{"id":9668,"date":"2021-05-28T14:39:59","date_gmt":"2021-05-28T11:39:59","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=9668"},"modified":"2021-05-28T14:39:59","modified_gmt":"2021-05-28T11:39:59","slug":"rsa2021-windows-xp-vulnbins","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/rsa2021-windows-xp-vulnbins\/9668\/","title":{"rendered":"G\u00fcn\u00fcm\u00fcz sistemlerinde eski g\u00fcvenlik a\u00e7\u0131klar\u0131ndan faydalanan yaz\u0131l\u0131mlar"},"content":{"rendered":"<p>Zarar vermek amac\u0131yla yasal programlar\u0131 veya i\u015fletim sistemi i\u015flevlerini kullanan <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/lotl-living-off-the-land\/\" target=\"_blank\" rel=\"noopener\">Living off the Land\u2013t\u00fcr\u00fc (LotL) sald\u0131r\u0131lar\u0131<\/a> yeni kar\u015f\u0131la\u015f\u0131lan bir \u015fey de\u011fil, ancak LotL sald\u0131r\u0131lar\u0131na duyarl\u0131 modern yaz\u0131l\u0131mlar\u0131 takip eden uzmanlar nedeniyle siber su\u00e7lular bu konuda yenili\u011fe gitmek zorunda kald\u0131lar. Ara\u015ft\u0131rmac\u0131lar Jean-Ian Boutin ve Zuzana Hromcova, <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/tag\/rsac\/\" target=\"_blank\" rel=\"noopener\">2021 RSA Konferans\u0131<\/a>\u2018nda yapt\u0131klar\u0131 konu\u015fmada, sald\u0131r\u0131larda yasal Windows XP bile\u015fenlerinin ve programlar\u0131n\u0131n kullan\u0131m\u0131 gibi bir yenilikten <a href=\"https:\/\/www.rsaconference.com\/usa\/agenda\/session\/beyond-livingofftheland-why-xp-exploits-still-matter\" target=\"_blank\" rel=\"noopener nofollow\">bahsetti<\/a>.<\/p>\n<h2>Living off the Land ve g\u00fcvenlik a\u00e7\u0131klar\u0131na sahip Windows XP bile\u015fenleri<\/h2>\n<p><a href=\"https:\/\/threatpost.com\/invisimole-resurfaces-gamaredon-partnership\/156674\/\" target=\"_blank\" rel=\"noopener nofollow\">InvisiMole<\/a> grubunun faaliyetlerini inceleyen Boutin ve Hromcova, grubun fark edilmemesinde, InvisiMole ara\u00e7lar\u0131n\u0131n, uzun s\u00fcredir kullan\u0131lmayan i\u015fletim sistemi dosyalar\u0131ndan faydalanmas\u0131n\u0131n etkili oldu\u011funa dikkat \u00e7ekti. Ara\u015ft\u0131rmac\u0131lar genel anlamda bu dosyalara, g\u00fcvenlik \u00e7evrelerinde Living off the Land sald\u0131r\u0131lar\u0131nda kullan\u0131lan dosyalar\u0131 ifade etmek i\u00e7in kullan\u0131lan LOLBins\u2019e benzer \u015fekilde VULNBins ad\u0131n\u0131 verdiler.<\/p>\n<p>Elbette, kurban\u0131n bilgisayar\u0131na g\u00fcncel olmayan bir dosyay\u0131 indirmek i\u00e7in s\u00f6z konusu bilgisayara eri\u015fim gerekiyor. Ancak VULNBin\u2019ler genellikle sisteme tamamen s\u0131zmak yerine, hedeflenen bir sistemde fark edilmeden kal\u0131c\u0131l\u0131k sa\u011flamak i\u00e7in kullan\u0131l\u0131yor.<\/p>\n<p><strong><input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial-leadgen\"><\/strong><\/p>\n<h2>G\u00fcncel olmayan programlar\u0131n ve sistem bile\u015fenlerinin kullan\u0131m\u0131na ili\u015fkin spesifik \u00f6rnekler<\/h2>\n<p>Bir sald\u0131rgan\u0131n y\u00f6netici haklar\u0131n\u0131 elde edememesi halinde sistemde kal\u0131c\u0131l\u0131\u011f\u0131 sa\u011flamak i\u00e7in kullanabilece\u011fi taktiklerden biri, bilinen bir arabellek ta\u015fmas\u0131 (buffer overflow) g\u00fcvenlik a\u00e7\u0131\u011f\u0131na sahip eski bir video oynat\u0131c\u0131s\u0131ndan faydalanmas\u0131d\u0131r. Siber su\u00e7lular sald\u0131r\u0131n\u0131n bir sonraki a\u015famas\u0131 i\u00e7in gereken kodu y\u00fcklemek amac\u0131yla Windows G\u00f6rev Zamanlay\u0131c\u0131 \u00fczerinden, g\u00fcvenlik a\u00e7\u0131\u011f\u0131ndan faydalanacak \u015fekilde yap\u0131land\u0131rma dosyas\u0131 de\u011fi\u015ftirilmi\u015f video oynat\u0131c\u0131y\u0131 \u00e7a\u011f\u0131ran, d\u00fczenli olarak \u00e7al\u0131\u015ft\u0131r\u0131lan bir g\u00f6rev olu\u015fturuyorlar.