{"id":3279,"date":"2023-05-18T20:58:19","date_gmt":"2023-05-18T17:58:19","guid":{"rendered":"https:\/\/uzmanposta.com\/blog\/?p=3279"},"modified":"2023-05-18T20:58:20","modified_gmt":"2023-05-18T17:58:20","slug":"man-in-the-middle-atagi-mitm","status":"publish","type":"post","link":"https:\/\/uzmanposta.com\/blog\/man-in-the-middle-atagi-mitm\/","title":{"rendered":"Man-in-the-Middle Ata\u011f\u0131 (MitM) Nedir? Nas\u0131l \u00c7al\u0131\u015f\u0131r? Nas\u0131l \u00d6nlenir?"},"content":{"rendered":"\n<p>\u00c7evrimi\u00e7i g\u00fcvenlik d\u00fcnyas\u0131nda, Man-in-the-Middle sald\u0131r\u0131s\u0131 olduk\u00e7a tehlikeli bir tehdittir. Bu siber sald\u0131r\u0131, iki taraf aras\u0131ndaki ileti\u015fimleri yakalayarak ve manip\u00fcle ederek, bir bilgisayar korsan\u0131n\u0131n hassas bilgilere ve kaynaklara eri\u015fmesine olanak sa\u011flayabilir.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Man-in-the-Middle (MitM) Sald\u0131r\u0131s\u0131 Nedir?<\/h2>\n\n\n\n<p><strong>Man-in-the-Middle (MITM)<\/strong> yani <strong>Ortadaki Adam sald\u0131r\u0131s\u0131,<\/strong> bir bilgisayar korsan\u0131n\u0131n iki taraf aras\u0131ndaki ileti\u015fimi engelleyebildi\u011fi ve de\u011fi\u015ftirebildi\u011fi bir t\u00fcr siber sald\u0131r\u0131d\u0131r.<\/p>\n\n\n\n<p>Bu t\u00fcr bir siber sald\u0131r\u0131, bir bilgisayar korsan\u0131 bir konu\u015fman\u0131n iki u\u00e7 noktas\u0131 aras\u0131na yerle\u015ftirildi\u011finde, iki taraf aras\u0131nda de\u011fi\u015f toku\u015f edilen verileri yakalamalar\u0131na ve manip\u00fcle etmelerine izin verdi\u011finde m\u00fcmk\u00fcnd\u00fcr.<\/p>\n\n\n\n<p>G\u00f6r\u00fc\u015fmedeki iki taraf, bilgisayar korsan\u0131n ortada oldu\u011funun ve verileri manip\u00fcle etti\u011finin fark\u0131nda olmayabilece\u011finden, MITM sald\u0131r\u0131lar\u0131n\u0131 tespit etmek genellikle zordur. Bu t\u00fcr siber sald\u0131r\u0131lar\u0131n \u00f6n\u00fcne ge\u00e7ebilmek i\u00e7in \u015firketlerin g\u00fc\u00e7l\u00fc \u015fifreleme protokolleri kullanmalar\u0131n\u0131n yan\u0131 s\u0131ra \u00e7ok fakt\u00f6rl\u00fc kimlik do\u011frulama gibi g\u00fc\u00e7l\u00fc kimlik do\u011frulama y\u00f6ntemlerini uygulamalar\u0131 gerekir. Ek olarak i\u015fletmeler, kullan\u0131c\u0131lar\u0131n\u0131 MITM sald\u0131r\u0131lar\u0131n\u0131n riskleri ve kendilerini korumak i\u00e7in en iyi uygulamalar konusunda e\u011fitmelidir.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">MitM Sald\u0131r\u0131lar\u0131 Nas\u0131l \u00c7al\u0131\u015f\u0131r?<\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"1000\" height=\"500\" src=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/05\/mitm-saldirilari-nasil-calisir.jpeg\" alt=\"MitM Sald\u0131r\u0131lar\u0131 Nas\u0131l \u00c7al\u0131\u015f\u0131r?