<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-5507734888035129853</id><updated>2024-12-18T19:15:58.099-08:00</updated><category term="ALL TOOLS"/><category term="google"/><category term="DUYURU"/><category term="web"/><category term="5 Yıldızlı Konular"/><category term="Vulnerabilities"/><category term="webcns"/><category term="YouTube"/><category term="Facebook"/><category term="Scanners"/><category term="Türk Siber Güvenlik"/><category term="blog"/><category term="instagram"/><category term="web software"/><category term="ceo"/><category term="linux"/><category term="security"/><category term="seo"/><category term="software"/><category term="yazılım"/><category term="Checker Tools"/><category term="PHP Shell"/><category term="SQL Injection"/><category term="bilgi"/><category term="Exploit Bots"/><category term="Social Hacking"/><category term="design"/><category term="Goole+"/><category term="ağ"/><category term="server"/><category term="web security"/><category term="Information Tools"/><category term="analiz"/><category term="bilgisayar"/><category term="cyber security"/><category term="dns"/><category term="programlama"/><category term="siber güvenlik"/><category term="sunucu"/><category term="uygulama"/><category term="cns"/><category term="domain"/><category term="html"/><category term="website"/><category term="wordpress"/><category term="HABERLER"/><category term="Server Method"/><category term="Social Method"/><category term="TSG"/><category term="android"/><category term="ağ geçidi"/><category term="can"/><category term="css"/><category term="ip"/><category term="java"/><category term="network"/><category term="root"/><category term="shell"/><category term="vpn"/><category term="DDoS Script"/><category term="HACKED"/><category term="bilişim"/><category term="işletim sistemi"/><category term="kali"/><category term="makale"/><category term="python"/><category term="siber"/><category term="sibergüvenlik"/><category term="İKK"/><category term="Encryption"/><category term="HACKER"/><category term="donanım"/><category term="hosting"/><category term="js"/><category term="swift"/><category term="system"/><category term="veritabanı"/><category term="vps"/><category term="web programlama"/><category term="webprogram"/><category term="windows"/><category term="4 Yıldızlı Konular"/><category term="Eğitim Seti"/><category term="Hacker Eğitim"/><category term="Siber Eğitim"/><category term="Siber İstihbarat"/><category term="Social Script"/><category term="Türk Siber Güvenlik 5 Yıldızlı Konular"/><category term="akıl"/><category term="antivirüs"/><category term="browser"/><category term="cfo"/><category term="cmo"/><category term="cto"/><category term="cyber"/><category term="dos"/><category term="etiket"/><category term="hack eğitimi"/><category term="host"/><category term="java script"/><category term="kali linux"/><category term="media"/><category term="parola"/><category term="password"/><category term="script"/><category term="sosyal medya"/><category term="terminal"/><category term="vds"/><category term="web style"/><category term="Dersler"/><category term="DorkMaker Tools"/><category term="Finder"/><category term="Gündem"/><category term="HACKER Eğitim Seti"/><category term="Rat &amp; Keylogger"/><category term="Siber-Egitim"/><category term="Telegram"/><category term="Whatsapp"/><category term="anakart"/><category term="apple"/><category term="backlink"/><category term="cfo nedemek"/><category term="chrome"/><category term="code"/><category term="coo"/><category term="cyber tool"/><category term="eposta"/><category term="ethernet"/><category term="hack eğitim seti"/><category term="internet"/><category term="ios"/><category term="logo"/><category term="os"/><category term="php"/><category term="port"/><category term="programlama dili"/><category term="risk"/><category term="risk analizi"/><category term="salvadores"/><category term="securty"/><category term="siberasker"/><category term="site"/><category term="sql"/><category term="stil"/><category term="style"/><category term="terminoloji"/><category term="termux"/><category term="ubuntu"/><category term="unix"/><category term="veri"/><category term="web stil"/><category term="web tasarım"/><category term="Corona Virüsü"/><category term="Haber"/><category term="Hack eğitimi instagram"/><category term="Kullanıcı Destek Hattı"/><category term="Piskolojik Baskı"/><category term="Proxy Tools"/><category term="Virüs Salgını"/><category term="XSS Attacks"/><category term="abd"/><category term="adress"/><category term="alanadı"/><category term="bash"/><category term="bash system"/><category term="c"/><category term="ceo nedir"/><category term="client"/><category term="cmd"/><category term="css3"/><category term="cto nedemek"/><category term="database"/><category term="debian"/><category term="ekran"/><category term="exploit"/><category term="exploit-db"/><category term="fake"/><category term="fan"/><category term="fare"/><category term="free proxy"/><category term="free template"/><category term="güç kaynağı"/><category term="hash"/><category term="html5"/><category term="http"/><category term="jak"/><category term="ldap"/><category term="mac"/><category term="mac os"/><category term="macos"/><category term="mail"/><category term="md5"/><category term="microsoft"/><category term="modem"/><category term="mühendis"/><category term="ninja proxy"/><category term="optimizyasyon"/><category term="parola kırma"/><category term="php?id="/><category term="pip3"/><category term="proje"/><category term="proxy"/><category term="ram"/><category term="salvador"/><category term="shell coder"/><category term="siber asker"/><category term="sistem"/><category term="sunum"/><category term="tcp"/><category term="telefon"/><category term="terminolog"/><category term="tool"/><category term="unix shell"/><category term="usb"/><category term="visual basic"/><category term="vpnserver"/><category term="vuln"/><category term="webcns cyber security"/><category term="wordlist"/><category term="yayın"/><category term="örnekle"/><category term="0 code"/><category term="0 kod"/><category term="0 programlama"/><category term="1milyon"/><category term="53 port"/><category term="ASP Shell"/><category term="Ateşin Çocukları"/><category term="Buffer Overflow"/><category term="Cmethod"/><category term="Distributed"/><category term="Erlang Programlama dili"/><category term="Ermenistan"/><category term="Exploits"/><category term="Fault-tolerant"/><category term="Hot swapping"/><category term="Html ve Css Eğitimi"/><category term="John the Ripper"/><category term="Kanal"/><category term="Kerberoast"/><category term="Kurdistan Cyber Army"/><category term="Kurdistan Cyber Army Hacked"/><category term="Meta"/><category term="Müşteri Destek Hattı"/><category term="News"/><category term="Objective-C"/><category term="PS"/><category term="RFI Attacks"/><category term="Real-time"/><category term="Scala programlama dili"/><category term="Siber İstihbat Eğitimi"/><category term="Social"/><category term="Social Tool"/><category term="Teşekkürler"/><category term="Toutatis"/><category term="Training Set"/><category term="Türk Siber Güvenlik Personel Alımı Açıldı"/><category term="Web Attack"/><category term="Web Attack Eğitim Seti"/><category term="Web Attack Eğitimi"/><category term="Whatsaap Mesajları Paylaşıyormu"/><category term="Whatsapp Güvenlimi"/><category term="Whatsapp Zorunluluk İlkesi"/><category term="ad"/><category term="adli"/><category term="admin"/><category term="adsense"/><category term="adsl"/><category term="afs"/><category term="agp"/><category term="aircrack"/><category term="aircrack-ng"/><category term="airodump"/><category term="alan adı"/><category term="alan adı nedir"/><category term="all tool"/><category term="analysis"/><category term="anti-hack"/><category term="anti-hacker"/><category term="anti-rat"/><category term="anti-spam"/><category term="antis-pyware"/><category term="api"/><category term="apk"/><category term="app attack"/><category term="araç"/><category term="arp"/><category term="asp"/><category term="asp.net"/><category term="aspnet"/><category term="au"/><category term="avukat"/><category term="ayar"/><category term="açık"/><category term="açık kaynak"/><category term="açık kaynak kod"/><category term="ağgeçidi"/><category term="backdoor"/><category term="bash coder"/><category term="bağlantı"/><category term="belge"/><category term="bellek taşması"/><category term="beos"/><category term="bilgi toplama"/><category term="bilgitoplama"/><category term="bios"/><category term="blockhcain"/><category term="blowfish"/><category term="bruteforce"/><category term="bsb"/><category term="bt"/><category term="buildbox"/><category term="bulut sunucu"/><category term="bypass"/><category term="c#"/><category term="c++"/><category term="cans"/><category term="ceza"/><category term="chmod"/><category term="chp chp hacklendi"/><category term="cihaz"/><category term="clang"/><category term="client server"/><category term="cloud"/><category term="cloudflare"/><category term="cmo nedir"/><category term="cms"/><category term="cnsbilgi"/><category term="coder"/><category term="coding"/><category term="combination"/><category term="comodo"/><category term="console"/><category term="coo nedir"/><category term="cookie"/><category term="cpanel"/><category term="crash"/><category term="cto nedir"/><category term="date"/><category term="dava"/><category term="ddos"/><category term="denetim masası"/><category term="dep"/><category term="des"/><category term="dinamik"/><category term="dizayn"/><category term="dolandırıcılar"/><category term="dolargoogle play store"/><category term="domain name system"/><category term="domain nedir"/><category term="dork"/><category term="dostool"/><category term="düzen"/><category term="e-ticaret"/><category term="ebx"/><category term="echo"/><category term="edu"/><category term="eip"/><category term="ekrem imamoğlu"/><category term="ekrem imamoğlu hacked"/><category term="ekrem imamoğlu hacklendi"/><category term="elektronik"/><category term="endüstri"/><category term="erlang"/><category term="esi"/><category term="esp"/><category term="ethereal"/><category term="export"/><category term="fatih"/><category term="fax"/><category term="firefox"/><category term="firewall"/><category term="font"/><category term="forbidden"/><category term="format"/><category term="forum"/><category term="ftp"/><category term="game"/><category term="game creator"/><category term="game maker"/><category term="gameing maker"/><category term="gcc"/><category term="giriş"/><category term="github"/><category term="gizli servis"/><category term="go"/><category term="google account"/><category term="gov"/><category term="groovy"/><category term="güvenlik duvarı"/><category term="hacking"/><category term="hakaret"/><category term="hardware"/><category term="hashcat"/><category term="hasher"/><category term="hedef"/><category term="ibb"/><category term="ibb hacked"/><category term="icmp"/><category term="import"/><category term="internet dns root"/><category term="internet güvenliği"/><category term="iphone"/><category term="iplogger"/><category term="ipod"/><category term="ipv4"/><category term="ipv6"/><category term="isim"/><category term="istanbul"/><category term="istanbulbelediyesi"/><category term="istemci"/><category term="istihdam"/><category term="it"/><category term="it manager"/><category term="işlemci"/><category term="kablo"/><category term="kasa"/><category term="kaspersky"/><category term="kaspersky lab"/><category term="klavye"/><category term="kod"/><category term="konsol"/><category term="kriz"/><category term="kullanıcı adı"/><category term="köprü"/><category term="legal"/><category term="library"/><category term="lise"/><category term="list"/><category term="matlab"/><category term="md4"/><category term="meb"/><category term="mitm"/><category term="module"/><category term="modules"/><category term="modül"/><category term="msf"/><category term="mysql"/><category term="name"/><category term="net"/><category term="no attack"/><category term="norton"/><category term="onion"/><category term="online game"/><category term="openvms"/><category term="org"/><category term="osint"/><category term="otp"/><category term="oyun motoru"/><category term="paket"/><category term="paket çözümleyici"/><category term="para"/><category term="parola çözme"/><category term="pascal"/><category term="pazarlama"/><category term="pazarlama yöneticisi"/><category term="pcap"/><category term="pci"/><category term="perl"/><category term="phone"/><category term="pkk hacklendi"/><category term="pointer"/><category term="powerpoint"/><category term="process"/><category term="program"/><category term="proxy list"/><category term="proxyağ"/><category term="pwd"/><category term="r"/><category term="rapor"/><category term="register"/><category term="requirement"/><category term="risk analiz"/><category term="risk analyst"/><category term="routerram"/><category term="ruby"/><category term="salvo"/><category term="salvotools"/><category term="sayfa"/><category term="scala"/><category term="segment"/><category term="server saldırı"/><category term="service"/><category term="sha-1"/><category term="sha-256"/><category term="siyaset"/><category term="smtp"/><category term="smtplib"/><category term="snmp"/><category term="solaris"/><category term="spray"/><category term="sprayying"/><category term="ssh"/><category term="sso"/><category term="sucuri"/><category term="sudo"/><category term="suç"/><category term="switch"/><category term="systemweb"/><category term="tablet"/><category term="tarayıcılar"/><category term="taslak"/><category term="tck"/><category term="tehdit"/><category term="teknik"/><category term="teknoloji"/><category term="telecomination"/><category term="tema"/><category term="template"/><category term="test"/><category term="tht"/><category term="ticaret"/><category term="toolbar"/><category term="tools"/><category term="tor"/><category term="tshark"/><category term="turk hackteam"/><category term="turkhackteam"/><category term="tür"/><category term="türk hackteam"/><category term="türk telekom"/><category term="türkhackteam"/><category term="türkiye"/><category term="tıp"/><category term="udp"/><category term="url"/><category term="usa"/><category term="user"/><category term="username"/><category term="utp"/><category term="vbtc"/><category term="veritabanıdatabase"/><category term="vpn service"/><category term="w"/><category term="waf"/><category term="wakka"/><category term="wakka wiki"/><category term="we"/><category term="web app attack"/><category term="web pentest"/><category term="web saldırı"/><category term="webcnsbilgi"/><category term="widget"/><category term="wifi"/><category term="wifi kırma"/><category term="wifi parola kırma"/><category term="wiki"/><category term="wikipedia"/><category term="win32"/><category term="windows nt/2000/xp/2003 lm"/><category term="winrar"/><category term="wireless"/><category term="wireshark"/><category term="wiriles"/><category term="wlan0"/><category term="wlan2"/><category term="wordpress ddos"/><category term="wordpress güvenliği"/><category term="wpa"/><category term="xml rpc"/><category term="yasak"/><category term="yazıcı"/><category term="yevgeni kasperski"/><category term="çizim"/><category term="çıkış"/><category term="örnekler"/><category term="üniverste"/><category term="İsrail"/><category term="İstitastik"/><category term="şantaj"/><category term="şifre"/><title type='text'>webcns sanal gelişim</title><subtitle type='html'>webcns software &amp;amp;&amp;amp; cyber security</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='https://webcnsbilgi.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5507734888035129853/posts/default'/><link rel='alternate' type='text/html' href='https://webcnsbilgi.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='https://www.blogger.com/feeds/5507734888035129853/posts/default?start-index=26&amp;max-results=25'/><author><name>SALVADORES</name><uri>http://www.blogger.com/profile/04940426007136148897</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>477</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-5507734888035129853.post-7632748721462405617</id><published>2021-12-29T17:40:00.001-08:00</published><updated>2021-12-29T17:40:09.632-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="belge"/><category scheme="http://www.blogger.com/atom/ns#" term="chp chp hacklendi"/><category scheme="http://www.blogger.com/atom/ns#" term="date"/><category scheme="http://www.blogger.com/atom/ns#" term="ekrem imamoğlu"/><category scheme="http://www.blogger.com/atom/ns#" term="ekrem imamoğlu hacked"/><category scheme="http://www.blogger.com/atom/ns#" term="ekrem imamoğlu hacklendi"/><category scheme="http://www.blogger.com/atom/ns#" term="ibb"/><category scheme="http://www.blogger.com/atom/ns#" term="ibb hacked"/><category scheme="http://www.blogger.com/atom/ns#" term="istanbul"/><category scheme="http://www.blogger.com/atom/ns#" term="istanbulbelediyesi"/><category scheme="http://www.blogger.com/atom/ns#" term="Meta"/><category scheme="http://www.blogger.com/atom/ns#" term="pkk hacklendi"/><category scheme="http://www.blogger.com/atom/ns#" term="salvador"/><category scheme="http://www.blogger.com/atom/ns#" term="salvadores"/><category scheme="http://www.blogger.com/atom/ns#" term="siyaset"/><category scheme="http://www.blogger.com/atom/ns#" term="İnstagram"/><title type='text'>SALVADOR İSTANBUL BELEDİYE BAŞKANI EKREM İMAMOĞLUNU HACKLEDİ</title><content type='html'>&amp;nbsp;SALVADOR ekibi tarafından CHP İstanbul 