<\/p>\n<p>InvisiMole sald\u0131rganlar\u0131 bir \u015fekilde y\u00f6netici haklar\u0131n\u0131 elde etmeyi ba\u015fard\u0131klar\u0131nda, yasal sistem bile\u015feni setupSNK.exe, Windows XP kitapl\u0131\u011f\u0131 wdigest.dll ve kitapl\u0131\u011f\u0131 \u00e7al\u0131\u015ft\u0131rmak i\u00e7in gereken Rundll32.exe\u2019yi (bu da eski sistemden gelen bir dosya) kullanan ba\u015fka bir y\u00f6ntemi kullanabiliyorlar. Ard\u0131ndan k\u00fct\u00fcphanenin belle\u011fe y\u00fckledi\u011fi verileri de\u011fi\u015ftiriyorlar. Kitapl\u0131k, ASLR teknolojisinin uygulanmas\u0131ndan \u00f6nce olu\u015fturuldu\u011fu i\u00e7in siber su\u00e7lular, verilerin bellekte y\u00fcklenece\u011fi tam adresi biliyorlar.<\/p>\n<p>K\u00f6t\u00fc ama\u00e7l\u0131 veri y\u00fck\u00fcn\u00fcn \u00e7o\u011funu kay\u0131t defterinde \u015fifrelenmi\u015f bi\u00e7imde depoluyorlar ve bunu yaparken tamamen yasal kitapl\u0131klar\u0131 ve y\u00fcr\u00fct\u00fclebilir dosyalar\u0131 kullan\u0131yorlar. Bu nedenle, kullan\u0131lan y\u00f6ntemdeki k\u00f6t\u00fc ama\u00e7l\u0131 tek \u015fey, oynat\u0131c\u0131n\u0131n yap\u0131land\u0131rma ayarlar\u0131n\u0131n bulundu\u011fu dosya ve eski k\u00fct\u00fcphanelerdeki a\u00e7\u0131ktan faydalanan k\u00fc\u00e7\u00fck bir yaz\u0131l\u0131md\u0131r. Genellikle bu, bir g\u00fcvenlik sisteminin dikkatini \u00e7ekecek kadar \u015f\u00fcphe yaratan bir durum de\u011fildir.<\/p>\n<h2>G\u00fcvenli\u011finizi nas\u0131l sa\u011flayabilirsiniz?<\/h2>\n<p>Bu t\u00fcr dosyalar\u0131n yer ald\u0131\u011f\u0131 bir veri taban\u0131n\u0131n bulunmas\u0131, siber su\u00e7lular\u0131n eski dosyalar\u0131 ve g\u00fcncel olmayan sistem bile\u015fenlerini (\u00f6zellikle yasal bir yay\u0131nc\u0131 taraf\u0131ndan imzalanm\u0131\u015f olanlar\u0131) kullanmas\u0131n\u0131n \u00f6n\u00fcne ge\u00e7mek ad\u0131na iyi bir ba\u015flang\u0131\u00e7 noktas\u0131 olacakt\u0131r. Bu, sahip oldu\u011funuz mevcut savunmalar\u0131n onlar\u0131 engellemesini veya en az\u0131ndan (herhangi bir nedenle engellemek m\u00fcmk\u00fcn de\u011filse) izlemesini sa\u011flar. Ancak bu ileriye y\u00f6nelik bir \u00e7\u00f6z\u00fcmd\u00fcr.<\/p>\n<p>B\u00f6yle bir veri taban\u0131 olu\u015fturulana kadar,\u00a0<a href=\"https:\/\/www.kaspersky.com.tr\/enterprise-security\/threat-management-defense-solution?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____tmd___\" target=\"_blank\" rel=\"noopener\">EDR s\u0131n\u0131f\u0131 \u00e7\u00f6z\u00fcm\u00fcm\u00fcz\u00fc<\/a> kullanarak a\u015fa\u011f\u0131daki \u00f6nlemleri al\u0131n:<\/p>\n<ul>\n<li>Sistem klas\u00f6r\u00fcn\u00fcn d\u0131\u015f\u0131nda bulunan Windows bile\u015fenlerinin y\u00fcr\u00fct\u00fclmesini tespit edin ve engelleyin,<\/li>\n<li>\u0130mzas\u0131z sistem dosyalar\u0131n\u0131 tan\u0131mlay\u0131n (baz\u0131 sistem dosyalar\u0131 <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows-hardware\/drivers\/install\/catalog-files\" target=\"_blank\" rel=\"noopener nofollow\">benzersiz bir dijital imza yerine bir katalog dosyas\u0131yla<\/a> imzalan\u0131r, ancak gerekli .cat dosyas\u0131na sahip olmayan bir sisteme ta\u015f\u0131nan sistem dosyas\u0131 imzas\u0131z kabul edilir),<\/li>\n<li>\u0130\u015fletim sistemi s\u00fcr\u00fcm\u00fc ile her y\u00fcr\u00fct\u00fclebilir dosyan\u0131n s\u00fcr\u00fcm\u00fc aras\u0131ndaki fark\u0131 tespit etmek i\u00e7in bir kural olu\u015fturun,<\/li>\n<li>Di\u011fer uygulamalar i\u00e7in de \u2014 \u00f6rne\u011fin, 10 y\u0131ldan daha uzun bir s\u00fcre \u00f6nce derlenmi\u015f dosyalar\u0131n y\u00fcr\u00fct\u00fclmesini engellemek i\u00e7in \u2014 benzer bir kural olu\u015fturun.<\/li>\n<\/ul>\n<p>Bahsetti\u011fimiz gibi sald\u0131rganlar\u0131n, bir kurban\u0131n bilgisayar\u0131na bir \u015fey indirebilmesi i\u00e7in \u00f6nce s\u00f6z konusu bilgisayara eri\u015fim sa\u011flamalar\u0131 gerekir. Herhangi bir VULNBins\u2019in i\u015f istasyonlar\u0131n\u0131za ula\u015fmas\u0131n\u0131 \u00f6nlemek i\u00e7in, internet eri\u015fimine sahip t\u00fcm cihazlara\u00a0<a href=\"https:\/\/www.kaspersky.com.tr\/small-to-medium-business-security?