\" class=\"wp-image-3306\" srcset=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/05\/mitm-saldirilari-nasil-calisir.jpeg 1000w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/05\/mitm-saldirilari-nasil-calisir-300x150.jpeg 300w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/05\/mitm-saldirilari-nasil-calisir-768x384.jpeg 768w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/05\/mitm-saldirilari-nasil-calisir-360x180.jpeg 360w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/05\/mitm-saldirilari-nasil-calisir-750x375.jpeg 750w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><figcaption>Kaynak: techtarget<\/figcaption><\/figure><\/div>\n\n\n\n<p>Ortadaki adam sald\u0131r\u0131lar\u0131 a\u015fa\u011f\u0131daki 5 ad\u0131mda ger\u00e7ekle\u015fir:<\/p>\n\n\n\n<p><strong>Ad\u0131m 1:<\/strong> Bilgisayar korsan\u0131, eski bir sistem veya zay\u0131f bir parola gibi a\u011fdaki bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131ndan yararlanarak bir a\u011fa eri\u015fmeye \u00e7al\u0131\u015f\u0131r.<\/p>\n\n\n\n<p><strong>Ad\u0131m 2:<\/strong> Bilgisayar korsan\u0131 daha sonra a\u011fa k\u00f6t\u00fc ama\u00e7l\u0131 bir program yerle\u015ftirerek iki sistem aras\u0131ndaki t\u00fcm ileti\u015fimleri izlemeye ve engellemeye olanak tan\u0131r.<\/p>\n\n\n\n<p><strong>Ad\u0131m 3:<\/strong> Bilgisayar korsan\u0131 daha sonra iki sistem aras\u0131nda ge\u00e7en bilgileri yakalayabilir ve de\u011fi\u015ftirebilir. Bu, sahte veriler g\u00f6ndererek, trafi\u011fi yeniden y\u00f6nlendirerek veya mesajlar\u0131 tekrar oynatarak yap\u0131labilir.<\/p>\n\n\n\n<p><strong>4. Ad\u0131m:<\/strong> Bilgisayar korsan\u0131, toplad\u0131\u011f\u0131 bilgileri hedeflenen ki\u015finin hesaplar\u0131na eri\u015fmek, hassas verileri \u00e7almak veya di\u011fer k\u00f6t\u00fc niyetli faaliyetleri y\u00fcr\u00fctmek i\u00e7in kullanabilir.<\/p>\n\n\n\n<p><strong>Ad\u0131m 5:<\/strong> Son olarak, bilgisayar korsan\u0131, g\u00fcnl\u00fckleri ve faaliyetlerine ili\u015fkin di\u011fer kan\u0131tlar\u0131 silerek izlerini \u00f6rtmeye \u00e7al\u0131\u015f\u0131r.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">MitM Sald\u0131r\u0131lar\u0131 T\u00fcrleri<\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"1000\" height=\"500\" src=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/05\/mitm-saldirilari-turleri.jpeg\" alt=\"MitM Sald\u0131r\u0131lar\u0131 T\u00fcrleri\" class=\"wp-image-3307\" srcset=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/05\/mitm-saldirilari-turleri.jpeg 1000w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/05\/mitm-saldirilari-turleri-300x150.jpeg 300w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/05\/mitm-saldirilari-turleri-768x384.jpeg 768w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/05\/mitm-saldirilari-turleri-360x180.jpeg 360w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/05\/mitm-saldirilari-turleri-750x375.jpeg 750w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/figure><\/div>\n\n\n\n<p>Pop\u00fcler ortadaki adam sald\u0131r\u0131s\u0131 t\u00fcrleri a\u015fa\u011f\u0131daki \u015fekildedir:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Oturum Ele Ge\u00e7irme<\/h3>\n\n\n\n<p>Oturum ele ge\u00e7irme, bilgisayar korsan\u0131n\u0131n iki bilgisayar aras\u0131ndaki aktif bir ileti\u015fim oturumunun kontrol\u00fcn\u00fc ele ge\u00e7irdi\u011fi bir ortadaki adam sald\u0131r\u0131s\u0131 t\u00fcr\u00fcd\u00fcr. Bilgisayar korsan\u0131, iki