Belediye Başkanı Ekrem IMAMOĞLU&#39;na ait Web Sitesi www.ekremimamoglu.com 
hacklendi.&amp;nbsp;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEjS1ToNYWwtBVOXxQgabWzMRtih04Q8pDY3Beaium9U0G3lShQFZdzYvas-CDYMt9c9wtNLcVYKRWQKjSK_9bJlziaSW8wuAgp2TPHYAkTgZlnxzZ4E4RcCb9DOUyKM1lhioIppgWObvRsqKwIjoxfXC2YwzN5t7ainHz0fpwjmFWJVLpxtH3XEW7lf6Q=s750&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Türk Siber Güvenlik Istihbarat&quot; border=&quot;0&quot; data-original-height=&quot;422&quot; data-original-width=&quot;750&quot; height=&quot;180&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEjS1ToNYWwtBVOXxQgabWzMRtih04Q8pDY3Beaium9U0G3lShQFZdzYvas-CDYMt9c9wtNLcVYKRWQKjSK_9bJlziaSW8wuAgp2TPHYAkTgZlnxzZ4E4RcCb9DOUyKM1lhioIppgWObvRsqKwIjoxfXC2YwzN5t7ainHz0fpwjmFWJVLpxtH3XEW7lf6Q=w320-h180&quot; title=&quot;Türk Siber Güvenlik Istihbarat&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;&lt;p dir=&quot;ltr&quot; lang=&quot;tr&quot;&gt;2021 Tarihli İBB UKOME Kararları Tarafımızca Elegeçirilmiştir.&lt;br /&gt;Yılbaşında Kararlar Bütün Çıplaklığıyla Yayına Verilecektir. &lt;a href=&quot;https://twitter.com/hashtag/IBB?src=hash&amp;amp;ref_src=twsrc%5Etfw&quot;&gt;#IBB&lt;/a&gt; &lt;a href=&quot;https://twitter.com/hashtag/imamo%C4%9Flu?src=hash&amp;amp;ref_src=twsrc%5Etfw&quot;&gt;#imamoğlu&lt;/a&gt; &lt;a href=&quot;https://twitter.com/hashtag/imamo%C4%9Fluistifa?src=hash&amp;amp;ref_src=twsrc%5Etfw&quot;&gt;#imamoğluistifa&lt;/a&gt; &lt;a href=&quot;https://twitter.com/hashtag/imamo%C4%9Fluyan%C4%B1nday%C4%B1z?src=hash&amp;amp;ref_src=twsrc%5Etfw&quot;&gt;#imamoğluyanındayız&lt;/a&gt; &lt;a href=&quot;https://twitter.com/hashtag/ba%C5%9Fkan?src=hash&amp;amp;ref_src=twsrc%5Etfw&quot;&gt;#başkan&lt;/a&gt; &lt;a href=&quot;https://twitter.com/hashtag/KapatmaVatana%C4%B0hanettir?src=hash&amp;amp;ref_src=twsrc%5Etfw&quot;&gt;#KapatmaVatanaİhanettir&lt;/a&gt; &lt;a href=&quot;https://twitter.com/hashtag/gizlinikah?src=hash&amp;amp;ref_src=twsrc%5Etfw&quot;&gt;#gizlinikah&lt;/a&gt; &lt;a href=&quot;https://twitter.com/hashtag/kriptoyasas%C4%B1?src=hash&amp;amp;ref_src=twsrc%5Etfw&quot;&gt;#kriptoyasası&lt;/a&gt; &lt;a href=&quot;https://twitter.com/hashtag/Yilbasi?src=hash&amp;amp;ref_src=twsrc%5Etfw&quot;&gt;#Yilbasi&lt;/a&gt; &lt;a href=&quot;https://twitter.com/hashtag/hacked?src=hash&amp;amp;ref_src=twsrc%5Etfw&quot;&gt;#hacked&lt;/a&gt; &lt;a href=&quot;https://twitter.com/hashtag/rte?src=hash&amp;amp;ref_src=twsrc%5Etfw&quot;&gt;#rte&lt;/a&gt; &lt;a href=&quot;https://twitter.com/hashtag/chp?src=hash&amp;amp;ref_src=twsrc%5Etfw&quot;&gt;#chp&lt;/a&gt; &lt;a href=&quot;https://twitter.com/hashtag/mhp?src=hash&amp;amp;ref_src=twsrc%5Etfw&quot;&gt;#mhp&lt;/a&gt; &lt;a href=&quot;https://twitter.com/hashtag/hdp?src=hash&amp;amp;ref_src=twsrc%5Etfw&quot;&gt;#hdp&lt;/a&gt; &lt;a href=&quot;https://twitter.com/hashtag/Rojbas?src=hash&amp;amp;ref_src=twsrc%5Etfw&quot;&gt;#Rojbas&lt;/a&gt; &lt;a href=&quot;https://t.co/W9RNEUW2Wy&quot;&gt;pic.twitter.com/W9RNEUW2Wy&lt;/a&gt;&lt;/p&gt;— SalvadoRHacK (@SALVADORES0) &lt;a href=&quot;https://twitter.com/SALVADORES0/status/1476321688761606147?ref_src=twsrc%5Etfw&quot;&gt;December 29, 2021&lt;/a&gt;&lt;/blockquote&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Yapılan saldırıda birçok veriyi alan ekibimizin yönetim kurulu yılbaşında verileri açık olarak sergileyeceklerini belirtti .&lt;/p&gt;&lt;p&gt;Instagramdan Bizi Takip Edin : &lt;a href=&quot;https://www.instagram.com/hackin50tonu/&quot;&gt;@hackin50tonu&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Google,Medya,Facebook, Meta,İnstagram, CHP,Siyaset,SALVADOR, Data,Belge&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='https://webcnsbilgi.blogspot.com/feeds/7632748721462405617/comments/default' title='Kayıt Yorumları'/><link rel='replies' type='text/html' href='https://webcnsbilgi.blogspot.com/2021/12/salvador-istanbul-belediye-baskani.html#comment-form' title='0 Yorum'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5507734888035129853/posts/default/7632748721462405617'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5507734888035129853/posts/default/7632748721462405617'/><link rel='alternate' type='text/html' href='https://webcnsbilgi.blogspot.com/2021/12/salvador-istanbul-belediye-baskani.html' title='SALVADOR İSTANBUL BELEDİYE BAŞKANI EKREM İMAMOĞLUNU HACKLEDİ'/><author><name>SALVADORES</name><uri>http://www.blogger.com/profile/04940426007136148897</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/a/AVvXsEjS1ToNYWwtBVOXxQgabWzMRtih04Q8pDY3Beaium9U0G3lShQFZdzYvas-CDYMt9c9wtNLcVYKRWQKjSK_9bJlziaSW8wuAgp2TPHYAkTgZlnxzZ4E4RcCb9DOUyKM1lhioIppgWObvRsqKwIjoxfXC2YwzN5t7ainHz0fpwjmFWJVLpxtH3XEW7lf6Q=s72-w320-h180-c" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5507734888035129853.post-6162084643148670727</id><published>2021-12-06T09:42:00.001-08:00</published><updated>2021-12-06T09:42:06.620-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="bypass"/><category scheme="http://www.blogger.com/atom/ns#" term="cyber"/><category scheme="http://www.blogger.com/atom/ns#" term="cyber security"/><category scheme="http://www.blogger.com/atom/ns#" term="cyber tool"/><category scheme="http://www.blogger.com/atom/ns#" term="forbidden"/><category scheme="http://www.blogger.com/atom/ns#" term="hack eğitimi"/><category scheme="http://www.blogger.com/atom/ns#" term="http"/><category scheme="http://www.blogger.com/atom/ns#" term="Siber Eğitim"/><category scheme="http://www.blogger.com/atom/ns#" term="url"/><category scheme="http://www.blogger.com/atom/ns#" term="yasak"/><title type='text'>forbidden - 4Xx HTTP Yanıt Durum Kodlarını Atla</title><content type='html'>











&lt;div class=&quot;no-items section&quot; id=&quot;ads-title&quot; name=&quot;Ads Below Title - (468x60)&quot;&gt;
&lt;/div&gt;
&lt;a name=&quot;ad-title&quot;&gt;&lt;/a&gt;
&lt;article&gt;
&lt;div class=&quot;post-body entry-content&quot; id=&quot;post-body-7559649467025484620&quot; itemprop=&quot;articleBody&quot;&gt;



&lt;div style=&quot;margin: 15px;&quot;&gt;



&lt;/div&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgcyAqgkhSWBDl13aJNsPV1t5-rVNCD2zntXdB1zHf1NuvYkU9EU0GomFr1imu2zZpnidQxVCIWh7ekaYFbG3Rpk8qw1Sm8dVjDvQLiYAIpl0K85g22P2qOgkhxKHx7x5PyI81s20DZopjx/s1600/forbidden_1_help-783574.png&quot; style=&quot;text-align: -webkit-center;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;376&quot; id=&quot;BLOGGER_PHOTO_ID_7034010066834565426&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgcyAqgkhSWBDl13aJNsPV1t5-rVNCD2zntXdB1zHf1NuvYkU9EU0GomFr1imu2zZpnidQxVCIWh7ekaYFbG3Rpk8qw1Sm8dVjDvQLiYAIpl0K85g22P2qOgkhxKHx7x5PyI81s20DZopjx/w640-h376/forbidden_1_help-783574.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;br /&gt;  &lt;p dir=&quot;auto&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p dir=&quot;auto&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;4xx HTTP yanıt durum kodlarını atlayın.  Dayalı &lt;/span&gt;&lt;code&gt;PycURL&lt;/code&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;. &lt;/span&gt;&lt;/p&gt;  &lt;p dir=&quot;auto&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Komut
 dosyası çoklu iş parçacığı kullanır ve kaba zorlamaya dayanır, bu 
nedenle bazı yanlış pozitifler olabilir.  Komut dosyası renkli çıktı 
kullanır. &lt;/span&gt;&lt;/p&gt;  &lt;p dir=&quot;auto&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Sonuçlar, artan HTTP yanıt durum koduna, azalan içerik uzunluğuna ve artan ID&#39;ye göre sıralanacaktır. &lt;/span&gt;&lt;/p&gt;  &lt;p dir=&quot;auto&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Yanlış pozitifleri filtrelemek için, sağlanan içerikle her bir içerik uzunluğunu manuel olarak kontrol edin. &lt;/span&gt;&lt;code&gt;cURL&lt;/code&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;emretmek.  Baypas ile sonuçlanmazsa, aynı içerik uzunluğuna sahip diğer tüm sonuçları görmezden gelin. &lt;/span&gt;&lt;/p&gt;&lt;span&gt;&lt;a name=&quot;more&quot;&gt;&lt;br /&gt;&lt;/a&gt;&lt;br /&gt;&lt;/span&gt;&lt;p dir=&quot;auto&quot;&gt;&lt;br /&gt;&lt;/p&gt;  &lt;table&gt;  &lt;tbody&gt;&lt;tr&gt;  &lt;th&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Ölçek &lt;/span&gt;&lt;/th&gt;  &lt;th&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Kapsam &lt;/span&gt;&lt;/th&gt;  &lt;/tr&gt;  &lt;tr&gt;  &lt;td&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Çeşitli HTTP yöntemleri &lt;/span&gt;&lt;/td&gt;  &lt;td&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;yöntem &lt;/span&gt;&lt;/td&gt;  &lt;/tr&gt;  &lt;tr&gt;  &lt;td&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;&#39;Content-Length: 0&#39; başlığına sahip çeşitli HTTP yöntemleri &lt;/span&gt;&lt;/td&gt;  &lt;td&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;yöntem &lt;/span&gt;&lt;/td&gt;  &lt;/tr&gt;  &lt;tr&gt;  &lt;td&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;siteler arası &lt;/span&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;izleme &lt;/span&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;HTTP TRACE ve TRACK yöntemleriyle (XST) &lt;/span&gt;&lt;/td&gt;  &lt;td&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;yöntem &lt;/span&gt;&lt;/td&gt;  &lt;/tr&gt;  &lt;tr&gt;  &lt;td&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;HTTP PUT yöntemiyle dosya yükleme &lt;/span&gt;&lt;/td&gt;  &lt;td&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;yöntem &lt;/span&gt;&lt;/td&gt;  &lt;/tr&gt;  &lt;tr&gt;  &lt;td&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Çeşitli HTTP yöntemi geçersiz kılmaları &lt;/span&gt;&lt;/td&gt;  &lt;td&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;yöntem geçersiz kılma &lt;/span&gt;&lt;/td&gt;  &lt;/tr&gt;  &lt;tr&gt;  &lt;td&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Çeşitli HTTP başlıkları &lt;/span&gt;&lt;/td&gt;  &lt;td&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;başlık &lt;/span&gt;&lt;/td&gt;  &lt;/tr&gt;  &lt;tr&gt;  &lt;td&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Çeşitli URL geçersiz kılmaları &lt;/span&gt;&lt;/td&gt;  &lt;td&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;başlık &lt;/span&gt;&lt;/td&gt;  &lt;/tr&gt;  &lt;tr&gt;  &lt;td&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;URL &lt;/span&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;geçersiz kılma &lt;/span&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;İki &#39;Ana Bilgisayar&#39; başlığıyla &lt;/span&gt;&lt;/td&gt;  &lt;td&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;başlık &lt;/span&gt;&lt;/td&gt;  &lt;/tr&gt;  &lt;tr&gt;  &lt;td&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Çeşitli URL yolu atlamaları &lt;/span&gt;&lt;/td&gt;  &lt;td&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;yol &lt;/span&gt;&lt;/td&gt;  &lt;/tr&gt;  &lt;tr&gt;  &lt;td&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Boş oturum dahil temel kimlik doğrulama/yetkilendirme &lt;/span&gt;&lt;/td&gt;  &lt;td&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;yetki &lt;/span&gt;&lt;/td&gt;  &lt;/tr&gt;  &lt;tr&gt;  &lt;td&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Bozuk URL ayrıştırıcı denetimi &lt;/span&gt;&lt;/td&gt;  &lt;td&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;ayrıştırıcı &lt;/span&gt;&lt;/td&gt;  &lt;/tr&gt;  &lt;/tbody&gt;&lt;/table&gt;  &lt;p dir=&quot;auto&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Bu betiği beğeninize göre genişletin. &lt;/span&gt;&lt;/p&gt;  &lt;p dir=&quot;auto&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;üzerinde test edilmiştir &lt;/span&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Kali Linux &lt;/span&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;v2021.4 (64-bit) . &lt;/span&gt;&lt;/p&gt;  &lt;p dir=&quot;auto&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Eğitim amaçlı yapılmıştır.  Umarım yardımcı olur! &lt;/span&gt;&lt;/p&gt;  &lt;p dir=&quot;auto&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Gelecek planları: &lt;/span&gt;&lt;/p&gt;  &lt;ul dir=&quot;auto&quot;&gt;&lt;li&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;yalnızca izin verilen HTTP yöntemlerini test etme seçeneği ekleyin, &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;URL parametrelerini ve parçalarını göz ardı etmeyin. &lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;  &lt;h2 dir=&quot;auto&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;İçindekiler &lt;/span&gt;&lt;/h2&gt;  &lt;ul dir=&quot;auto&quot;&gt;&lt;li&gt;&lt;a href=&quot;https://github.com/ivan-sincek/forbidden#how-to-run&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;Nasıl Çalıştırılır&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Nasıl Çalıştırılır &lt;/span&gt;&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://github.com/ivan-sincek/forbidden#automation&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;Otomasyon&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Otomasyon &lt;/span&gt;&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://github.com/ivan-sincek/forbidden#http-methods&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;HTTP Yöntemleri&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;HTTP Yöntemleri &lt;/span&gt;&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://github.com/ivan-sincek/forbidden#http-headers&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;HTTP Başlıkları&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;HTTP Başlıkları &lt;/span&gt;&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://github.com/ivan-sincek/forbidden#url-paths&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;URL Yolları&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;URL Yolları &lt;/span&gt;&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://github.com/ivan-sincek/forbidden#results-format&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;Sonuç Formatı&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Sonuç Formatı &lt;/span&gt;&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://github.com/ivan-sincek/forbidden#images&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;Görüntüler&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Görüntüler &lt;/span&gt;&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;  &lt;h2 dir=&quot;auto&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Nasıl Çalıştırılır &lt;/span&gt;&lt;/h2&gt;  &lt;p dir=&quot;auto&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Tercih ettiğiniz açın &lt;/span&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;konsolu &lt;/span&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;den &lt;/span&gt;&lt;a href=&quot;https://github.com/ivan-sincek/forbidden/tree/main/src&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;/src/&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;/src/&#39; &lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;ve aşağıda gösterilen komutları çalıştırın. &lt;/span&gt;&lt;/p&gt;  &lt;p dir=&quot;auto&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Gerekli araçları yükleyin: &lt;/span&gt;&lt;/p&gt;  &lt;div class=&quot;snippet-clipboard-content position-relative overflow-auto&quot; data-snippet-clipboard-copy-content=&quot;apt-get install -y curl  &quot;&gt;&lt;pre lang=&quot;fundamental&quot;&gt;&lt;code&gt;apt-get install -y curl  &lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;  &lt;p dir=&quot;auto&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Gerekli paketleri kurun: &lt;/span&gt;&lt;/p&gt;  &lt;div class=&quot;snippet-clipboard-content position-relative overflow-auto&quot; data-snippet-clipboard-copy-content=&quot;pip3 install -r requirements.txt  &quot;&gt;&lt;pre lang=&quot;fundamental&quot;&gt;&lt;code&gt;pip3 install -r requirements.txt  &lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;  &lt;p dir=&quot;auto&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Komut dosyasını çalıştırın: &lt;/span&gt;&lt;/p&gt;  &lt;div class=&quot;snippet-clipboard-content position-relative overflow-auto&quot; data-snippet-clipboard-copy-content=&quot;python3 forbidden.py  &quot;&gt;&lt;pre lang=&quot;fundamental&quot;&gt;&lt;code&gt;python3 forbidden.py  &lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;  &lt;p dir=&quot;auto&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Hız