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">g\u00fcvenlik \u00e7\u00f6z\u00fcmleri<\/a> y\u00fckleyin, g\u00fcn\u00fcm\u00fcz siber tehditleri konusunda\u00a0<a href=\"https:\/\/k-asap.com\/tr\/?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______&amp;utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=tr_wpplaceholder_nv0092&amp;utm_content=link&amp;utm_term=tr_kdaily_organic_avmwswubv8qh92b\" target=\"_blank\" rel=\"noopener\">\u00e7al\u0131\u015fan fark\u0131ndal\u0131\u011f\u0131n\u0131 art\u0131r\u0131n<\/a> ve uzaktan eri\u015fim ara\u00e7lar\u0131n\u0131 yak\u0131ndan izleyin.<\/p>\n<p><strong><input type=\"hidden\" class=\"category_for_banner\" value=\"kasap\"><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ara\u015ft\u0131rmac\u0131lar, siber su\u00e7lular\u0131n, g\u00fcn\u00fcm\u00fcz bilgisayarlar\u0131na g\u00fcncelli\u011fini yitirmi\u015f ikili dosyalar\u0131 (binary) indirmek ve bu dosyalardaki g\u00fcvenlik a\u00e7\u0131klar\u0131ndan faydalanmak i\u00e7in kulland\u0131\u011f\u0131 yeni takti\u011fi ele al\u0131yor.<\/p>\n","protected":false},"author":700,"featured_media":9669,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194,1351],"tags":[790,2404,1876,2420,815,507],"class_list":{"0":"post-9668","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"category-threats","10":"tag-guvenlik-aciklari","11":"tag-istismarlar","12":"tag-rsa-konferansi","13":"tag-rsa2021","14":"tag-rsac","15":"tag-windows-xp"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/rsa2021-windows-xp-vulnbins\/9668\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/rsa2021-windows-xp-vulnbins\/22895\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/rsa2021-windows-xp-vulnbins\/18380\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/rsa2021-windows-xp-vulnbins\/24814\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/rsa2021-windows-xp-vulnbins\/22806\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/rsa2021-windows-xp-vulnbins\/21976\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/rsa2021-windows-xp-vulnbins\/25353\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/rsa2021-windows-xp-vulnbins\/24738\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/rsa2021-windows-xp-vulnbins\/30797\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/rsa2021-windows-xp-vulnbins\/40033\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/rsa2021-windows-xp-vulnbins\/16990\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/rsa2021-windows-xp-vulnbins\/17539\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/rsa2021-windows-xp-vulnbins\/14852\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/rsa2021-windows-xp-vulnbins\/26825\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/rsa2021-windows-xp-vulnbins\/30825\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/rsa2021-windows-xp-vulnbins\/27083\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/rsa2021-windows-xp-vulnbins\/23944\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/rsa2021-windows-xp-vulnbins\/29272\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/rsa2021-windows-xp-vulnbins\/29069\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/rsac\/","name":"RSAC"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9668","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/700"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=9668"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9668\/revisions"}],"predecessor-version":[{"id":9670,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9668\/revisions\/9670"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/9669"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=9668"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=9668"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=9668"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}