mant\u0131k analiz\u00f6r\u00fc, t\u00fcm veri ve adres hatlar\u0131 \u00fczerinden bellek mod\u00fcl\u00fcne giden veri ak\u0131\u015flar\u0131n\u0131 yakalar. Bu olduk\u00e7a karma\u015f\u0131kt\u0131r. Bir sunucu genellikle bir\u00e7ok bellek mod\u00fcl\u00fcne sahiptir, bu nedenle sald\u0131rgan, i\u015flemciyi hedef bilgileri \u00f6zellikle istenen aral\u0131\u011fa yazmaya zorlaman\u0131n bir yolunu bulmal\u0131d\u0131r. Ard\u0131ndan, mant\u0131k analiz\u00f6r\u00fc taraf\u0131ndan yakalanan ham veriler yeniden yap\u0131land\u0131r\u0131lmal\u0131 ve analiz edilmelidir.<\/p>\n<p>Ancak sorunlar burada bitmez. Modern bellek mod\u00fclleri, i\u015flemciyle muazzam h\u0131zlarda veri al\u0131\u015fveri\u015fi yaparak saniyede milyarlarca i\u015flem ger\u00e7ekle\u015ftirir. Bu kadar y\u00fcksek h\u0131zl\u0131 bir veri ak\u0131\u015f\u0131n\u0131 kesmek i\u00e7in \u00fcst d\u00fczey ekipman gerekir. 2021 y\u0131l\u0131nda bu t\u00fcr sald\u0131r\u0131lar\u0131n uygulanabilirli\u011fini <a href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/lee-dayeol\" target=\"_blank\" rel=\"noopener nofollow\">kan\u0131tlamak<\/a> i\u00e7in kullan\u0131lan donan\u0131m, y\u00fcz binlerce dolara mal oldu.<\/p>\n<h2>WireTap\u2019in \u00f6zellikleri<\/h2>\n<p>WireTap\u2019in arkas\u0131ndaki ABD\u2019li ara\u015ft\u0131rmac\u0131lar, hackleme maliyetini bin dolar\u0131n biraz alt\u0131na d\u00fc\u015f\u00fcrmeyi ba\u015fard\u0131lar. DDR4 bellek mod\u00fcl\u00fcnden veri yakalamak i\u00e7in kurduklar\u0131 sistem \u015f\u00f6yleydi:<\/p>\n<div id=\"attachment_13937\" style=\"width: 2010px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2025\/11\/03195612\/wiretap-battering-ram-tee-attacks-wiretap.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-13937\" class=\"wp-image-13937 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2025\/11\/03195612\/wiretap-battering-ram-tee-attacks-wiretap.jpg\" alt=\"WireTap ve Battering RAM: TEE'lere y\u00f6nelik sald\u0131r\u0131lar \" width=\"2000\" height=\"920\"><\/a><p id=\"caption-attachment-13937\" class=\"wp-caption-text\">\u0130\u015flemci ve bellek mod\u00fcl\u00fc aras\u0131ndaki veri al\u0131\u015fveri\u015fini kesmek i\u00e7in test sistemi <a href=\"https:\/\/wiretap.fail\/\" target=\"_blank\" rel=\"noopener nofollow\">Kaynak<\/a><\/p><\/div>\n<p>B\u00fct\u00e7enin yar\u0131s\u0131n\u0131, \u00e7evrimi\u00e7i bir a\u00e7\u0131k art\u0131rmada sat\u0131n ald\u0131klar\u0131, \u00e7eyrek as\u0131rl\u0131k eski bir mant\u0131k analiz cihaz\u0131na harcad\u0131lar. Kalan k\u0131s\u0131m gerekli konekt\u00f6rleri kaps\u0131yordu ve ara par\u00e7a (hedef bellek mod\u00fcl\u00fcn\u00fcn tak\u0131ld\u0131\u011f\u0131 adapt\u00f6r) yazarlar taraf\u0131ndan \u00f6zel olarak lehimlenmi\u015fti. B\u00f6yle eski bir kurulum, veri ak\u0131\u015f\u0131n\u0131 normal h\u0131z\u0131nda yakalayamaz. Ancak ara\u015ft\u0131rmac\u0131lar \u00f6nemli bir ke\u015fif yapt\u0131lar: Bellek mod\u00fcl\u00fcn\u00fcn \u00e7al\u0131\u015fmas\u0131n\u0131 yava\u015flatabildiler. Standart DDR4\u2019\u00fcn 1600 ila 3200 megahertzlik etkin h\u0131zlar\u0131 yerine, h\u0131z\u0131 1333 megahertz\u2019e d\u00fc\u015f\u00fcrmeyi ba\u015fard\u0131lar.<\/p>\n<p>Buradan sonraki ad\u0131mlar pek basit olmasa da yeterince a\u00e7\u0131k:<\/p>\n<ol>\n<li>Hedef i\u015flemden gelen verilerin hacklenmi\u015f bellek mod\u00fcl\u00fcne yaz\u0131ld\u0131\u011f\u0131ndan emin olun ve ard\u0131ndan bu a\u015famada hala \u015fifreli olan verileri yakalay\u0131n.