 sınırlamasının farkında olun.  Daha iyi sonuçlar elde etmek için komut 
dosyasını aynı etki alanı için yeniden çalıştırmadan önce biraz zaman 
verin. &lt;/span&gt;&lt;/p&gt;  &lt;p dir=&quot;auto&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Bazı web siteleri bir kullanıcı aracısı başlığı gerektirir. bir kullanıcı aracısı listesi indirin &lt;/span&gt;&lt;a href=&quot;https://github.com/danielmiessler/SecLists/blob/master/Fuzzing/User-Agents/UserAgents.fuzz.txt&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;Burada&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Buradan &lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;. &lt;/span&gt;&lt;/p&gt;  &lt;h2 dir=&quot;auto&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Otomasyon &lt;/span&gt;&lt;/h2&gt;  &lt;p dir=&quot;auto&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Kalp ameliyati &lt;/span&gt;&lt;code&gt;403 Forbidden&lt;/code&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;HTTP yanıtı durum kodu: &lt;/span&gt;&lt;/p&gt;  &lt;div class=&quot;highlight highlight-source-shell position-relative overflow-auto&quot; data-snippet-clipboard-copy-content=&quot;count=0; for &amp;lt;a title=&amp;quot;Subdomain&amp;quot; href=&amp;quot;https://www.kitploit.com/search/label/Subdomain&amp;quot;&amp;gt;subdomain&amp;lt;/a&amp;gt; in $(cat subdomains_403.txt); do count=$((count+1)); echo &amp;quot;#${count} | ${subdomain}&amp;quot;; python3 forbidden.py -u &amp;quot;${subdomain}&amp;quot; -t method,method-override,header,path -f GET -o &amp;quot;forbidden_403_results_${count}.json&amp;quot;; done  &quot;&gt;&lt;pre&gt;&lt;code&gt;apt-get install -y curl&lt;br /&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;  &lt;p dir=&quot;auto&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Kalp ameliyati &lt;/span&gt;&lt;code&gt;401 Unauthorized&lt;/code&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;HTTP yanıtı durum kodu: &lt;/span&gt;&lt;/p&gt;  &lt;div class=&quot;highlight highlight-source-shell position-relative overflow-auto&quot; data-snippet-clipboard-copy-content=&quot;count=0; for subdomain in $(cat subdomains_401.txt); do count=$((count+1)); echo &amp;quot;#${count} | ${subdomain}&amp;quot;; python3 forbidden.py -u &amp;quot;${subdomain}&amp;quot; -t auth -f GET -o &amp;quot;forbidden_401_results_${count}.json&amp;quot;; done  &quot;&gt;&lt;pre&gt;&lt;code&gt;pip3 install -r requirements.txt&lt;br /&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;  &lt;p dir=&quot;auto&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Bozuk URL ayrıştırıcı kontrolü: &lt;/span&gt;&lt;/p&gt;  &lt;div class=&quot;highlight highlight-source-shell position-relative overflow-auto&quot; data-snippet-clipboard-copy-content=&quot;count=0; for subdomain in $(cat subdomains_live_long.txt); do count=$((count+1)); echo &amp;quot;#${count} | ${subdomain}&amp;quot;; python3 forbidden.py -u &amp;quot;${subdomain}&amp;quot; -t parser -f GET -o &amp;quot;forbidden_parser_results_${count}.json&amp;quot;; done  &quot;&gt;&lt;pre&gt;&lt;code&gt;python3 forbidden.py&lt;br /&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;  &lt;h1 dir=&quot;auto&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;HTTP Yöntemleri &lt;/span&gt;&lt;/h1&gt;  &lt;div class=&quot;snippet-clipboard-content position-relative overflow-auto&quot; data-snippet-clipboard-copy-content=&quot;ACL  ARBITRARY  BASELINE-CONTROL  BIND  CHECKIN  CHECKOUT  CONNECT  COPY  DELETE  GET  HEAD  INDEX  LABEL  LINK  LOCK  MERGE  MKACTIVITY  MKCALENDAR  MKCOL  MKREDIRECTREF  MKWORKSPACE  MOVE  OPTIONS  ORDERPATCH  PATCH  POST  PRI  PROPFIND  PROPPATCH  PUT  REBIND  REPORT  SEARCH  SHOWMETHOD  SPACEJUMP  TEXTSEARCH  TRACE  TRACK  UNBIND  UNCHECKOUT  UNLINK  UNLOCK  UPDATE  UPDATEREDIRECTREF  VERSION-CONTROL  &quot;&gt;&lt;pre lang=&quot;fundamental&quot;&gt;&lt;code&gt;ACL  ARBITRARY  BASELINE-CONTROL  BIND  CHECKIN  CHECKOUT  CONNECT  COPY  DELETE  GET  HEAD  INDEX  LABEL  LINK  LOCK  MERGE  MKACTIVITY  MKCALENDAR  MKCOL  MKREDIRECTREF  MKWORKSPACE  MOVE  OPTIONS  ORDERPATCH  PATCH  POST  PRI  PROPFIND  PROPPATCH  PUT  REBIND  REPORT  SEARCH  SHOWMETHOD  SPACEJUMP  TEXTSEARCH  TRACE  TRACK  UNBIND  UNCHECKOUT  UNLINK  UNLOCK  UPDATE  UPDATEREDIRECTREF  VERSION-CONTROL  &lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;  &lt;h1 dir=&quot;auto&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;HTTP Başlıkları &lt;/span&gt;&lt;/h1&gt;  &lt;div class=&quot;snippet-clipboard-content position-relative overflow-auto&quot; data-snippet-clipboard-copy-content=&quot;Client-IP  Cluster-Client-IP  Connection  Contact  Forwarded  Forwarded-For  Forwarded-For-Ip  From  Host  Origin  Referer  Stuff  True-Client-IP  X-Client-IP  X-Custom-IP-Authorization  X-Forward  X-Forwarded  X-Forwarded-By  X-Forwarded-For  X-Forwarded-For-Original  X-Forwarded-Host  X-Forwarded-Server  X-Forward-For  X-Forwared-Host  X-Host  X-HTTP-Host-Override  X-Original-URL  X-Originating-IP  X-Override-URL  X-ProxyUser-IP  X-Real-IP  X-Remote-Addr  X-Remote-IP  X-Rewrite-URL  X-Wap-Profile  X-Server-IP  X-Target  &quot;&gt;&lt;pre lang=&quot;fundamental&quot;&gt;&lt;code&gt;Client-IP  Cluster-Client-IP  Connection  Contact  Forwarded  Forwarded-For  Forwarded-For-Ip  From  Host  Origin  Referer  Stuff  True-Client-IP  X-Client-IP  X-Custom-IP-Authorization  X-Forward  X-Forwarded  X-Forwarded-By  X-Forwarded-For  X-Forwarded-For-Original  X-Forwarded-Host  X-Forwarded-Server  X-Forward-For  X-Forwared-Host  X-Host  X-HTTP-Host-Override  X-Original-URL  X-Originating-IP  X-Override-URL  X-ProxyUser-IP  X-Real-IP  X-Remote-Addr  X-Remote-IP  X-Rewrite-URL  X-Wap-Profile  X-Server-IP  X-Target  &lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;  &lt;h1 dir=&quot;auto&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;URL Yolları &lt;/span&gt;&lt;/h1&gt;  &lt;p dir=&quot;auto&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;URL yolunun önüne, arkasına ve hem önüne hem arkasına enjekte edin;  Başına eğik çizgi ekleyerek ve eklemeden. &lt;/span&gt;&lt;/p&gt;  &lt;div class=&quot;snippet-clipboard-content position-relative overflow-auto&quot; data-snippet-clipboard-copy-content=&quot;/  //  %09  %20  %2e  .  ..  ;  .;  ..;  ;foo=bar;  ~  ~~  ~~random  *  **  **random  #  ##  ##random  ?  ??  ??random  .php  .jsp  .jspa  .jspx  .jhtml  .html  .sht  .shtml  .xhtml  .asp  .aspx  .esp  &quot;&gt;&lt;pre&gt;&lt;code&gt;count=0; for subdomain in $(cat subdomains_403.txt); do count=$((count+1)); echo &quot;#${count} | ${subdomain}&quot;; python3 forbidden.py -u &quot;${subdomain}&quot; -t method,method-override,header,path -f GET -o &quot;forbidden_403_results_${count}.json&quot;; done&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;  &lt;h2 dir=&quot;auto&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Sonuç Formatı &lt;/span&gt;&lt;/h2&gt;  &lt;div class=&quot;highlight highlight-source-json position-relative overflow-auto&quot; data-snippet-clipboard-copy-content=&quot;[     {        &amp;quot;id&amp;quot;:501,        &amp;quot;url&amp;quot;:&amp;quot;http://example.com:80/admin&amp;quot;,        &amp;quot;method&amp;quot;:&amp;quot;GET&amp;quot;,        &amp;quot;headers&amp;quot;:[           &amp;quot;Host: 127.0.0.1&amp;quot;        ],        &amp;quot;agent&amp;quot;:&amp;quot;Forbidden/5.1&amp;quot;,        &amp;quot;proxy&amp;quot;:null,        &amp;quot;data&amp;quot;:null,        &amp;quot;command&amp;quot;:&amp;quot;curl -m 5 --connect-timeout 5 -i -s -k -L --path-as-is -H &#39;Host: 127.0.0.1&#39; -H &#39;User-Agent: Forbidden/5.0&#39; -X &#39;GET&#39; &#39;http://example.com:80/admin&#39;&amp;quot;,        &amp;quot;code&amp;quot;:200,        &amp;quot;length&amp;quot;:255408     },     {        &amp;quot;id&amp;quot;:541,        &amp;quot;url&amp;quot;:&amp;quot;http://example.com:80/admin&amp;quot;,        &amp;quot;method&amp;quot;:&amp;quot;GET&amp;quot;,        &amp;quot;headers&amp;quot;:[           &amp;quot;Host: 127.0.0.1:80&amp;quot;        ],        &amp;quot;agent&amp;quot;:&amp;quot;Forbidden/5.1&amp;quot;,        &amp;quot;proxy&amp;quot;:null,        &amp;quot;data&amp;quot;:null,        &amp;quot;command&amp;quot;:&amp;quot;curl -m 5 --connect-timeout 5 -i -s -k -L --path-as-is -H &#39;Host: 127.0.0.1:80&#39; -H &#39;User-Agent: Forbidden/5.0&#39; -X &#39;GET&#39; &#39;http://example.com:80/admin&#39;&amp;quot;,        &amp;quot;code&amp;quot;:200,        &amp;quot;length&amp;quot;:255408     }  ]  &quot;&gt;&lt;pre&gt;&lt;code&gt;count=0; for subdomain in $(cat subdomains_401.txt); do count=$((count+1)); echo &quot;#${count} | ${subdomain}&quot;; python3 forbidden.py -u &quot;${subdomain}&quot; -t auth -f GET -o &quot;forbidden_401_results_${count}.json&quot;; done&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;  &lt;h2 dir=&quot;auto&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Görüntüler &lt;/span&gt;&lt;/h2&gt;  &lt;p align=&quot;center&quot; dir=&quot;auto&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgcyAqgkhSWBDl13aJNsPV1t5-rVNCD2zntXdB1zHf1NuvYkU9EU0GomFr1imu2zZpnidQxVCIWh7ekaYFbG3Rpk8qw1Sm8dVjDvQLiYAIpl0K85g22P2qOgkhxKHx7x5PyI81s20DZopjx/s1600/forbidden_1_help-783574.png&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_7034010066834565426&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgcyAqgkhSWBDl13aJNsPV1t5-rVNCD2zntXdB1zHf1NuvYkU9EU0GomFr1imu2zZpnidQxVCIWh7ekaYFbG3Rpk8qw1Sm8dVjDvQLiYAIpl0K85g22P2qOgkhxKHx7x5PyI81s20DZopjx/s320/forbidden_1_help-783574.png&quot; /&gt;&lt;/a&gt;&lt;/p&gt;  &lt;p align=&quot;center&quot; dir=&quot;auto&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Şekil 1 - Yardım &lt;/span&gt;&lt;/p&gt;  &lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: x-large;&quot;&gt;&lt;a class=&quot;kiploit-download&quot; href=&quot;https://github.com/ivan-sincek/forbidden&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;Yasak İndir&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Forbidden İndir &lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/article&gt;</content><link rel='replies' type='application/atom+xml' href='https://webcnsbilgi.blogspot.com/feeds/6162084643148670727/comments/default' title='Kayıt Yorumları'/><link rel='replies' type='text/html' href='https://webcnsbilgi.blogspot.com/2021/12/forbidden-4xx-http-yant-durum-kodlarn.html#comment-form' title='0 Yorum'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5507734888035129853/posts/default/6162084643148670727'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5507734888035129853/posts/default/6162084643148670727'/><link rel='alternate' type='text/html' href='https://webcnsbilgi.blogspot.com/2021/12/forbidden-4xx-http-yant-durum-kodlarn.html' title='forbidden - 4Xx HTTP Yanıt Durum Kodlarını Atla'/><author><name>SALVADORES</name><uri>http://www.blogger.com/profile/04940426007136148897</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgcyAqgkhSWBDl13aJNsPV1t5-rVNCD2zntXdB1zHf1NuvYkU9EU0GomFr1imu2zZpnidQxVCIWh7ekaYFbG3Rpk8qw1Sm8dVjDvQLiYAIpl0K85g22P2qOgkhxKHx7x5PyI81s20DZopjx/s72-w640-h376-c/forbidden_1_help-783574.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5507734888035129853.post-6045219200546159133</id><published>2021-12-06T09:37:00.002-08:00</published><updated>2021-12-06T09:38:02.920-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="blog"/><category scheme="http://www.blogger.com/atom/ns#" term="cnsbilgi"/><category scheme="http://www.blogger.com/atom/ns#" term="Kerberoast"/><category scheme="http://www.blogger.com/atom/ns#" term="ldap"/><category scheme="http://www.blogger.com/atom/ns#" term="pip3"/><category scheme="http://www.blogger.com/atom/ns#" term="python"/><category scheme="http://www.blogger.com/atom/ns#" term="webcns"/><category scheme="http://www.blogger.com/atom/ns#" term="webcnsbilgi"/><title type='text'>Kerberoast - Kerberoast Saldırısı -Saf Python</title><content type='html'>&lt;br /&gt;&lt;div class=&quot;post-header&quot;&gt;&lt;div class=&quot;post-meta&quot;&gt;

&lt;div class=&quot;meta-share&quot;&gt;
&lt;a class=&quot;facebook&quot; href=&quot;https://www.facebook.com/sharer.php?u=http://www.kitploit.com/2021/12/kerberoast-kerberoast-attack-pure-python.html&amp;amp;title=Kerberoast - Kerberoast Attack -Pure Python-&quot; target=&quot;_blank&quot; title=&quot;Facebook: Kerberoast - Kerberoast Saldırısı -Saf Python-&quot;&gt;&lt;i aria-hidden=&quot;true&quot; class=&quot;fab fa-facebook&quot;&gt;&lt;/i&gt;&lt;/a&gt;
&lt;a class=&quot;twitter&quot; href=&quot;https://twitter.com/intent/tweet?text=Kerberoast - Kerberoast Attack -Pure Python- http://www.kitploit.com/2021/12/kerberoast-kerberoast-attack-pure-python.html&quot; target=&quot;_blank&quot; title=&quot;Twitter: Kerberoast - Kerberoast Saldırısı -Saf Python-&quot;&gt;&lt;i aria-hidden=&quot;true&quot; class=&quot;fab fa-twitter&quot;&gt;&lt;/i&gt;&lt;/a&gt;
&lt;a class=&quot;reddit&quot; href=&quot;https://reddit.com/submit/?url=http://www.kitploit.com/2021/12/kerberoast-kerberoast-attack-pure-python.html&amp;amp;title=Kerberoast - Kerberoast Attack -Pure Python-&quot; target=&quot;_blank&quot; title=&quot;Reddit: Kerberoast - Kerberoast Saldırısı -Saf Python-&quot;&gt;&lt;i aria-hidden=&quot;true&quot; class=&quot;fab fa-reddit&quot;&gt;&lt;/i&gt;&lt;/a&gt;
&lt;a class=&quot;linkedin&quot; href=&quot;https://www.linkedin.com/shareArticle?mini=true&amp;amp;url=http://www.kitploit.com/2021/12/kerberoast-kerberoast-attack-pure-python.html&amp;amp;title=Kerberoast - Kerberoast Attack -Pure Python-&quot; target=&quot;_blank&quot; title=&quot;Linkedin: Kerberoast - Kerberoast Saldırısı -Pure Python-&quot;&gt;&lt;i aria-hidden=&quot;true&quot; class=&quot;fab fa-linkedin&quot;&gt;&lt;/i&gt;&lt;/a&gt;