bilgisayar aras\u0131na kendi bilgisayar\u0131n\u0131 yerle\u015ftirir ve oturumu izleyebilir, de\u011fi\u015ftirebilir veya sonland\u0131rabilir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. DNS Sahtekarl\u0131\u011f\u0131<\/h3>\n\n\n\n<p>DNS sahtekarl\u0131\u011f\u0131, bir bilgisayar korsan\u0131n\u0131n bir kullan\u0131c\u0131y\u0131 k\u00f6t\u00fc ama\u00e7l\u0131 bir web sitesine y\u00f6nlendirmek i\u00e7in Domain Name System (DNS) sunucusunu de\u011fi\u015ftirdi\u011fi bir ortadaki adam sald\u0131r\u0131s\u0131 t\u00fcr\u00fcd\u00fcr. Bilgisayar korsan\u0131, DNS isteklerini yakalay\u0131p de\u011fi\u015ftirerek kullan\u0131c\u0131lar\u0131 yasal web siteleri gibi g\u00f6r\u00fcnen k\u00f6t\u00fc ama\u00e7l\u0131 web sitelerine y\u00f6nlendirebilir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. ARP Sahtekarl\u0131\u011f\u0131<\/h3>\n\n\n\n<p>ARP sahtekarl\u0131\u011f\u0131, bir bilgisayar korsan\u0131n\u0131n hedeflenen ki\u015finin verilerine eri\u015fmek i\u00e7in yanl\u0131\u015f ARP mesajlar\u0131 g\u00f6nderdi\u011fi bir t\u00fcr ortadaki adam sald\u0131r\u0131s\u0131d\u0131r. Bilgisayar korsan\u0131 trafi\u011fi yakalayabilir ve de\u011fi\u015ftirebilir, b\u00f6ylece ayn\u0131 a\u011fdaki iki bilgisayar aras\u0131nda g\u00f6nderilen verileri g\u00f6r\u00fcnt\u00fcleyebilir ve de\u011fi\u015ftirebilir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. SSL Stripping<\/h3>\n\n\n\n<p>SSL stripping, bir bilgisayar korsan\u0131n\u0131n \u015fifrelenmi\u015f bir ba\u011flant\u0131y\u0131 HTTPS&#8217;den HTTP&#8217;ye d\u00fc\u015f\u00fcrmeye \u00e7al\u0131\u015ft\u0131\u011f\u0131 bir t\u00fcr ortadaki adam sald\u0131r\u0131s\u0131d\u0131r. Bilgisayar korsan\u0131 daha sonra iki bilgisayar aras\u0131nda g\u00f6nderilen verileri g\u00f6r\u00fcnt\u00fcleyebilir ve de\u011fi\u015ftirebilir.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. Sniffing<\/h3>\n\n\n\n<p>Sniffing, bir bilgisayar korsan\u0131n\u0131n a\u011f trafi\u011fini yakalay\u0131p analiz etti\u011fi bir t\u00fcr ortadaki adam sald\u0131r\u0131s\u0131d\u0131r. Bilgisayar daha sonra iki bilgisayar aras\u0131nda g\u00f6nderilen verileri g\u00f6r\u00fcnt\u00fcleyebilir ve de\u011fi\u015ftirebilir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">6. Smurf Attack<\/h3>\n\n\n\n<p>Smurf attack, bir bilgisayar korsan\u0131n\u0131n bir hedefi \u00e7ok say\u0131da paketle doldurmak i\u00e7in bir paketin kaynak IP adresini taklit etti\u011fi bir ortadaki adam sald\u0131r\u0131s\u0131 t\u00fcr\u00fcd\u00fcr. Bilgisayar korsan\u0131 daha sonra iki bilgisayar aras\u0131nda g\u00f6nderilen verileri g\u00f6r\u00fcnt\u00fcleyebilir ve de\u011fi\u015ftirebilir.