<\/li>\n<li>\u015eifreleme i\u00e7in Intel SGX\u2019e \u00f6zel bir veri k\u00fcmesi girin.<\/li>\n<li>Bilinen verilerin \u015fifrelenmi\u015f halini yakalay\u0131n, bilinen d\u00fcz metni elde edilen \u015fifreli metinle kar\u015f\u0131la\u015ft\u0131r\u0131n ve \u015fifreleme anahtar\u0131n\u0131 hesaplay\u0131n.<\/li>\n<li>Hedef s\u00fcrece ait \u00f6nceden yakalanan verilerin \u015fifresini \u00e7\u00f6z\u00fcn.<\/li>\n<\/ol>\n<p>\u00d6zetle, WireTap \u00e7al\u0131\u015fmas\u0131 Intel SGX\u2019in do\u011fas\u0131nda var olan s\u0131n\u0131rlamalar hakk\u0131ndaki anlay\u0131\u015f\u0131m\u0131z\u0131 temelden de\u011fi\u015ftiremese de sald\u0131r\u0131n\u0131n \u00e7ok daha ucuza ger\u00e7ekle\u015ftirilebilece\u011fini g\u00f6stermektedir.<\/p>\n<h2>Battering RAM\u2019in \u00f6zellikleri<\/h2>\n<p>Bel\u00e7ika\u2019n\u0131n KU Leuven \u00dcniversitesi\u2019nden ara\u015ft\u0131rmac\u0131lar ve \u0130ngiliz meslekta\u015flar\u0131, basit veri ele ge\u00e7irme yakla\u015f\u0131m\u0131 yerine, \u015fifrelenmi\u015f bilgilere eri\u015fmek i\u00e7in daha incelikli ve zarif bir y\u00f6ntem arad\u0131lar. Ancak ayr\u0131nt\u0131lara girmeden \u00f6nce, donan\u0131m bile\u015fenine bir g\u00f6z atal\u0131m ve bunu Amerikan ekibinin \u00e7al\u0131\u015fmas\u0131yla kar\u015f\u0131la\u015ft\u0131ral\u0131m:<\/p>\n<div id=\"attachment_13935\" style=\"width: 2010px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2025\/11\/03195528\/wiretap-battering-ram-tee-attacks-batteringram.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-13935\" class=\"size-full wp-image-13935\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2025\/11\/03195528\/wiretap-battering-ram-tee-attacks-batteringram.jpg\" alt=\"WireTap ve Battering RAM: TEE'lere y\u00f6nelik sald\u0131r\u0131lar\" width=\"2000\" height=\"853\"><\/a><p id=\"caption-attachment-13935\" class=\"wp-caption-text\">Battering RAM\u2019de kullan\u0131lan bellek mod\u00fcl\u00fc ara par\u00e7as\u0131 <a href=\"https:\/\/batteringram.eu\/\" target=\"_blank\" rel=\"noopener nofollow\">Kaynak<\/a><\/p><\/div>\n<p>Kablo karma\u015fas\u0131 ve hantal bir veri analiz cihaz\u0131 yerine, bu kurulumda s\u0131f\u0131rdan tasarlanm\u0131\u015f basit bir kart vard\u0131r ve hedef bellek mod\u00fcl\u00fc bu karta tak\u0131l\u0131r. Kart, ucuz bir Raspberry Pi Pico mikrobilgisayar taraf\u0131ndan kontrol edilir. Donan\u0131m b\u00fct\u00e7esi \u00f6nemsizdir; sadece 50 \u20ac! Ayr\u0131ca, WireTap sald\u0131r\u0131s\u0131ndan farkl\u0131 olarak, Battering RAM gizlice ger\u00e7ekle\u015ftirilebilir; sunucuya s\u00fcrekli fiziksel eri\u015fim gerekmez. De\u011fi\u015ftirilmi\u015f bellek mod\u00fcl\u00fc tak\u0131ld\u0131ktan sonra, gerekli veriler uzaktan \u00e7al\u0131nabilir.<\/p>\n<p>Bu kart tam olarak ne i\u015fe yarar? Ara\u015ft\u0131rmac\u0131lar, do\u011fru anda sadece iki adres hatt\u0131n\u0131 (bilginin yaz\u0131laca\u011f\u0131 veya okunaca\u011f\u0131 yeri belirleyen) topraklayarak veri yans\u0131tma durumu yaratabileceklerini ke\u015ffettiler. Bu, sald\u0131rgan\u0131n eri\u015febilece\u011fi bellek h\u00fccrelerine bilgilerin yaz\u0131lmas\u0131na neden olur. Ara kart, Raspberry Pi mikrobilgisayar taraf\u0131ndan kontrol edilen bir \u00e7ift basit anahtar g\u00f6revi g\u00f6r\u00fcr. Canl\u0131 donan\u0131mdaki kontaklar\u0131 manip\u00fcle etmek genellikle sistemin donmas\u0131na veya verilerin bozulmas\u0131na neden olurken, ara\u015ft\u0131rmac\u0131lar adres hatlar\u0131n\u0131 yaln\u0131zca gerekli olan kesin anlarda kesip yeniden ba\u011flayarak istikrarl\u0131 bir \u00e7al\u0131\u015fma sa\u011flad\u0131lar.