&lt;a class=&quot;whatsapp&quot; data-href=&quot;http://www.kitploit.com/2021/12/kerberoast-kerberoast-attack-pure-python.html&quot; data-text=&quot;Kerberoast - Kerberoast Attack -Pure Python-&quot; href=&quot;whatsapp://send?text=http://www.kitploit.com/2021/12/kerberoast-kerberoast-attack-pure-python.html&quot; title=&quot;Whatsapp: Kerberoast - Kerberoast Saldırısı -Saf Python-&quot;&gt;&lt;i aria-hidden=&quot;true&quot; class=&quot;fab fa-whatsapp&quot;&gt;&lt;/i&gt;&lt;/a&gt;
&lt;a class=&quot;telegram&quot; href=&quot;https://telegram.me/share/url?url=http://www.kitploit.com/2021/12/kerberoast-kerberoast-attack-pure-python.html&amp;amp;text=Kerberoast - Kerberoast Attack -Pure Python-&quot; target=&quot;_blank&quot; title=&quot;Telgraf: Kerberoast - Kerberoast Saldırısı -Saf Python-&quot;&gt;&lt;i aria-hidden=&quot;true&quot; class=&quot;fab fa-telegram&quot;&gt;&lt;/i&gt;&lt;/a&gt;
&lt;a class=&quot;pinterest&quot; href=&quot;https://pinterest.com/pin/create/button/?url=http://www.kitploit.com/2021/12/kerberoast-kerberoast-attack-pure-python.html&amp;amp;media=https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjIqmEinnoPHN_i4WZGxJOpTIabGio_-E2LmqIS6NHR_u3FHFq0mmH1ChWlZhxUgu7khm3F0_tpKaQe-Z1Enb5LXydToAyOuc0tGEwnU-7Xr79kwAcdMtJWDJ5GGw8QWC161QBT5iCtbKP/w640-h320/kerberoast_1-720474.jpeg&amp;amp;description=Kerberoast - Kerberoast Attack -Pure Python-&quot; target=&quot;_blank&quot; title=&quot;Pinterest: Kerberoast - Kerberoast Saldırısı -Pure Python-&quot;&gt;&lt;i aria-hidden=&quot;true&quot; class=&quot;fab fa-pinterest&quot;&gt;&lt;/i&gt;&lt;/a&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;

&lt;div class=&quot;no-items section&quot; id=&quot;ads-title&quot; name=&quot;Ads Below Title - (468x60)&quot;&gt;
&lt;/div&gt;
&lt;a name=&quot;ad-title&quot;&gt;&lt;/a&gt;
&lt;article&gt;
&lt;div class=&quot;post-body entry-content&quot; id=&quot;post-body-1835814990593233741&quot; itemprop=&quot;articleBody&quot;&gt;



&lt;p style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; id=&quot;BLOGGER_PHOTO_ID_7034007238611066146&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjIqmEinnoPHN_i4WZGxJOpTIabGio_-E2LmqIS6NHR_u3FHFq0mmH1ChWlZhxUgu7khm3F0_tpKaQe-Z1Enb5LXydToAyOuc0tGEwnU-7Xr79kwAcdMtJWDJ5GGw8QWC161QBT5iCtbKP/w400-h200/kerberoast_1-720474.jpeg&quot; width=&quot;400&quot; /&gt;&lt;/p&gt;&lt;div style=&quot;margin: 15px;&quot;&gt;



&lt;/div&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;  &lt;span&gt;&lt;/span&gt;&lt;p dir=&quot;auto&quot;&gt;&lt;br /&gt;&lt;/p&gt;  &lt;h3 dir=&quot;auto&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Düzenlemek &lt;/span&gt;&lt;/h3&gt;  &lt;p dir=&quot;auto&quot;&gt;&lt;code&gt;pip3 install kerberoast&lt;/code&gt;&lt;/p&gt;  &lt;h4 dir=&quot;auto&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;önkoşullar &lt;/span&gt;&lt;/h4&gt;  &lt;p dir=&quot;auto&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Python 3.6 Bkz. gereksinimler.txt &lt;/span&gt;&lt;/p&gt;    &lt;p dir=&quot;auto&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;ÖNEMLİ: LDAP ve için kabul edilen hedef url biçimleri &lt;/span&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Kerberos &lt;/span&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;şunlardır: &lt;/span&gt;&lt;br /&gt;  &lt;code&gt;&amp;lt;ldap_connection_url&amp;gt;&lt;/code&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;: &lt;/span&gt;&lt;code&gt;&amp;lt;protocol&amp;gt;+&amp;lt;auth-type&amp;gt;://&amp;lt;domain&amp;gt;\&amp;lt;user&amp;gt;:&amp;lt;password&amp;gt;@&amp;lt;ip_or_hostname&amp;gt;/?&amp;lt;param1&amp;gt;=&amp;lt;value1&amp;gt;&lt;/code&gt;&lt;br /&gt;  &lt;code&gt;&amp;lt;kerberos_connection_url&amp;gt;&lt;/code&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;: &lt;/span&gt;&lt;code&gt;&amp;lt;protocol&amp;gt;+&amp;lt;auth-type&amp;gt;://&amp;lt;domain&amp;gt;\&amp;lt;user&amp;gt;:&amp;lt;password&amp;gt;@&amp;lt;ip_or_hostname&amp;gt;/?&amp;lt;param1&amp;gt;=&amp;lt;value1&amp;gt;&lt;/code&gt;&lt;/p&gt;  &lt;p dir=&quot;auto&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Adımlar -SSPI ile-: &lt;/span&gt;&lt;code&gt;kerberoast auto &amp;lt;DC_ip&amp;gt;&lt;/code&gt;&lt;/p&gt;  &lt;p dir=&quot;auto&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Adımlar -SSPI kullanılmıyor-: &lt;/span&gt;&lt;/p&gt;  &lt;ol dir=&quot;auto&quot;&gt;&lt;li&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;arayın &lt;/span&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;savunmasız &lt;/span&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;LDAP aracılığıyla kullanıcıları &lt;/span&gt;&lt;br /&gt;  &lt;code&gt;kerberoast ldap  all &amp;lt;ldap_connection_url&amp;gt; -o ldapenum&lt;/code&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Kullanıcılara karşı ASREP kızartma kullanın. &lt;/span&gt;&lt;code&gt;ldapenum_asrep_users.txt&lt;/code&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;dosya &lt;/span&gt;&lt;br /&gt;  &lt;code&gt;kerberoast asreproast &amp;lt;DC_ip&amp;gt; -t ldapenum_asrep_users.txt&lt;/code&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Kullanıcılara karşı SPN kızartma kullanın. &lt;/span&gt;&lt;code&gt;ldapenum_spn_users.txt&lt;/code&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;dosya &lt;/span&gt;&lt;br /&gt;  &lt;code&gt;kerberoast spnroast &amp;lt;kerberos_connection_url&amp;gt; -t ldapenum_spn_users.txt&lt;/code&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Hashcat ile Crack SPN kızartma ve ASPREP kızartma çıktısı &lt;/span&gt;&lt;/li&gt;&lt;/ol&gt;  &lt;h2 dir=&quot;auto&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Komutlar &lt;/span&gt;&lt;/h2&gt;  &lt;h3 dir=&quot;auto&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;ldap &lt;/span&gt;&lt;/h3&gt;  &lt;p dir=&quot;auto&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Bu komut grubu, potansiyel olarak savunmasız kullanıcıları LDAP aracılığıyla numaralandırmak içindir. &lt;/span&gt;&lt;/p&gt;  &lt;h4 dir=&quot;auto&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;komut yapısı &lt;/span&gt;&lt;/h4&gt;  &lt;p dir=&quot;auto&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;code&gt;kerberoast ldap &amp;lt;type&amp;gt; &amp;lt;ldap_connection_url&amp;gt; &amp;lt;options&amp;gt;&lt;/code&gt;&lt;/p&gt;  &lt;p dir=&quot;auto&quot;&gt;&lt;code&gt;Type&lt;/code&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;: Numaralandırılacak üç tür kullanıcıyı destekler &lt;/span&gt;&lt;/p&gt;  &lt;ol dir=&quot;auto&quot;&gt;&lt;li&gt;&lt;code&gt;spn&lt;/code&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;ile kullanıcıları numaralandırır &lt;/span&gt;&lt;code&gt;servicePrincipalName&lt;/code&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;öznitelik kümesi. &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;code&gt;asrep&lt;/code&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;ile kullanıcıları numaralandırır &lt;/span&gt;&lt;code&gt;DONT_REQ_PREAUTH&lt;/code&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;UAC özniteliklerinde bayrak seti. &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;code&gt;all&lt;/code&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Yukarıda belirtilen tüm numaralandırmaları başlatır. &lt;/span&gt;&lt;/li&gt;&lt;/ol&gt;  &lt;p dir=&quot;auto&quot;&gt;&lt;code&gt;ldap_connection_url&lt;/code&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;: Kullanıcı kimlik bilgilerini ve hedef sunucuyu msldap url biçiminde belirtir (yardıma bakın) &lt;/span&gt;&lt;/p&gt;  &lt;p dir=&quot;auto&quot;&gt;&lt;code&gt;options&lt;/code&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;: &lt;/span&gt;&lt;br /&gt;  &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;code&gt;-o&lt;/code&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;: Çıktı dosyası temel adı &lt;/span&gt;&lt;/p&gt;  &lt;h3 dir=&quot;auto&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;kaba &lt;/span&gt;&lt;/h3&gt;  &lt;p dir=&quot;auto&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Bu komut, uygulayarak gerçekleştirmek içindir. &lt;/span&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;kullanıcı adı &lt;/span&gt; &lt;span style=&quot;vertical-align: inherit;&quot;&gt;numaralandırmasını &lt;/span&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;kerberos hizmetini olası kullanıcı adı adaylarıyla kaba kuvvet &lt;/span&gt;&lt;/p&gt;  &lt;h4 dir=&quot;auto&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;komut yapısı &lt;/span&gt;&lt;/h4&gt;  &lt;p dir=&quot;auto&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;code&gt;kerberoast brute &amp;lt;realm&amp;gt; &amp;lt;dc_ip&amp;gt; &amp;lt;targets&amp;gt; &amp;lt;options&amp;gt;&lt;/code&gt;&lt;/p&gt;  &lt;p dir=&quot;auto&quot;&gt;&lt;code&gt;realm&lt;/code&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;: Kerberos alemi genellikle &lt;/span&gt;&lt;code&gt;COMPANY.corp&lt;/code&gt;&lt;br /&gt;  &lt;code&gt;dc_ip&lt;/code&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;: Etki alanı denetleyicisinin IP veya ana bilgisayar adı &lt;/span&gt;&lt;br /&gt;  &lt;code&gt;targets&lt;/code&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;: Olası kullanıcı adı adaylarını içeren dosyanın yolu &lt;/span&gt;&lt;br /&gt;  &lt;code&gt;options&lt;/code&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;: &lt;/span&gt;&lt;br /&gt;  &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;code&gt;-o&lt;/code&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;: Çıktı dosyası temel adı &lt;/span&gt;&lt;/p&gt;    &lt;p dir=&quot;auto&quot;&gt;&lt;br /&gt;&lt;/p&gt;  &lt;h4 dir=&quot;auto&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;komut yapısı &lt;/span&gt;&lt;/h4&gt;  &lt;p dir=&quot;auto&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;code&gt;kerberoast asreproast &amp;lt;dc_ip&amp;gt; &amp;lt;options&amp;gt;&lt;/code&gt;&lt;/p&gt;  &lt;p dir=&quot;auto&quot;&gt;&lt;code&gt;dc_ip&lt;/code&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;: Etki alanı denetleyicisinin IP veya ana bilgisayar adı &lt;/span&gt;&lt;br /&gt;  &lt;code&gt;options&lt;/code&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;: &lt;/span&gt;&lt;br /&gt;  &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;code&gt;-r&lt;/code&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;: Kullanılacak kerberos bölgesini belirtir.  Diğer tüm bölge bilgilerini geçersiz kılar. &lt;/span&gt;&lt;br /&gt;  &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;code&gt;-o&lt;/code&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;: Çıktı dosyası temel adı &lt;/span&gt;&lt;br /&gt;  &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;code&gt;-t&lt;/code&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;: içeren dosyanın yolu &lt;/span&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;kullanıcı adlarını &lt;/span&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Saldırının gerçekleştirileceği &lt;/span&gt;&lt;br /&gt;  &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;code&gt;-u&lt;/code&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;: Saldırının gerçekleştirileceği kullanıcıyı belirtir.  Biçim &lt;/span&gt;&lt;code&gt;&amp;lt;username&amp;gt;&lt;/code&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;veya &lt;/span&gt;&lt;code&gt;&amp;lt;username&amp;gt;@&amp;lt;realm&amp;gt;&lt;/code&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;ama ilk durumda, &lt;/span&gt;&lt;code&gt;-r&lt;/code&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;bölge belirtmek için seçenek kullanılmalıdır &lt;/span&gt;&lt;/p&gt;  &lt;h2 dir=&quot;auto&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;kavrulmuş &lt;/span&gt;&lt;/h2&gt;  &lt;p dir=&quot;auto&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Bu komut, SPNroast (AKA kerberoast) saldırısı gerçekleştirmek içindir. &lt;/span&gt;&lt;/p&gt;  &lt;h4 dir=&quot;auto&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;komut yapısı &lt;/span&gt;&lt;/h4&gt;  &lt;p dir=&quot;auto&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;code&gt;kerberoast spnroast &amp;lt;kerberos_connection_url&amp;gt; &amp;lt;options&amp;gt;&lt;/code&gt;&lt;/p&gt;  &lt;p dir=&quot;auto&quot;&gt;&lt;code&gt;kerberos_connection_url&lt;/code&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;: Kullanıcı kimlik bilgilerini ve hedef sunucuyu kerberos URL biçiminde belirtir (yardıma bakın) &lt;/span&gt;&lt;/p&gt;  &lt;p dir=&quot;auto&quot;&gt;&lt;code&gt;options&lt;/code&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;: &lt;/span&gt;&lt;br /&gt;  &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;code&gt;-r&lt;/code&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;: Kullanılacak kerberos bölgesini belirtir.  Diğer tüm bölge bilgilerini geçersiz kılar. &lt;/span&gt;&lt;br /&gt;  &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;code&gt;-o&lt;/code&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;: Çıktı dosyası temel adı &lt;/span&gt;&lt;br /&gt;  &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;code&gt;-t&lt;/code&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;: Saldırının gerçekleştirileceği kullanıcı adlarını içeren dosyanın yolu &lt;/span&gt;&lt;br /&gt;  &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;code&gt;-u&lt;/code&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;: Saldırının gerçekleştirileceği kullanıcıyı belirtir.  Biçim &lt;/span&gt;&lt;code&gt;&amp;lt;username&amp;gt;&lt;/code&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;veya &lt;/span&gt;&lt;code&gt;&amp;lt;username&amp;gt;@&amp;lt;realm&amp;gt;&lt;/code&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;ama ilk durumda, &lt;/span&gt;&lt;code&gt;-r&lt;/code&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;bölge belirtmek için seçenek kullanılmalıdır &lt;/span&gt;&lt;/p&gt;  &lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: x-large;&quot;&gt;&lt;a class=&quot;kiploit-download&quot; href=&quot;https://github.com/skelsec/kerberoast&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;Kerberoast&#39;ı indirin&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Kerberoast&#39;ı indirin &lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/article&gt;

&lt;div style=&quot;clear: both;&quot;&gt;&lt;/div&gt;