<\/p>\n<p>Bu y\u00f6ntem, yazarlara verilerinin kaydedilece\u011fi yeri se\u00e7me olana\u011f\u0131 sa\u011flad\u0131. \u00d6nemli olan, bu sayede \u015fifreleme anahtar\u0131n\u0131 hesaplamalar\u0131na bile gerek kalmamas\u0131d\u0131r! \u00d6nce hedef i\u015flemden \u015fifrelenmi\u015f bilgileri ele ge\u00e7irdiler. Ard\u0131ndan, ayn\u0131 bellek aral\u0131\u011f\u0131 i\u00e7inde kendi programlar\u0131n\u0131 \u00e7al\u0131\u015ft\u0131rd\u0131lar ve TEE sisteminden \u00f6nceden yakalanan bilgilerin \u015fifresini \u00e7\u00f6zmesini istediler. Bu teknik, Intel SGX\u2019in yan\u0131 s\u0131ra AMD SEV\u2019yi de hacklemelerine olanak tan\u0131d\u0131. Ayr\u0131ca, veri yazma \u00fczerindeki bu kontrol, AMD\u2019nin SEV-SNP adl\u0131 g\u00fcvenlik uzant\u0131s\u0131n\u0131 atlatmalar\u0131na yard\u0131mc\u0131 oldu. G\u00fcvenli Katmanl\u0131 Sayfalama \u00f6zelli\u011fini kullanan bu uzant\u0131, bellekteki verilerin de\u011fi\u015ftirilmesini \u00f6nleyerek sanal makineyi tehlikeye kar\u015f\u0131 korumak i\u00e7in tasarlanm\u0131\u015ft\u0131r. SEV-SNP\u2019yi atlatmak, sald\u0131rganlar\u0131n \u015fifrelenmi\u015f verileri okumas\u0131na izin vermekle kalmaz, ayn\u0131 zamanda g\u00fcvenli\u011fi ihlal edilmi\u015f bir sanal makineye k\u00f6t\u00fc ama\u00e7l\u0131 kod enjekte etmesine de olanak tan\u0131r.<\/p>\n<h2>Sunucu altyap\u0131s\u0131na y\u00f6nelik fiziksel sald\u0131r\u0131lar\u0131n \u00f6nemi<\/h2>\n<p>Bu t\u00fcr sald\u0131r\u0131lar\u0131n pratik olarak uygulanmas\u0131n\u0131n m\u00fcmk\u00fcn oldu\u011fu a\u00e7\u0131k olsa da, ger\u00e7ek hayatta ger\u00e7ekle\u015ftirilme olas\u0131l\u0131\u011f\u0131 d\u00fc\u015f\u00fck. \u00c7al\u0131nan verilerin de\u011feri, donan\u0131m d\u00fczeyinde kurcalamay\u0131 hakl\u0131 \u00e7\u0131karmak i\u00e7in son derece y\u00fcksek olmal\u0131d\u0131r. En az\u0131ndan, Intel ve AMD\u2019nin g\u00fcvenlik \u00e7\u00f6z\u00fcmleri konusunda benimsedi\u011fi tutum budur: Her iki yonga \u00fcreticisi de ara\u015ft\u0131rmac\u0131lara, fiziksel sald\u0131r\u0131lar\u0131n g\u00fcvenlik modellerinin kapsam\u0131 d\u0131\u015f\u0131nda oldu\u011funu belirterek yan\u0131t verdi. Ancak hem Amerikan hem de Avrupal\u0131 ara\u015ft\u0131rma ekipleri, bu sald\u0131r\u0131lar\u0131n maliyetinin daha \u00f6nce inan\u0131ld\u0131\u011f\u0131ndan \u00e7ok daha d\u00fc\u015f\u00fck oldu\u011funu kan\u0131tlad\u0131lar. Bu durum, bu t\u00fcr karma\u015f\u0131k g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 kullanmaya istekli tehdit akt\u00f6rlerinin listesini potansiyel olarak geni\u015fletir.<\/p>\n<p>\u00d6nerilen sald\u0131r\u0131lar kendi k\u0131s\u0131tlamalar\u0131yla birlikte gelir. Daha \u00f6nce de belirtti\u011fimiz gibi, bilgi h\u0131rs\u0131zl\u0131\u011f\u0131 DDR4 standart bellek mod\u00fclleri ile donat\u0131lm\u0131\u015f sistemlerde ger\u00e7ekle\u015ftirildi. 2020 y\u0131l\u0131nda kesinle\u015fen yeni DDR5 standard\u0131, ara\u015ft\u0131rma ama\u00e7l\u0131 olsa bile hen\u00fcz tehlikeye girmi\u015f de\u011fildir. Bu, hem bellek mod\u00fcllerinin revize edilmi\u015f mimarisi hem de artan \u00e7al\u0131\u015fma h\u0131zlar\u0131 nedeniyle ger\u00e7ekle\u015fmi\u015ftir. Bununla birlikte, ara\u015ft\u0131rmac\u0131lar\u0131n sonunda DDR5\u2019te de g\u00fcvenlik a\u00e7\u0131klar\u0131 bulmas\u0131 olduk\u00e7a muhtemeldir. Ve bu iyi bir \u015fey: TEE sistemlerinin beyan edilen g\u00fcvenli\u011fi d\u00fczenli olarak ba\u011f\u0131ms\u0131z denetimlere tabi tutulmal\u0131d\u0131r. Aksi takdirde, bir noktada, g\u00fcya g\u00fcvenilir oldu\u011fu d\u00fc\u015f\u00fcn\u00fclen bir koruma sisteminin beklenmedik bir \u015fekilde tamamen i\u015fe yaramaz hale gelebilece\u011fi ortaya \u00e7\u0131kabilir.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"mdr\">\n","protected":false},"excerpt":{"rendered":"<p>\u0130ki ayr\u0131 ara\u015ft\u0131rma makalesi, sanal sistemlerin tehlikeli bir ortamda, \u00f6zellikle de veri sahibi bulut sa\u011flay\u0131c\u0131s\u0131na g\u00fcvenemedi\u011finde nas\u0131l riske at\u0131labilece\u011fini a\u00e7\u0131k\u00e7a g\u00f6stermektedir.<\/p>\n","protected":false},"author":665,"featured_media":13933,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194,1727],"tags":[754,790,2656],"class_list":{"0":"post-13932","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"category-smb","10":"tag-donanim","11":"tag-guvenlik-aciklari","12":"tag-ram"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/wiretap-battering-ram-tee-attacks\/13932\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/wiretap-battering-ram-tee-attacks\/29730\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/wiretap-battering-ram-tee-attacks\/24801\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/wiretap-battering-ram-tee-attacks\/29618\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/wiretap-battering-ram-tee-attacks\/28678\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/wiretap-battering-ram-tee-attacks\/31570\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/wiretap-battering-ram-tee-attacks\/30229\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/wiretap-battering-ram-tee-attacks\/40738\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/wiretap-battering-ram-tee-attacks\/54598\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/wiretap-battering-ram-tee-attacks\/23322\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/wiretap-battering-ram-tee-attacks\/24421\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/wiretap-battering-ram-tee-attacks\/32849\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/wiretap-battering-ram-tee-attacks\/29871\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/wiretap-battering-ram-tee-attacks\/35562\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/wiretap-battering-ram-tee-attacks\/35186\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/ram\/","name":"RAM"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/13932","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/665"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=13932"}],"version-history":[{"count":6,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/13932\/revisions"}],"predecessor-version":[{"id":13936,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/13932\/revisions\/13936"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/13933"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=13932"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=13932"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=13932"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}