&lt;a href=&quot;https://www.kitploit.com&quot; target=&quot;_blank&quot; title=&quot;Kitploit Ana Sayfası&quot;&gt;&lt;img src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhskss8JcpJK8GgX7CRTECwmgprA2zEK38rCN9P33ih7yghQxKOu6rzCOYKpMadYq_G8sO92V-ea9-H49Pm5B3gMtitSZqDrldQuMC5dST1pWB-LbI3aLXOcS-Z_C_1QWSemWl4Rifcb2Y/s1600/Categories-applications-utilities-icon.png&quot; width=&quot;2&quot; /&gt;&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='https://webcnsbilgi.blogspot.com/feeds/6045219200546159133/comments/default' title='Kayıt Yorumları'/><link rel='replies' type='text/html' href='https://webcnsbilgi.blogspot.com/2021/12/kerberoast-kerberoast-saldrs-saf-python.html#comment-form' title='0 Yorum'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5507734888035129853/posts/default/6045219200546159133'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5507734888035129853/posts/default/6045219200546159133'/><link rel='alternate' type='text/html' href='https://webcnsbilgi.blogspot.com/2021/12/kerberoast-kerberoast-saldrs-saf-python.html' title='Kerberoast - Kerberoast Saldırısı -Saf Python'/><author><name>SALVADORES</name><uri>http://www.blogger.com/profile/04940426007136148897</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjIqmEinnoPHN_i4WZGxJOpTIabGio_-E2LmqIS6NHR_u3FHFq0mmH1ChWlZhxUgu7khm3F0_tpKaQe-Z1Enb5LXydToAyOuc0tGEwnU-7Xr79kwAcdMtJWDJ5GGw8QWC161QBT5iCtbKP/s72-w400-h200-c/kerberoast_1-720474.jpeg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5507734888035129853.post-8978791646138016898</id><published>2021-12-06T09:22:00.006-08:00</published><updated>2021-12-06T09:22:46.525-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="bilgi"/><category scheme="http://www.blogger.com/atom/ns#" term="bilgi toplama"/><category scheme="http://www.blogger.com/atom/ns#" term="bilgitoplama"/><category scheme="http://www.blogger.com/atom/ns#" term="browser"/><category scheme="http://www.blogger.com/atom/ns#" term="eposta"/><category scheme="http://www.blogger.com/atom/ns#" term="fake"/><category scheme="http://www.blogger.com/atom/ns#" term="instagram"/><category scheme="http://www.blogger.com/atom/ns#" term="osint"/><category scheme="http://www.blogger.com/atom/ns#" term="telefon"/><category scheme="http://www.blogger.com/atom/ns#" term="tht"/><category scheme="http://www.blogger.com/atom/ns#" term="Toutatis"/><category scheme="http://www.blogger.com/atom/ns#" term="turk hackteam"/><category scheme="http://www.blogger.com/atom/ns#" term="turkhackteam"/><category scheme="http://www.blogger.com/atom/ns#" term="türk hackteam"/><category scheme="http://www.blogger.com/atom/ns#" term="türkhackteam"/><title type='text'> Toutatis - Instagram Hesaplarından E-Posta, Telefon Numarası ve Daha Fazlası Gibi Bilgi Almanıza İzin Veren Bir Araç </title><content type='html'>&lt;h2 dir=&quot;auto&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Kurulum &lt;/span&gt;&lt;/h2&gt;  &lt;h3 dir=&quot;auto&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;PyPI ile &lt;/span&gt;&lt;/h3&gt;  &lt;p dir=&quot;auto&quot;&gt;&lt;code&gt;pip install toutatis&lt;/code&gt;&lt;/p&gt;  &lt;h3 dir=&quot;auto&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Github ile &lt;/span&gt;&lt;/h3&gt;  &lt;div class=&quot;highlight highlight-source-shell position-relative overflow-auto&quot; data-snippet-clipboard-copy-content=&quot;git clone https://github.com/megadose/toutatis.git  cd toutatis/  python3 setup.py install  &quot;&gt;&lt;pre&gt;&lt;code&gt;git clone &lt;a class=&quot;vglnk&quot; href=&quot;https://github.com/megadose/toutatis.git&quot; rel=&quot;nofollow&quot;&gt;&lt;span&gt;https&lt;/span&gt;&lt;span&gt;://&lt;/span&gt;&lt;span&gt;github&lt;/span&gt;&lt;span&gt;.&lt;/span&gt;&lt;span&gt;com&lt;/span&gt;&lt;span&gt;/&lt;/span&gt;&lt;span&gt;megadose&lt;/span&gt;&lt;span&gt;/&lt;/span&gt;&lt;span&gt;toutatis&lt;/span&gt;&lt;span&gt;.&lt;/span&gt;&lt;span&gt;git&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;cd toutatis/&lt;br /&gt;python3 setup.py install&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;  &lt;h2 dir=&quot;auto&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Kullanım: &lt;/span&gt;&lt;/h2&gt;  &lt;div class=&quot;snippet-clipboard-content position-relative overflow-auto&quot; data-snippet-clipboard-copy-content=&quot;toutatis -u &amp;lt;a title=&quot; href=&quot;https://www.kitploit.com/search/label/Username&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;kullanıcı adı -s instagramsessionid &quot;&amp;gt; &lt;/span&gt;&lt;pre&gt;&lt;code&gt;toutatis -u username -s instagramsessionid&lt;br /&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;  &lt;h2 dir=&quot;auto&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Örnek &lt;/span&gt;&lt;/h2&gt;  &lt;div class=&quot;snippet-clipboard-content position-relative overflow-auto&quot; data-snippet-clipboard-copy-content=&quot;Informations about     : xxxusernamexxx  Full Name              : xxxusernamesxx | userID : 123456789  Verified               : False | Is buisness Account : False  Is private Account     : False  Follower               : xxx | Following : xxx  Number of posts        : x  Number of tag in posts : x  External url           : http://example.com  IGTV posts             : x  Biography              : example biography  Public &amp;lt;a title=&quot; href=&quot;https://www.kitploit.com/search/label/Email&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;E-posta : &lt;/span&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;public@example.com &lt;/span&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Genel &lt;/span&gt;&lt;a href=&quot;https://www.kitploit.com/search/label/Phone&quot; target=&quot;_blank&quot; title=&quot;Telefon&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Telefon &lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;: +00 0 00 00 00 00 e-posta : ben******** &lt;/span&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Gizlenmiş s@examplemail.com &lt;/span&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;   &lt;/span&gt;Obfuscated phone       : +00 0xx xxx xx 00  ------------------------  Profile Picture        : &lt;a class=&quot;vglnk&quot; href=&quot;https://scontent-X-X.cdninstagram.com/&quot; rel=&quot;nofollow&quot;&gt;&lt;span&gt;https&lt;/span&gt;&lt;span&gt;://&lt;/span&gt;&lt;span&gt;scontent&lt;/span&gt;&lt;span&gt;-&lt;/span&gt;&lt;span&gt;X&lt;/span&gt;&lt;span&gt;-&lt;/span&gt;&lt;span&gt;X&lt;/span&gt;&lt;span&gt;.&lt;/span&gt;&lt;span&gt;cdninstagram&lt;/span&gt;&lt;span&gt;.&lt;/span&gt;&lt;span&gt;com&lt;/span&gt;&lt;span&gt;/&lt;/span&gt;&lt;/a&gt;  &quot;&amp;gt;&lt;pre&gt;&lt;code&gt;Informations about     : xxxusernamexxx&lt;br /&gt;Full Name              : xxxusernamesxx | userID : 123456789&lt;br /&gt;Verified               : False | Is buisness Account : False&lt;br /&gt;Is private Account     : False&lt;br /&gt;Follower               : xxx | Following : xxx&lt;br /&gt;Number of posts        : x&lt;br /&gt;Number of tag in posts : x&lt;br /&gt;External url           : &lt;a class=&quot;vglnk&quot; href=&quot;http://example.com&quot; rel=&quot;nofollow&quot;&gt;&lt;span&gt;http&lt;/span&gt;&lt;span&gt;://&lt;/span&gt;&lt;span&gt;example&lt;/span&gt;&lt;span&gt;.&lt;/span&gt;&lt;span&gt;com&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;IGTV posts             : x&lt;br /&gt;Biography              : example biography&lt;br /&gt;Public Email           : public@example.com&lt;br /&gt;Public Phone           : +00 0 00 00 00 00&lt;br /&gt;Obfuscated email       : me********s@examplemail.com&lt;br /&gt;Obfuscated phone       : +00 0xx xxx xx 00&lt;br /&gt;------------------------&lt;br /&gt;Profile Picture        : &lt;a class=&quot;vglnk&quot; href=&quot;https://scontent-X-X.cdninstagram.com/&quot; rel=&quot;nofollow&quot;&gt;&lt;span&gt;https&lt;/span&gt;&lt;span&gt;://&lt;/span&gt;&lt;span&gt;scontent&lt;/span&gt;&lt;span&gt;-&lt;/span&gt;&lt;span&gt;X&lt;/span&gt;&lt;span&gt;-&lt;/span&gt;&lt;span&gt;X&lt;/span&gt;&lt;span&gt;.&lt;/span&gt;&lt;span&gt;cdninstagram&lt;/span&gt;&lt;span&gt;.&lt;/span&gt;&lt;span&gt;com&lt;/span&gt;&lt;span&gt;/&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;  &lt;h2 dir=&quot;auto&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Oturum kimliğini almak için &lt;/span&gt;&lt;/h2&gt;  &lt;p dir=&quot;auto&quot;&gt;&lt;a href=&quot;http://instagram.com/can_s_officiall&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;316&quot; id=&quot;BLOGGER_PHOTO_ID_7034010812388540514&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjddrkQLKYcLoJ5nGdU_agZOllJ6Xw5OjNSFbyFkoZkSZgFx9AsgUUlVqeYqUhECuLVIq4hCmWIScnXRjM3fhrFFTJ2m59xmJmcOiVK2u6HmXy782yW-ZrRj5mF9hRhZ7bQ68TxIb1iEcLq/w640-h316/toutatis_1-751785.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/p&gt;  &lt;h2 dir=&quot;auto&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Sanada teşekkürler : &lt;/span&gt;&lt;/h2&gt;  &lt;ul dir=&quot;auto&quot;&gt;&lt;li&gt;&lt;a href=&quot;https://github.com/eyupergin&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;EyüpErgin&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;EyüpErgin &lt;/span&gt;&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://github.com/yazeed44&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;yazeed44&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;yazeed44 &lt;/span&gt;&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;  &lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: x-large;&quot;&gt;&lt;a class=&quot;kiploit-download&quot; href=&quot;https://github.com/megadose/toutatis&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;Toutatis&#39;i indirin&quot;&gt;&lt;span style=&quot;vertical-align: inherit;&quot;&gt;Toutatis&#39;i indirin &lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='https://webcnsbilgi.blogspot.com/feeds/8978791646138016898/comments/default' title='Kayıt Yorumları'/><link rel='replies' type='text/html' href='https://webcnsbilgi.blogspot.com/2021/12/toutatis.html#comment-form' title='0 Yorum'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5507734888035129853/posts/default/8978791646138016898'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5507734888035129853/posts/default/8978791646138016898'/><link rel='alternate' type='text/html' href='https://webcnsbilgi.blogspot.com/2021/12/toutatis.html' title=' Toutatis - Instagram Hesaplarından E-Posta, Telefon Numarası ve Daha Fazlası Gibi Bilgi Almanıza İzin Veren Bir Araç '/><author><name>SALVADORES</name><uri>http://www.blogger.com/profile/04940426007136148897</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjddrkQLKYcLoJ5nGdU_agZOllJ6Xw5OjNSFbyFkoZkSZgFx9AsgUUlVqeYqUhECuLVIq4hCmWIScnXRjM3fhrFFTJ2m59xmJmcOiVK2u6HmXy782yW-ZrRj5mF9hRhZ7bQ68TxIb1iEcLq/s72-w640-h316-c/toutatis_1-751785.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5507734888035129853.post-1023512190264730896</id><published>2021-09-23T07:40:00.001-07:00</published><updated>2021-09-23T07:40:18.055-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="api"/><category scheme="http://www.blogger.com/atom/ns#" term="bruteforce"/><category scheme="http://www.blogger.com/atom/ns#" term="can"/><category scheme="http://www.blogger.com/atom/ns#" term="cans"/><category scheme="http://www.blogger.com/atom/ns#" term="cloud"/><category scheme="http://www.blogger.com/atom/ns#" term="cloudflare"/><category scheme="http://www.blogger.com/atom/ns#" term="cyber"/><category scheme="http://www.blogger.com/atom/ns#" term="cyber security"/><category scheme="http://www.blogger.com/atom/ns#" term="ddos"/><category scheme="http://www.blogger.com/atom/ns#" term="firewall"/><category scheme="http://www.blogger.com/atom/ns#" term="güvenlik duvarı"/><category scheme="http://www.blogger.com/atom/ns#" term="no attack"/><category scheme="http://www.blogger.com/atom/ns#" term="siber güvenlik"/><category scheme="http://www.blogger.com/atom/ns#" term="sucuri"/><category scheme="http://www.blogger.com/atom/ns#" term="waf"/><category scheme="http://www.blogger.com/atom/ns#" term="webcns"/><category scheme="http://www.blogger.com/atom/ns#" term="wordpress"/><category scheme="http://www.blogger.com/atom/ns#" term="wordpress ddos"/><category scheme="http://www.blogger.com/atom/ns#" term="wordpress güvenliği"/><category scheme="http://www.blogger.com/atom/ns#" term="xml rpc"/><title type='text'>WordPress DDoS Saldırısı Nasıl Durdurulur ve Önlenir </title><content type='html'>&lt;div class=&quot;post-detail&quot;&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjdIuoiMwXa7j-bYJSOEYfOxGCcT91bMj_9oiHsbzBCL7lycBMIAc0Bn3LM_NsfuPPEjZ1FQ-lpX0d3H9UMnbek9qQJjtLJQd8lmSWGTJkb9SuVhnzIdtyiajbmrJNJauXXzACP7NKUPU/s700/ddos-attacks-wordpress-secu.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;368&quot; data-original-width=&quot;700&quot; height=&quot;168&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjdIuoiMwXa7j-bYJSOEYfOxGCcT91bMj_9oiHsbzBCL7lycBMIAc0Bn3LM_NsfuPPEjZ1FQ-lpX0d3H9UMnbek9qQJjtLJQd8lmSWGTJkb9SuVhnzIdtyiajbmrJNJauXXzACP7NKUPU/s320/ddos-attacks-wordpress-secu.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;WordPress web sitelerini oluşturmak için çok güçlü ve güvenli bir kod
 temeline sahiptir. Yazılım ayağı çok güçlü olan WordPress’te diğer 
yazılımlar gibi sanal ortamda çok fazla yaygın olan DDoS saldırılarına 
uğrayabilmektedir. DDoS saldırıları çok kötü amaçlı olup web sitelerini 
önce yavaşlatır ardından herkese erişilemez durumuna getirebilir. 
Saldırıların hedefindeki web sitelerinin büyüklüğü ya da küçüklüğü 
önemli değildir. Her boyutta web sitelerine DDoS saldırılarının 
yapıldığı bilinmektedir.&lt;/p&gt;
&lt;p&gt;Web sitelerini bu tür saldırılara karşı korumak ve bu saldırıları 
durdurup, önlemek isteyen kişilere destek olacak bazı mekanizmalar 
vardır. Bir web sitesinin koruma altında veya herhangi bir saldırıya 
karşı hazır durumda olması sitenin yaşayacağı çeşitli kayıpları 
önleyecektir. DDoS saldırılarının ne olduğu, amacı, verdiği zarar ve 
nasıl önleneceği gibi verilerin bilinmesi web sitelerinin yöneticileri 
için çok önemlidir.&lt;/p&gt;
&lt;h2&gt;&lt;strong&gt;DDoS Saldırısı Nedir?&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Dağıtılmış Hizmet Reddi&lt;/strong&gt; saldırılarının kısaltması olan &lt;strong&gt;DDoS saldırıları&lt;/strong&gt;,
 hedefindeki WordPress barındırma sunucusuna çok sayıda istek gönderir. 
Sunucuların istek sınırını aşmaya çalışıp web sayfalarının düzgün 
çalışmasını engellemeye çalışır. Bu engellemeler sonucu hedefte bulunan 
web siteleri yavaşlar ve tamamen erişilmez hale gelerek çöker. DDoS 
saldırıları, DoS yani Hizmet Reddi saldırılarının bir versiyonudur. 
Ancak bu saldırılar DoS saldırılarından bazı özellikleri bakımından 
farklılık gösterir ve bu farklılıklar her iki saldırının kapsamları ile 
başlar. DoS saldırıları tek bir sistem ve saldırı kullanırken, DDoS 
çeşitli bölgelere yayılmış ve pek çok saldırı sistemine yayılmış 
sınıfları kullanır.&lt;/p&gt;
&lt;p&gt;Güvenliği ihlal edilmiş ve tehlikeye atılmış sistemler, zaman zaman 
botnet denilen bir ağ oluşturur. Tehlikeden etkilenen her sistem birer 
bot gibi davranır ve hedeflenen web sitesine ya da sunucusuna 
saldırıların içinde olur. Bu sistemlerin saldırıları hemen fark edilmez 
bu nedenle saldırılar hemen engellenmez ve engelleme işlemleri geç 
olduğu için bu saldırılar web sitelerine en çok hasarı vermektedir.&lt;/p&gt;
&lt;p&gt;DDoS saldırıları mercek altına alındığında, karşılarında oldukça 
büyük internet şirketleri bile savunmasızdır. Örneğin; GitHub popüler 
kod barındırma sistemi olmasına rağmen 2018’de DDoS saldırısına uğradı ve başka DDoS saldırıları dünyanın takip ettiği haber listelerine girdi.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Neden DDoS Saldırıları Olur&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;DDoS saldırılarının ardında birçok neden bulunmaktadır. Bunları şu şekilde sıralamak mümkündür:&lt;/p&gt;
&lt;p&gt;Web sitesinin teknik kısmına meraklı insanlar ve macera peşinde olan 
yazılımcılar ve politik sebeplerin ortaya çıkardığı durumlara değinmek 
isteyen kişiler ve gruplar, belirli bir yerin web sitelerinin 
hizmetlerini kapatmak isteyen gruplar, şantaj ve fidye almak isteyen 
kişiler web sitelerine saldırılar yapmaktadır.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;DDoS Saldırılarından Zarar Gören Kaynaklar&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;DDoS saldırısına uğrayan bir sistem erişime kapanır ya da performansı
 düşer. Bu durum kötü kullanıcı deneyimine, web sitesinde yaşanacak 
maddi zararlara sebep olur ve ayrıca saldırıyı bertaraf etmek için 
harcanacak maddi hasar göz önüne alındığında birçok cep yakan ve itibar 
zararı olduğu görülür.&lt;/p&gt;
&lt;h2&gt;&lt;strong&gt;WordPress DDoS Saldırılarının Durdurulması ve Önlenmesi&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;Çok tehlikeli olan DDoS saldırıları kullanıcılardan kendilerini çok 
iyi gizleyip, engellenmesi zor bir durumdur. WordPress tabanlı web 
siteleri için temel güvenliği sağlayan çok iyi uygulamalar sayesinde 
DDoS saldırılarının bertaraf olması ve web sitelerine zarar vermesi daha
 kolay önlenir ve durdurulur. Kullanıcılar WordPress web sitelerine 
yapılan DDoS saldırılarını çeşitli adımları izleyerek önler ve durdurur.
 Bu adımlar şu şekilde sıralanmaktadır.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;DDoS/Brute Force Saldırıları Dikeylerini Kaldırma&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;WordPress’in sahip olduğu özellikler sayesinde kullanıcılar web 
sitelerine üçüncü taraf eklentiler ve farklı araçlarla entegre olarak 
web sitelerinin yeni özellikler kazanmasıdır.&amp;nbsp; Bu araçları ve 
eklentileri kullanmak için WordPress API’larından bazılarını 
programcıların kullanabileceği hale getirmiştir. API’lar ile üçüncü 
taraf geliştirmeleri WordPress’e eklentilerin etkileşime geçmesini 
sağlayan yöntemdir.&lt;/p&gt;
&lt;p&gt;API’lar web sayfalarını geliştirirken aynı zamanda DDoS saldırıları 
sırasında çok fazla istek almaktadır. DDoS saldırıları tarafından gelen 
istekleri azaltmak için bu araçlar ve eklentiler devre dışı 
bırakılabilir.&lt;/p&gt;
&lt;figure class=&quot;wp-block-image size-large&quot;&gt;&lt;img alt=&quot;Brute Force&quot; class=&quot;wp-image-2511&quot; src=&quot;https://www.wpservis.com/wp-content/uploads/2020/06/brute-force-wordpress.jpg&quot; /&gt;&lt;/figure&gt;
&lt;h3&gt;&lt;strong&gt;WordPress’de XML RPC’yi Devre Dışı Bırakmak&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;XML-RLC, WordPress’le üçüncü taraf uygulamalarının ve araçların 
etkileşim kurmasını sağlamaktadır. Mesela WordPress uygulamasının mobil 
cihazlarda kullanılabilmesi için XML-RPC’nin olması gerekir. Uygulamanın
 mobil uygulamasını kullanmayan web sitelerinin ziyaretçileri 
çoğunluktaysa web sitesi yöneticileri .htaccess dosyasına küçük bir kod 
ekleyerek XML-RPC’yi devre dışı bırakabilirler. Bu kodlar şu şekildedir:&lt;/p&gt;
&lt;pre class=&quot;wp-block-code&quot;&gt;&lt;code&gt;# Block WordPress xmlrpc.php requests

order deny,allow
deny from all
&lt;/code&gt;&lt;/pre&gt;
&lt;h3&gt;&lt;strong&gt;WordPress’te REST API’sını Devre Dışı Bırakmak&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;WordPress’in bu API’ı, eklentilerin ve araçların WordPress verilerine
 ulaşmasını sağlar ve içerikleri güncelleme, silme gibi işlemleri 
yapmasında müsade eder. WordPress REST API şu adımlar izlenerek devre 
dışı bırakılabilir.&lt;/p&gt;
&lt;p&gt;İlk önce WP Reset API’sını Devre Dışı Bırak (Disable WP REST API) 
eklentisi yüklenir ve aktifleştirilir. Eklentinin kurulumu yapıldıktan 
sonra REST API’sını devre dışı bırakacaktır. Bu eklenti WordPress’in 
eklentiler bölümünde bulunmaktadır.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;WAF’yi (Web Sitesi Güvenlik Duvarı) Etkinleştirme&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;a href=&quot;https://developer.wordpress.org/rest-api/&quot; rel=&quot;nofollow&quot; title=&quot;https://developer.wordpress.org/rest-api/&quot;&gt;REST API&lt;/a&gt;
 ve XML-RPC gibi saldıranlara açık olan web sitesi sistemleri devre dışı
 bırakılsa da web siteleri hala DDoS saldırıları karşısında 
korunmasızdır. Çünkü normal HTTP isteklerine karşı web siteleri hala 
zararlı istekler alabilmektedir.&amp;nbsp; REST ve XML-RPC saldırılara karşı 
sınırlı bir güvenlik duvarı sağlamaktadır.&lt;/p&gt;
&lt;p&gt;Web sitelerine gelen DoS saldırılarını manuel olarak engellenmesi bir
 miktar hafifletmek için mümkün olabilir. Ancak manuel müdahale DDoS 
saldırılarına karşı pek etkili değildir. Web sitelerine gelen şüpheli 
istekleri engellemek için web sitesi uygulamasının güvenlik duvarı 
etkinleştirilir.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Uygulamanın güvenlik duvarı, web sitelerine gelecek olan bütün 
trafikler arasında proxy görevi görerek, web sitesine gelen bütün 
şüpheli istekleri yakalar ve sunuculara ulaşmadan engellemek için bazı 
algoritmalar kullanır.&lt;/p&gt;
&lt;figure class=&quot;wp-block-image size-large&quot;&gt;&lt;img alt=&quot;Waf WordPress&quot; class=&quot;wp-image-2512&quot; src=&quot;https://www.wpservis.com/wp-content/uploads/2020/06/waf-wordpress.jpg&quot; /&gt;&lt;/figure&gt;
&lt;p&gt;WordPress’in güvenlik eklentisi ve web siteleri için güvenlik duvarı 
oluşturmada en iyi eklenti Sucuri eklentisidir. Bu eklenti DNS düzeyinde
 çalışarak DDoS saldırı tarafından daha yapılmayan istekleri bularak 
yakalar. Bu nedenle güvenlik duvarı oluşturma işlemleri için en fazla 
tercih ve tavsiye edilen eklentidir. Sucuri eklentisi ücretli olup, 
yıllık fiyatı 20 dolardır. Sucuri eklentisine alternatif olarak 
kullanıcılar &lt;a href=&quot;https://www.cloudflare.com/&quot; rel=&quot;nofollow&quot; title=&quot;https://www.cloudflare.com/&quot;&gt;Cloudflare&lt;/a&gt;
 aracınıda kullanabilirler. Cloudflare’nin ücretsiz olan versiyonu DDoS 
saldırıları için sınırlı koruma sağlamaktadır. Cloudflare’nin ücretli 
versiyonu biraz pahalıdır ve web sitelerine 7 katmanlı DDoS koruması 
sağlar.&lt;/p&gt;
&lt;h2&gt;&lt;strong&gt;DDoS Saldırısı ve Brute Force Saldırısı Arasında Bulunan Farklar&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;DDoS saldırıları hedeflerinde bulunan web sitelerini basit bir şekilde erişilmez hale getirip, yavaşlatmak için kullanılır.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Brute Force Saldırıları&lt;/strong&gt; ise genel olarak bir web 
sitesine veya sisteme yetkisiz erişim için kullanılır. Bunun için bu 
saldırı parolaları tahmin edip rastgele kombinasyonları girerek sisteme 
girmeye çalışır.&lt;/p&gt;
&lt;h2&gt;&lt;strong&gt;Web Sitelerine&lt;/strong&gt; &lt;strong&gt;Yapılan Saldırı DDoS Saldırısı mı Yoksa Başka Saldırı mı?&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;DDoS saldırıları ve Brute Force saldırıları çok yoğun karşılaşılan 
saldırılardır. Her ikiside sunucuların kaynaklarını bir yol bularak 
kullanır bu yüzden her iki Saldırılarının etkileri birbirine benzer. 
Çünkü ikiside web sitelerini yavaştır ve erişilmez hale getirir. Web 
sitelerine yapılan saldırıları öğrenmek isteyen yöneticiler Sucuri 
eklentisine başvurarak, eklentinin giriş raporlarından yapılan 
saldırının türünü basit bir şekilde öğrenebilir.&lt;/p&gt;
&lt;p&gt;Bunun için; yöneticiler web sitelerine Sucuri eklentisini yükleyip 
aktifleştirir bundan sonra Sucuri Güvenliği/Son Girişler sayfasına 
gidilerek sayfada bulunan başarısız girişlere tıklanır. Burada 
yöneticilerin karışısına fazla rastgele giriş isteği varsa web 
sitelerinin Brute Force saldırısı altında olduğunun bilinmesi gerekir.&lt;/p&gt;
&lt;p class=&quot;has-vivid-green-cyan-background-color has-text-color has-background&quot; style=&quot;color: white;&quot;&gt;&lt;strong&gt;Önemli: &lt;/strong&gt;WordPress güvenlik uygulamaları hakkında hazırladığım makaleyide mutlaka okumalısınız: &lt;strong&gt;wpservis.com/wordpress-guvenlik&lt;/strong&gt;&lt;/p&gt;
&lt;h2&gt;&lt;strong&gt;DDoS Saldırıları Anında Yapılacak Şeyler&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;DDoS saldırıları yaşandığında genelde Sucuri ve Cloudflare gibi 
vektörler sayesinde web sitelerinin ziyaretçileri ve yöneticilerine 
yansımadan engellenir. Ancak bazen bütün önlemler alınmış ve web 
uygulaması güvenlik duvarı olsa bile DDoS saldırıları 
gerçekleşebilmektedir. Bu saldırılar çok büyük olduğu zamanlarda web 
siteleri eklenmektedir. Böyle bir durumla karşılaşma ihtimaline karşı 
web sitelerinin yöneticileri, saldırıların öncesine ve sonrasına 
hazırlıklı olup ne yapacaklarını bilmelerinde yarar vardır. Saldırıların
 etkisini azaltmak için yapılacak bir takım şeyler şu şekildedir.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Ekip Üyelerini Uyarmak&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Web sitelerinin sahipleri eğer sayfaları için bir ekibe sahip ise 
onları oluşabilecek saldıranlara karşı bilgilendirmek ve uyarmak 
gerekir. Saldırılar karşısında ne yapacağını bile bir ekip olası 
saldırılar anında ve sonrasında meydana gelecek zararları en aza 
indirecektir.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Müşterileri Oluşan Sorun Hakkında Bilgilendirmek&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Web sitelerinde bir WooCommerce mağazası işleten kişilerin 
sayfalarında DDoS saldırıları esnasın da müşteriler yapacakları 
alışverişin siparişini veremeyebilir ya da hesaplarına 
ulaşamayabilirler. Bu durumlar karşısında müşterileri Bilgilendirmek 
için kişiler sosyal medya hesaplarında oluşan sıkıntı hakkında bir bilgi
 notu paylaşarak müşterilerine oluşan problemin en kısa sürede ortadan 
kalkacağı hakkında bilgi verip ulaşabilirler.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Yapılan saldırının boyutu büyükse ve kısa zamanda ortadan 
kalkmayacaksa müşteriler ile e-posta üzerinden iletişim kurup 
güncellemeleri takip etmeleri istenebilir ve buradan da sürekli gerekli 
bilgilendirmeler yapılabilir. Satış yapan pek çok sitenin VIP 
müşterileri bulunmaktadır, saldırı esnasında bu müşteriler özel olarak 
bilgilendirilebilir. Müşterileri ile iletişim kanalları kuvvetli olan 
web sitelerinin sahipleri saldırı esnasında işletmelerin itibarını daha 
da güçlendirme olanağına sahip olabilirler.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Hosting ve Güvenlik Desteği ile İletişim Kurmak&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Web sitelerine yapılan saldırılar, web sitesi için yapılacak daha 
büyük bir saldırının parçası olabilir. Bu durumda yöneticiler WordPress 
hosting sağlayıcılarını bilgilendirerek, ortaya çıkacak duruma karşı son
 güncellemeleri gerçekleştirmeleri sağlanabilir.&lt;/p&gt;
&lt;p&gt;Saldırı esnasında güvenlik duvarı hizmetine başvurup, web sitelerinin
 DDoS saldırıları altında olduğu bildirilmelidir. Güvenlik duvarı 
hizmetleri ortaya çıkan durumu hafifletebilir ve yöneticileri iyi bir 
şekilde bilgilendirebilir.&lt;/p&gt;
&lt;p class=&quot;has-vivid-red-background-color has-text-color has-background&quot; style=&quot;color: white;&quot;&gt;&lt;strong&gt;Hatırlatma:&lt;/strong&gt; Eğer WordPress sitenizde güvenlik açığı olduğunu düşünüyorsanız, &lt;strong&gt;WordPress destek&lt;/strong&gt; sayfasından bana ulaşabilirsiniz.&lt;/p&gt;
&lt;p&gt;Sucuri eklentisi gibi güvenlik sağlayıcılarında bulunan ayarlar 
Paranoid modunda ayarlanabilir. Bu ayar web sitelerine gelecek olan pek 
çok saldırı niteliğinde ki istekleri engelleyecek ve web sitelerinin 
ziyaretçilere erişilebilir olmasına destek olacaktır.&lt;/p&gt;
&lt;h2&gt;&lt;strong&gt;Sonuç&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;WordPress DDoS saldırıları ve Brute Force hakkında bildiklerimi 
sizlerle paylaşmaya çalıştım. WordPress sitenizi daha güvenilik hale 
getirmek her zaman ilk önceliğiniz olmalı. Hem işinizin hemde 
müşterilerinizin güvenliğini sağlamak adına sitenizi olabildiğince 
güvence altında tutun. &lt;/p&gt;
&lt;p&gt;WordPress dünyada web sitesi kurmak için en popüler üreticiler 
arasında bulunmasına rağmen kötü niyetli korsanlar ve hackerlar 
tarafından saldırılara uğrayabilmektedir. Bu nedenle WordPress 
kullanıcılarının kötü durumlardan kurtarmak için birçok eklentiye 
sahiptir. Kullanıcılar verilen adımları ve sistemleri izleyerek web 
sitelerini saldırılara karşı daha güvenli bir hale getirebilir.&lt;/p&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='https://webcnsbilgi.blogspot.com/feeds/1023512190264730896/comments/default' title='Kayıt Yorumları'/><link rel='replies' type='text/html' href='https://webcnsbilgi.blogspot.com/2021/09/wordpress-ddos-saldrs-nasl-durdurulur.html#comment-form' title='0 Yorum'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5507734888035129853/posts/default/1023512190264730896'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5507734888035129853/posts/default/1023512190264730896'/><link rel='alternate' type='text/html' href='https://webcnsbilgi.blogspot.com/2021/09/wordpress-ddos-saldrs-nasl-durdurulur.html' title='WordPress DDoS Saldırısı Nasıl Durdurulur ve Önlenir '/><author><name>SALVADORES</name><uri>http://www.blogger.com/profile/04940426007136148897</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjdIuoiMwXa7j-bYJSOEYfOxGCcT91bMj_9oiHsbzBCL7lycBMIAc0Bn3LM_NsfuPPEjZ1FQ-lpX0d3H9UMnbek9qQJjtLJQd8lmSWGTJkb9SuVhnzIdtyiajbmrJNJauXXzACP7NKUPU/s72-c/ddos-attacks-wordpress-secu.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5507734888035129853.post-2518541716255476225</id><published>2021-09-23T05:00:00.000-07:00</published><updated>2021-09-23T08:36:42.942-07:00</updated><title type='text'>A New Bug in Microsoft Windows Could Let Hackers Easily Install a Rootkit</title><content type='html'>&lt;br /&gt;Security researchers have disclosed an unpatched weakness in Microsoft Windows Platform Binary Table (WPBT) affecting all Windows-based devices since Windows 8 that could be potentially exploited to install a rootkit and compromise the integrity of devices.&lt;br /&gt;&quot;These flaws make every Windows system vulnerable to easily-crafted attacks that install fraudulent vendor-specific tables,&quot; researchers </content><link rel='replies' type='application/atom+xml' href='https://webcnsbilgi.blogspot.com/feeds/2518541716255476225/comments/default' title='Kayıt Yorumları'/><link rel='replies' type='text/html' href='https://webcnsbilgi.blogspot.com/2021/09/a-new-bug-in-microsoft-windows-could.html#comment-form' title='0 Yorum'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5507734888035129853/posts/default/2518541716255476225'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5507734888035129853/posts/default/2518541716255476225'/><link rel='alternate' type='text/html' href='https://webcnsbilgi.blogspot.com/2021/09/a-new-bug-in-microsoft-windows-could.html' title='A New Bug in Microsoft Windows Could Let Hackers Easily Install a Rootkit'/><author><name>SALVADORES</name><uri>http://www.blogger.com/profile/04940426007136148897</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5507734888035129853.post-7572926318151331350</id><published>2021-09-23T04:16:00.000-07:00</published><updated>2021-09-23T08:36:43.000-07:00</updated><title type='text'>Why You Should Consider QEMU Live Patching</title><content type='html'>&lt;br /&gt;Sysadmins know what the risks are of running unpatched services. Given the choice, and unlimited resources, most hardworking administrators will ensure that all systems and services are patched consistently.&lt;br /&gt;But things are rarely that simple. Technical resources are limited, and patching can often be more complicated than it appears at first glance. Worse, some services are so hidden in the </content><link rel='replies' type='application/atom+xml' href='https://webcnsbilgi.blogspot.com/feeds/7572926318151331350/comments/default' title='Kayıt Yorumları'/><link rel='replies' type='text/html' href='https://webcnsbilgi.blogspot.com/2021/09/why-you-should-consider-qemu-live.html#comment-form' title='0 Yorum'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5507734888035129853/posts/default/7572926318151331350'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5507734888035129853/posts/default/7572926318151331350'/><link rel='alternate' type='text/html' href='https://webcnsbilgi.blogspot.com/2021/09/why-you-should-consider-qemu-live.html' title='Why You Should Consider QEMU Live Patching'/><author><name>SALVADORES</name><uri>http://www.blogger.com/profile/04940426007136148897</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5507734888035129853.post-3458990519524521636</id><published>2021-09-23T03:28:00.000-07:00</published><updated>2021-09-23T08:35:44.118-07:00</updated><title type='text'>SIPVicious (Auditing SIP Based VoIP System) :: Tools</title><content type='html'>&lt;h2 style=&quot;text-align: center;&quot;&gt;SIPVicious (Auditing SIP Based VoIP System) :: Tools&lt;/h2&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhd14GWgu7FoyX1eQZkW_VQ7pzdbkpm8oLskPid-BvW-42lJk4NfXhOwB-en4b5dJjWY7n2flUeSayhijBuP6n1sbs8olY7nFhrEWLedwqQXnbt-hdSs1ua80FEN0_rcd-wpZBPdA6brYM7/s640/22.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;362&quot; data-original-width=&quot;640&quot; height=&quot;362&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhd14GWgu7FoyX1eQZkW_VQ7pzdbkpm8oLskPid-BvW-42lJk4NfXhOwB-en4b5dJjWY7n2flUeSayhijBuP6n1sbs8olY7nFhrEWLedwqQXnbt-hdSs1ua80FEN0_rcd-wpZBPdA6brYM7/w640-h362/22.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;b&gt;SVMAP &lt;/b&gt;is a part of a suite of tools called SIPVicious and it’s my favorite scanner of choice It can be used to scan identify and fingerprint a single IP or a range of IP addresses. Svmap allows specifying the request method which is being used for scanning, the default method is OPTIONS, it offers debug and verbosity options and even allows scanning the SRV records for SIP on the destination domain. You can use the ./svmap –h in order to view all the available arguments.&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;b&gt;SIPVicious&lt;/b&gt; &lt;b&gt;suite &lt;/b&gt;is a set of tools that can be used to audit SIP based VoIP systems. It currently consists of four tools:&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;svmap - this is a sip scanner. Lists SIP devices found on an IP range&lt;/li&gt;&lt;li&gt;svwar - identifies active extensions on a PBX&lt;/li&gt;&lt;li&gt;svcrack - an online password cracker for SIP PBX&lt;/li&gt;&lt;li&gt;svreport - manages sessions and exports reports to various formats&lt;/li&gt;&lt;li&gt;svcrash - attempts to stop unauthorized svwar and svcrack scans&lt;/li&gt;&lt;/ul&gt;&lt;div&gt;It was tested on the following systems:&lt;/div&gt;&lt;div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Linux&lt;/li&gt;&lt;li&gt;Mac OS X&lt;/li&gt;&lt;li&gt;Windows&lt;/li&gt;&lt;li&gt;FreeBSD 6.2&lt;/li&gt;&lt;li&gt;Jailbroken iPhone with python installed&lt;/li&gt;&lt;/ul&gt;&lt;div&gt;If you use it on systems that are not mentioned here please let me know goes it goes.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;Tutorials ::&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;iframe allowfullscreen=&quot;&quot; class=&quot;BLOG_video_class&quot; height=&quot;328&quot; src=&quot;https://www.youtube.com/embed/Zp_gzjV8l4c&quot; width=&quot;552&quot; youtube-src-id=&quot;Zp_gzjV8l4c&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;b&gt;DOWNLOAD MENU&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://web.archive.org/web/20150801214315/http://sipvicious.googlecode.com/files/sipvicious-0.2.8.tar.gz&quot; imageanchor=&quot;1&quot; rel=&quot;nofollow&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;128&quot; data-original-width=&quot;320&quot; height=&quot;128&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiu7UB5JAuWzsCldSuT38JGv_kNsjr1ox8Jgu5NxUQiqWNeJ_6SU-9yBO_dMqEG1Q2T6uPiH0KK0M_KOJ4KFnf3m3kX0iJxE3senon_H8f-YHBoC1WtQsdX-DqzQHQyd4YqEVgN6IXhVrAt/s0/hackerhubb-download-buton.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='https://webcnsbilgi.blogspot.com/feeds/3458990519524521636/comments/default' title='Kayıt Yorumları'/><link rel='replies' type='text/html' href='https://webcnsbilgi.blogspot.com/2021/09/sipvicious-auditing-sip-based-voip.html#comment-form' title='0 Yorum'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5507734888035129853/posts/default/3458990519524521636'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5507734888035129853/posts/default/3458990519524521636'/><link rel='alternate' type='text/html' href='https://webcnsbilgi.blogspot.com/2021/09/sipvicious-auditing-sip-based-voip.html' title='SIPVicious (Auditing SIP Based VoIP System) :: Tools'/><author><name>SALVADORES</name><uri>http://www.blogger.com/profile/04940426007136148897</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhd14GWgu7FoyX1eQZkW_VQ7pzdbkpm8oLskPid-BvW-42lJk4NfXhOwB-en4b5dJjWY7n2flUeSayhijBuP6n1sbs8olY7nFhrEWLedwqQXnbt-hdSs1ua80FEN0_rcd-wpZBPdA6brYM7/s72-w640-h362-c/22.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5507734888035129853.post-7870204491667151183</id><published>2021-09-23T02:55:00.001-07:00</published><updated>2021-09-23T08:36:43.083-07:00</updated><title type='text'>Colombian Real Estate Agency Leak Exposes Records of Over 100,000 Buyers</title><content type='html'>&lt;br /&gt;More than one terabyte of data containing 5.5 million files has been left exposed, leaking personal information of over 100,000 customers of a Colombian real estate firm, according to cybersecurity company WizCase.&lt;br /&gt;The breach was discovered by Ata Hakçıl and his team in a database owned by Coninsa Ramon H, a company that specializes in architecture, engineering, construction, and real estate </content><link rel='replies' type='application/atom+xml' href='https://webcnsbilgi.blogspot.com/feeds/7870204491667151183/comments/default' title='Kayıt Yorumları'/><link rel='replies' type='text/html' href='https://webcnsbilgi.blogspot.com/2021/09/colombian-real-estate-agency-leak.html#comment-form' title='0 Yorum'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5507734888035129853/posts/default/7870204491667151183'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5507734888035129853/posts/default/7870204491667151183'/><link rel='alternate' type='text/html' href='https://webcnsbilgi.blogspot.com/2021/09/colombian-real-estate-agency-leak.html' title='Colombian Real Estate Agency Leak Exposes Records of Over 100,000 Buyers'/><author><name>SALVADORES</name><uri>http://www.blogger.com/profile/04940426007136148897</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5507734888035129853.post-8360737331552249737</id><published>2021-09-23T02:55:00.000-07:00</published><updated>2021-09-23T08:36:43.046-07:00</updated><title type='text'>New Android Malware Targeting US, Canadian Users with COVID-19 Lures</title><content type='html'>&lt;br /&gt;An &quot;insidious&quot; new SMS smishing malware has been found targeting Android mobile users in the U.S. and Canada as part of a new campaign that uses SMS text message lures related to COVID-19 regulations and vaccine information in an attempt to steal personal and financial data.&lt;br /&gt;Proofpoint&#39;s messaging security subsidiary Cloudmark coined the emerging malware &quot;TangleBot.&quot;&lt;br /&gt;&lt;!--adsense--&gt;&lt;br /&gt;&quot;The malware </content><link rel='replies' type='application/atom+xml' href='https://webcnsbilgi.blogspot.com/feeds/8360737331552249737/comments/default' title='Kayıt Yorumları'/><link rel='replies' type='text/html' href='https://webcnsbilgi.blogspot.com/2021/09/new-android-malware-targeting-us.html#comment-form' title='0 Yorum'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5507734888035129853/posts/default/8360737331552249737'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5507734888035129853/posts/default/8360737331552249737'/><link rel='alternate' type='text/html' href='https://webcnsbilgi.blogspot.com/2021/09/new-android-malware-targeting-us.html' title='New Android Malware Targeting US, Canadian Users with COVID-19 Lures'/><author><name>SALVADORES</name><uri>http://www.blogger.com/profile/04940426007136148897</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5507734888035129853.post-8727303890208674905</id><published>2021-09-22T05:25:00.000-07:00</published><updated>2021-09-23T08:36:43.121-07:00</updated><title type='text'>Microsoft Warns of a Wide-Scale Phishing-as-a-Service Operation</title><content type='html'>&lt;br /&gt;Microsoft has opened the lid on a large-scale phishing-as-a-service (PHaaS) operation that&#39;s involved in selling phishing kits and email templates as well as providing hosting and automated services at a low cost, thus enabling cyber actors to purchase phishing campaigns and deploy them with minimal efforts.&lt;br /&gt;&quot;With over 100 available phishing templates that mimic known brands and services, the </content><link rel='replies' type='application/atom+xml' href='https://webcnsbilgi.blogspot.com/feeds/8727303890208674905/comments/default' title='Kayıt Yorumları'/><link rel='replies' type='text/html' href='https://webcnsbilgi.blogspot.com/2021/09/microsoft-warns-of-wide-scale-phishing.html#comment-form' title='0 Yorum'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5507734888035129853/posts/default/8727303890208674905'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5507734888035129853/posts/default/8727303890208674905'/><link rel='alternate' type='text/html' href='https://webcnsbilgi.blogspot.com/2021/09/microsoft-warns-of-wide-scale-phishing.html' title='Microsoft Warns of a Wide-Scale Phishing-as-a-Service Operation'/><author><name>SALVADORES</name><uri>http://www.blogger.com/profile/04940426007136148897</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5507734888035129853.post-2534964929419517303</id><published>2021-09-22T03:38:00.001-07:00</published><updated>2021-09-23T08:36:43.207-07:00</updated><title type='text'>How Cynet&amp;#39;s Response Automation Helps Organizations Mitigate Cyber Threats</title><content type='html'>&lt;br /&gt;One of the determining factors of how much damage a cyber-attack cause is how fast organizations can respond to it. Time to response is critical for security teams, and it is a major hurdle for leaner teams.&lt;br /&gt;To help improve this metric and enhance organizations’ ability to respond to attacks quickly, many endpoint detection and response (EDR) and extended detection and response (XDR) vendors </content><link rel='replies' type='application/atom+xml' href='https://webcnsbilgi.blogspot.com/feeds/2534964929419517303/comments/default' title='Kayıt Yorumları'/><link rel='replies' type='text/html' href='https://webcnsbilgi.blogspot.com/2021/09/how-cynet-response-automation-helps.html#comment-form' title='0 Yorum'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5507734888035129853/posts/default/2534964929419517303'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5507734888035129853/posts/default/2534964929419517303'/><link rel='alternate' type='text/html' href='https://webcnsbilgi.blogspot.com/2021/09/how-cynet-response-automation-helps.html' title='How Cynet&amp;#39;s Response Automation Helps Organizations Mitigate Cyber Threats'/><author><name>SALVADORES</name><uri>http://www.blogger.com/profile/04940426007136148897</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5507734888035129853.post-6928895869414715146</id><published>2021-09-22T03:38:00.000-07:00</published><updated>2021-09-23T08:36:43.168-07:00</updated><title type='text'>New Nagios Software Bugs Could Let Hackers Take Over IT Infrastructures</title><content type='html'>&lt;br /&gt;As many as 11 security vulnerabilities have been disclosed in Nagios network management systems, some of which could be chained to achieve pre-authenticated remote code execution with the highest privileges, as well as lead to credential theft and phishing attacks. &lt;br /&gt;Industrial cybersecurity firm Claroty, which discovered the flaws, said flaws in tools such as Nagios make them an attractive </content><link rel='replies' type='application/atom+xml' href='https://webcnsbilgi.blogspot.com/feeds/6928895869414715146/comments/default' title='Kayıt Yorumları'/><link rel='replies' type='text/html' href='https://webcnsbilgi.blogspot.com/2021/09/new-nagios-software-bugs-could-let.html#comment-form' title='0 Yorum'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5507734888035129853/posts/default/6928895869414715146'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5507734888035129853/posts/default/6928895869414715146'/><link rel='alternate' type='text/html' href='https://webcnsbilgi.blogspot.com/2021/09/new-nagios-software-bugs-could-let.html' title='New Nagios Software Bugs Could Let Hackers Take Over IT Infrastructures'/><author><name>SALVADORES</name><uri>http://www.blogger.com/profile/04940426007136148897</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5507734888035129853.post-8377058068157008232</id><published>2021-09-21T23:16:00.000-07:00</published><updated>2021-09-23T08:36:43.246-07:00</updated><title type='text'>US Sanctions Cryptocurrency Exchange SUEX for Aiding Ransomware Gangs</title><content type='html'>&lt;br /&gt;The U.S. Treasury Department on Tuesday imposed sanctions on Russian cryptocurrency exchange Suex for helping facilitate and launder transactions from at least eight ransomware variants as part of the government&#39;s efforts to crack down on a surge in ransomware incidents and make it difficult for bad actors to profit from such attacks using digital currencies.&lt;br /&gt;&quot;Virtual currency exchanges such as </content><link rel='replies' type='application/atom+xml' href='https://webcnsbilgi.blogspot.com/feeds/8377058068157008232/comments/default' title='Kayıt Yorumları'/><link rel='replies' type='text/html' href='https://webcnsbilgi.blogspot.com/2021/09/us-sanctions-cryptocurrency-exchange.html#comment-form' title='0 Yorum'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5507734888035129853/posts/default/8377058068157008232'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5507734888035129853/posts/default/8377058068157008232'/><link rel='alternate' type='text/html' href='https://webcnsbilgi.blogspot.com/2021/09/us-sanctions-cryptocurrency-exchange.html' title='US Sanctions Cryptocurrency Exchange SUEX for Aiding Ransomware Gangs'/><author><name>SALVADORES</name><uri>http://www.blogger.com/profile/04940426007136148897</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5507734888035129853.post-1794665902620837681</id><published>2021-09-21T21:18:00.000-07:00</published><updated>2021-09-23T08:36:43.293-07:00</updated><title type='text'>The Gap in Your Zero Trust Implementation</title><content type='html'>&lt;br /&gt;Over the last several years, there have been numerous high-profile security breaches. These breaches have underscored the fact that traditional cyber defenses have become woefully inadequate and that stronger defenses are needed. As such, many organizations have transitioned toward a zero trust security model.&lt;br /&gt;A zero trust security model is based on the idea that no IT resource should be trusted</content><link rel='replies' type='application/atom+xml' href='https://webcnsbilgi.blogspot.com/feeds/1794665902620837681/comments/default' title='Kayıt Yorumları'/><link rel='replies' type='text/html' href='https://webcnsbilgi.blogspot.com/2021/09/the-gap-in-your-zero-trust.html#comment-form' title='0 Yorum'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5507734888035129853/posts/default/1794665902620837681'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5507734888035129853/posts/default/1794665902620837681'/><link rel='alternate' type='text/html' href='https://webcnsbilgi.blogspot.com/2021/09/the-gap-in-your-zero-trust.html' title='The Gap in Your Zero Trust Implementation'/><author><name>SALVADORES</name><uri>http://www.blogger.com/profile/04940426007136148897</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5507734888035129853.post-8810631212819295451</id><published>2021-09-21T20:34:00.000-07:00</published><updated>2021-09-23T08:36:43.340-07:00</updated><title type='text'>High-Severity RCE Flaw Disclosed in Several Netgear Router Models</title><content type='html'>&lt;br /&gt;Networking equipment company Netgear has released patches to remediate a high-severity remote code execution vulnerability affecting multiple routers that could be exploited by remote attackers to take control of an affected system.&lt;br /&gt;&lt;!--adsense--&gt;&lt;br /&gt;Traced as CVE-2021-40847 (CVSS score: 8.1), the security weakness impacts the following models -&lt;br /&gt;&lt;br /&gt;R6400v2 (fixed in firmware version 1.0.4.120)&lt;br /&gt;R6700 </content><link rel='replies' type='application/atom+xml' href='https://webcnsbilgi.blogspot.com/feeds/8810631212819295451/comments/default' title='Kayıt Yorumları'/><link rel='replies' type='text/html' href='https://webcnsbilgi.blogspot.com/2021/09/high-severity-rce-flaw-disclosed-in.html#comment-form' title='0 Yorum'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5507734888035129853/posts/default/8810631212819295451'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5507734888035129853/posts/default/8810631212819295451'/><link rel='alternate' type='text/html' href='https://webcnsbilgi.blogspot.com/2021/09/high-severity-rce-flaw-disclosed-in.html' title='High-Severity RCE Flaw Disclosed in Several Netgear Router Models'/><author><name>SALVADORES</name><uri>http://www.blogger.com/profile/04940426007136148897</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5507734888035129853.post-8897273877817119549</id><published>2021-09-21T20:09:00.000-07:00</published><updated>2021-09-23T08:36:43.388-07:00</updated><title type='text'>VMware Warns of Critical File Upload Vulnerability Affecting vCenter Server</title><content type='html'>&lt;br /&gt;VMware on Tuesday published a new bulletin warning of as many as 19 vulnerabilities in vCenter Server and Cloud Foundation appliances that a remote attacker could exploit to take control of an affected system.&lt;br /&gt;The most urgent among them is an arbitrary file upload vulnerability in the Analytics service (CVE-2021-22005) that impacts vCenter Server 6.7 and 7.0 deployments. &quot;A malicious actor with </content><link rel='replies' type='application/atom+xml' href='https://webcnsbilgi.blogspot.com/feeds/8897273877817119549/comments/default' title='Kayıt Yorumları'/><link rel='replies' type='text/html' href='https://webcnsbilgi.blogspot.com/2021/09/vmware-warns-of-critical-file-upload.html#comment-form' title='0 Yorum'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5507734888035129853/posts/default/8897273877817119549'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5507734888035129853/posts/default/8897273877817119549'/><link rel='alternate' type='text/html' href='https://webcnsbilgi.blogspot.com/2021/09/vmware-warns-of-critical-file-upload.html' title='VMware Warns of Critical File Upload Vulnerability Affecting vCenter Server'/><author><name>SALVADORES</name><uri>http://www.blogger.com/profile/04940426007136148897</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5507734888035129853.post-8955175677398496489</id><published>2021-09-21T09:48:00.000-07:00</published><updated>2021-09-23T08:36:43.435-07:00</updated><title type='text'>Unpatched High-Severity Vulnerability Affects Apple macOS Computers</title><content type='html'>&lt;br /&gt;Cybersecurity researchers on Tuesday disclosed details of an unpatched zero-day vulnerability in macOS Finder that could be abused by remote adversaries to trick users into running arbitrary commands on the machines.&lt;br /&gt;&quot;A vulnerability in macOS Finder allows files whose extension is inetloc to execute arbitrary commands, these files can be embedded inside emails which if the user clicks on them </content><link rel='replies' type='application/atom+xml' href='https://webcnsbilgi.blogspot.com/feeds/8955175677398496489/comments/default' title='Kayıt Yorumları'/><link rel='replies' type='text/html' href='https://webcnsbilgi.blogspot.com/2021/09/unpatched-high-severity-vulnerability.html#comment-form' title='0 Yorum'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5507734888035129853/posts/default/8955175677398496489'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5507734888035129853/posts/default/8955175677398496489'/><link rel='alternate' type='text/html' href='https://webcnsbilgi.blogspot.com/2021/09/unpatched-high-severity-vulnerability.html' title='Unpatched High-Severity Vulnerability Affects Apple macOS Computers'/><author><name>SALVADORES</name><uri>http://www.blogger.com/profile/04940426007136148897</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5507734888035129853.post-5596043577020424955</id><published>2021-09-21T05:34:00.000-07:00</published><updated>2021-09-23T08:35:44.181-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="ALL TOOLS"/><category scheme="http://www.blogger.com/atom/ns#" term="Information Tools"/><title type='text'>Creepy (A Geolocation OSINT Tool) :: Tools</title><content type='html'>&lt;h2 style=&quot;text-align: center;&quot;&gt;Creepy (A Geolocation OSINT Tool) :: Tools&lt;/h2&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUWBLhLs1LPJ1Skz47jvnRPp4zd0A3raPHda_5jANm-yqNFpJYFuCM6A6yYuBDHctcFMEqCDbRt1OSxoXTTq1UAuhrID03EsMigUmj2frn198T5JIdfDioGXkRfLdOs_1Y8vHmoQTqRTt4/s400/creepy.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;233&quot; data-original-width=&quot;400&quot; height=&quot;372&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUWBLhLs1LPJ1Skz47jvnRPp4zd0A3raPHda_5jANm-yqNFpJYFuCM6A6yYuBDHctcFMEqCDbRt1OSxoXTTq1UAuhrID03EsMigUmj2frn198T5JIdfDioGXkRfLdOs_1Y8vHmoQTqRTt4/w640-h372/creepy.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;span face=&quot;Verdana, Geneva, sans-serif&quot; style=&quot;background-color: white; color: #333333; font-size: 12px; text-align: justify;&quot;&gt;Creepy is an open-source Geolocation intelligence tool. It collects information about Geolocation by using various social networking platforms and image hosting services that are already published somewhere else. Creepy presents the reports on the map, using a search filter based on the exact location and date. These reports are available in CSV or KML format to export for additional analysis.&lt;/span&gt;&lt;div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span face=&quot;Verdana, Geneva, sans-serif&quot; style=&quot;color: #333333;&quot;&gt;&lt;span style=&quot;font-size: 12px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;h3 style=&quot;background-color: white; color: #333333; font-family: &amp;quot;Open Sans&amp;quot;, serif, sans-serif; font-size: 16.8px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-weight: normal; line-height: normal; margin: 0px; text-align: left;&quot;&gt;Quick Start Instructions&lt;/h3&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span face=&quot;Verdana, Geneva, sans-serif&quot; style=&quot;background-color: white; color: #333333; font-size: 12px;&quot;&gt;Download creepy ( source code or the installers provided here for your platform )&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;background-color: white; font-size: 12px;&quot;&gt;&lt;span face=&quot;Verdana, Geneva, sans-serif&quot; style=&quot;color: #333333;&quot;&gt;Configure the plugins. Edit -&amp;gt; Plugins Configuration -&amp;gt; Select plugin and run the wizards, following the instructions&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;background-color: white; font-size: 12px;&quot;&gt;&lt;span face=&quot;Verdana, Geneva, sans-serif&quot; style=&quot;color: #333333;&quot;&gt;Create a new project : Creepy -&amp;gt; New Project -&amp;gt; Person Based Project . Search for the target selecting the available plugins.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;background-color: white; font-size: 12px;&quot;&gt;&lt;span face=&quot;Verdana, Geneva, sans-serif&quot; style=&quot;color: #333333;&quot;&gt;Right click on the project -&amp;gt; Analyze Current Project&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;background-color: white; font-size: 12px;&quot;&gt;&lt;span face=&quot;Verdana, Geneva, sans-serif&quot; style=&quot;color: #333333;&quot;&gt;Wait :)&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;background-color: white; font-size: 12px;&quot;&gt;&lt;span face=&quot;Verdana, Geneva, sans-serif&quot; style=&quot;color: #333333;&quot;&gt;The locations will be drawn on the map, once the analysis is complete.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;background-color: white; font-size: 12px;&quot;&gt;&lt;span face=&quot;Verdana, Geneva, sans-serif&quot; style=&quot;color: #333333;&quot;&gt;Filter locations, export locations, view them on the map.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div&gt;&lt;span face=&quot;Verdana, Geneva, sans-serif&quot; style=&quot;color: #333333;&quot;&gt;&lt;span style=&quot;font-size: 12px;&quot;&gt;&lt;b&gt;Installation : &lt;/b&gt;&lt;a href=&quot;https://www.geocreepy.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Installation Guide&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span face=&quot;Verdana, Geneva, sans-serif&quot; style=&quot;color: #333333;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span face=&quot;Verdana, Geneva, sans-serif&quot; style=&quot;color: #333333;&quot;&gt;&lt;b&gt;Download Here:&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span face=&quot;Verdana, Geneva, sans-serif&quot; style=&quot;color: #333333;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span face=&quot;Verdana, Geneva, sans-serif&quot; style=&quot;color: #333333;&quot;&gt;&lt;a href=&quot;https://github.com/jkakavas/creepy/releases/download/v1.4.1/creepy_setup_v1.4.1_x86_64.exe&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Creepy v1.4.1 Windows x64&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span face=&quot;Verdana, Geneva, sans-serif&quot; style=&quot;color: #333333;&quot;&gt;Creepy v1.4.1 Windows x32&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span face=&quot;Verdana, Geneva, sans-serif&quot; style=&quot;color: #333333;&quot;&gt;Creepy v1.4.1 OSX&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='https://webcnsbilgi.blogspot.com/feeds/5596043577020424955/comments/default' title='Kayıt Yorumları'/><link rel='replies' type='text/html' href='https://webcnsbilgi.blogspot.com/2021/09/creepy-geolocation-osint-tool-tools.html#comment-form' title='0 Yorum'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5507734888035129853/posts/default/5596043577020424955'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5507734888035129853/posts/default/5596043577020424955'/><link rel='alternate' type='text/html' href='https://webcnsbilgi.blogspot.com/2021/09/creepy-geolocation-osint-tool-tools.html' title='Creepy (A Geolocation OSINT Tool) :: Tools'/><author><name>SALVADORES</name><uri>http://www.blogger.com/profile/04940426007136148897</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUWBLhLs1LPJ1Skz47jvnRPp4zd0A3raPHda_5jANm-yqNFpJYFuCM6A6yYuBDHctcFMEqCDbRt1OSxoXTTq1UAuhrID03EsMigUmj2frn198T5JIdfDioGXkRfLdOs_1Y8vHmoQTqRTt4/s72-w640-h372-c/creepy.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5507734888035129853.post-9163330110030218529</id><published>2021-09-21T05:27:00.000-07:00</published><updated>2021-09-23T08:36:43.506-07:00</updated><title type='text'>Cring Ransomware Gang Exploits 11-Year-Old ColdFusion Bug</title><content type='html'>&lt;br /&gt;Unidentified threat actors breached a server running an unpatched, 11-year-old version of Adobe&#39;s ColdFusion 9 software in minutes to remotely take over control and deploy file-encrypting Cring ransomware on the target&#39;s network 79 hours after the hack.&lt;br /&gt;The server, which belonged to an unnamed services company, was used to collect timesheet and accounting data for payroll as well as to host a </content><link rel='replies' type='application/atom+xml' href='https://webcnsbilgi.blogspot.com/feeds/9163330110030218529/comments/default' title='Kayıt Yorumları'/><link rel='replies' type='text/html' href='https://webcnsbilgi.blogspot.com/2021/09/cring-ransomware-gang-exploits-11-year.html#comment-form' title='0 Yorum'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5507734888035129853/posts/default/9163330110030218529'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5507734888035129853/posts/default/9163330110030218529'/><link rel='alternate' type='text/html' href='https://webcnsbilgi.blogspot.com/2021/09/cring-ransomware-gang-exploits-11-year.html' title='Cring Ransomware Gang Exploits 11-Year-Old ColdFusion Bug'/><author><name>SALVADORES</name><uri>http://www.blogger.com/profile/04940426007136148897</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5507734888035129853.post-4823043874601912624</id><published>2021-09-21T03:08:00.000-07:00</published><updated>2021-09-23T08:36:43.552-07:00</updated><title type='text'>New Capoae Malware Infiltrates WordPress Sites and Installs Backdoored Plugin</title><content type='html'>&lt;br /&gt;A recently discovered wave of malware attacks has been spotted using a variety of tactics to enslave susceptible machines with easy-to-guess administrative credentials to co-opt them into a network with the goal of illegally mining cryptocurrency.&lt;br /&gt;&quot;The malware&#39;s primary tactic is to spread by taking advantage of vulnerable systems and weak administrative credentials. Once they&#39;ve been infected, </content><link rel='replies' type='application/atom+xml' href='https://webcnsbilgi.blogspot.com/feeds/4823043874601912624/comments/default' title='Kayıt Yorumları'/><link rel='replies' type='text/html' href='https://webcnsbilgi.blogspot.com/2021/09/new-capoae-malware-infiltrates.html#comment-form' title='0 Yorum'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5507734888035129853/posts/default/4823043874601912624'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5507734888035129853/posts/default/4823043874601912624'/><link rel='alternate' type='text/html' href='https://webcnsbilgi.blogspot.com/2021/09/new-capoae-malware-infiltrates.html' title='New Capoae Malware Infiltrates WordPress Sites and Installs Backdoored Plugin'/><author><name>SALVADORES</name><uri>http://www.blogger.com/profile/04940426007136148897</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5507734888035129853.post-7855297226594158805</id><published>2021-09-21T01:30:00.000-07:00</published><updated>2021-09-23T08:36:43.598-07:00</updated><title type='text'>Cybersecurity Priorities in 2021: How Can CISOs Re-Analyze and Shift Focus?</title><content type='html'>&lt;br /&gt;2020 was a year of relentless disruptions. The protective layer of secured enterprise networks and controlled IT environments of the physical premises did not exist. Over the past year, CISOs (Chief Information Security Officers) have had to grapple with the challenges of bolstering the security posture, minimizing risks, and ensuring business continuity in the new normal. The rise in volumes </content><link rel='replies' type='application/atom+xml' href='https://webcnsbilgi.blogspot.com/feeds/7855297226594158805/comments/default' title='Kayıt Yorumları'/><link rel='replies' type='text/html' href='https://webcnsbilgi.blogspot.com/2021/09/cybersecurity-priorities-in-2021-how.html#comment-form' title='0 Yorum'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5507734888035129853/posts/default/7855297226594158805'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5507734888035129853/posts/default/7855297226594158805'/><link rel='alternate' type='text/html' href='https://webcnsbilgi.blogspot.com/2021/09/cybersecurity-priorities-in-2021-how.html' title='Cybersecurity Priorities in 2021: How Can CISOs Re-Analyze and Shift Focus?'/><author><name>SALVADORES</name><uri>http://www.blogger.com/profile/04940426007136148897</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5507734888035129853.post-1240025081585983145</id><published>2021-09-20T04:54:00.000-07:00</published><updated>2021-09-23T08:36:43.645-07:00</updated><title type='text'>Europol Busts Major Crime Ring, Arrests Over 100 Online Fraudsters</title><content type='html'>&lt;br /&gt;Law enforcement agencies in Italy and Spain have dismantled an organized crime group linked to the Italian Mafia that was involved in online fraud, money laundering, drug trafficking, and property crime, netting the gang about €10 million ($11.7 million) in illegal proceeds in just a year.&lt;br /&gt;&quot;The suspects defrauded hundreds of victims through phishing attacks and other types of online fraud such </content><link rel='replies' type='application/atom+xml' href='https://webcnsbilgi.blogspot.com/feeds/1240025081585983145/comments/default' title='Kayıt Yorumları'/><link rel='replies' type='text/html' href='https://webcnsbilgi.blogspot.com/2021/09/europol-busts-major-crime-ring-arrests.html#comment-form' title='0 Yorum'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5507734888035129853/posts/default/1240025081585983145'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5507734888035129853/posts/default/1240025081585983145'/><link rel='alternate' type='text/html' href='https://webcnsbilgi.blogspot.com/2021/09/europol-busts-major-crime-ring-arrests.html' title='Europol Busts Major Crime Ring, Arrests Over 100 Online Fraudsters'/><author><name>SALVADORES</name><uri>http://www.blogger.com/profile/04940426007136148897</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5507734888035129853.post-6042032079574179750</id><published>2021-09-20T04:00:00.000-07:00</published><updated>2021-09-23T08:36:43.693-07:00</updated><title type='text'>A New Wave of Malware Attack Targeting Organizations in South America</title><content type='html'>&lt;br /&gt;A spam campaign delivering spear-phishing emails aimed at South American organizations has retooled its techniques to include a wide range of commodity remote access trojans (RATs) and geolocation filtering to avoid detection, according to new research.&lt;br /&gt;Cybersecurity firm Trend Micro attributed the attacks to an advanced persistent threat (APT) tracked as APT-C-36 (aka Blind Eagle), a suspected </content><link rel='replies' type='application/atom+xml' href='https://webcnsbilgi.blogspot.com/feeds/6042032079574179750/comments/default' title='Kayıt Yorumları'/><link rel='replies' type='text/html' href='https://webcnsbilgi.blogspot.com/2021/09/a-new-wave-of-malware-attack-targeting.html#comment-form' title='0 Yorum'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5507734888035129853/posts/default/6042032079574179750'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5507734888035129853/posts/default/6042032079574179750'/><link rel='alternate' type='text/html' href='https://webcnsbilgi.blogspot.com/2021/09/a-new-wave-of-malware-attack-targeting.html' title='A New Wave of Malware Attack Targeting Organizations in South America'/><author><name>SALVADORES</name><uri>http://www.blogger.com/profile/04940426007136148897</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5507734888035129853.post-1455740224580634928</id><published>2021-09-19T22:35:00.000-07:00</published><updated>2021-09-23T08:36:43.739-07:00</updated><title type='text'>Google to Auto-Reset Unused Android App Permissions for Billions of Devices</title><content type='html'>&lt;br /&gt;Google on Friday said it&#39;s bringing an Android 11 feature that auto-resets permissions granted to apps that haven&#39;t been used in months, to devices running Android versions 6 and above.&lt;br /&gt;The expansion is expected to go live later this year in December 2021 and enabled on Android phones with Google Play services running Android 6.0 (API level 23) or higher, which the company said should cover &quot;</content><link rel='replies' type='application/atom+xml' href='https://webcnsbilgi.blogspot.com/feeds/1455740224580634928/comments/default' title='Kayıt Yorumları'/><link rel='replies' type='text/html' href='https://webcnsbilgi.blogspot.com/2021/09/google-to-auto-reset-unused-android-app.html#comment-form' title='0 Yorum'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5507734888035129853/posts/default/1455740224580634928'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5507734888035129853/posts/default/1455740224580634928'/><link rel='alternate' type='text/html' href='https://webcnsbilgi.blogspot.com/2021/09/google-to-auto-reset-unused-android-app.html' title='Google to Auto-Reset Unused Android App Permissions for Billions of Devices'/><author><name>SALVADORES</name><uri>http://www.blogger.com/profile/04940426007136148897</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry></feed>