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">7. Sahtecilik<\/h3>\n\n\n\n<p>Siteler aras\u0131 istek sahtecili\u011fi (CSRF), bir bilgisayar korsan\u0131n bir kullan\u0131c\u0131y\u0131 bir web sitesine k\u00f6t\u00fc niyetli bir istekte bulunmas\u0131 i\u00e7in kand\u0131rd\u0131\u011f\u0131 bir ortadaki adam sald\u0131r\u0131s\u0131 t\u00fcr\u00fcd\u00fcr. Bilgisayar korsan\u0131 daha sonra iki bilgisayar aras\u0131nda g\u00f6nderilen verileri g\u00f6r\u00fcnt\u00fcleyebilir ve de\u011fi\u015ftirebilir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">8. Gizli Dinleme<\/h3>\n\n\n\n<p>Dinleme, bir bilgisayar korsan\u0131n\u0131n iki bilgisayar aras\u0131ndaki etkin bir ileti\u015fim oturumunu dinledi\u011fi bir t\u00fcr ortadaki adam sald\u0131r\u0131s\u0131d\u0131r. Bilgisayar korsan\u0131 daha sonra iki bilgisayar aras\u0131nda g\u00f6nderilen verileri g\u00f6r\u00fcnt\u00fcleyebilir ve de\u011fi\u015ftirebilir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">9. Sahte Eri\u015fim Noktalar\u0131<\/h3>\n\n\n\n<p>Hileli eri\u015fim noktalar\u0131, bir bilgisayar korsan\u0131n\u0131n a\u011f trafi\u011fini engellemek i\u00e7in sahte bir eri\u015fim noktas\u0131 kurdu\u011fu bir t\u00fcr ortadaki adam sald\u0131r\u0131s\u0131d\u0131r. Bilgisayar korsan\u0131, bu eri\u015fim noktas\u0131na bir cihaz ba\u011flayarak, iletilen verileri yakalayabilir ve de\u011fi\u015ftirebilir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">10. WiFi MITM&nbsp;<\/h3>\n\n\n\n<p>WiFi MITM sald\u0131r\u0131s\u0131, cihazlar aras\u0131ndaki ileti\u015fimi onlar\u0131n fark\u0131nda olmadan keser. Bilgisayar korsan\u0131 g\u00fcvenlik zay\u0131fl\u0131klar\u0131ndan yararlan\u0131r, cihazlar aras\u0131nda konumlan\u0131r ve verileri izleyebilir, de\u011fi\u015ftirebilir veya enjekte edebilir. Bilgisayar korsan\u0131n\u0131n trafi\u011fi manip\u00fcle etmesine izin vererek kullan\u0131c\u0131lar\u0131 kand\u0131rmak i\u00e7in sahte bir WiFi etkin noktas\u0131 olu\u015fturulabilir.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Ortadaki Adam Sald\u0131r\u0131s\u0131 \u00d6rnekleri<\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"1000\" height=\"500\" src=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/05\/ortadaki-adam-saldirisi-ornekleri.jpeg\" alt=\"Ortadaki Adam Sald\u0131r\u0131s\u0131 \u00d6rnekleri\" class=\"wp-image-3308\" srcset=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/05\/ortadaki-adam-saldirisi-ornekleri.jpeg 1000w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/05\/ortadaki-adam-saldirisi-ornekleri-300x150.jpeg 300w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/05\/ortadaki-adam-saldirisi-ornekleri-768x384.jpeg 768w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/05\/ortadaki-adam-saldirisi-ornekleri-360x180.jpeg 360w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/05\/ortadaki-adam-saldirisi-ornekleri-750x375.jpeg 750w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/figure><\/div>\n\n\n\n<p>A\u015fa\u011f\u0131da ortadaki adam (MITM) sald\u0131r\u0131lar\u0131n\u0131n ger\u00e7ek hayattan baz\u0131 \u00f6rneklerini bulabilirsiniz:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Bankac\u0131l\u0131k Truva Atlar\u0131<\/h3>\n\n\n\n<p>Bankac\u0131l\u0131k Truva Atlar\u0131, \u00e7evrimi\u00e7i bankac\u0131l\u0131k oturumlar\u0131 s\u0131ras\u0131nda kullan\u0131c\u0131 kimlik bilgilerine m\u00fcdahale edebilen bir t\u00fcr k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131md\u0131r. Kullan\u0131c\u0131 oturum a\u00e7t\u0131ktan sonra, Trojan, kullan\u0131c\u0131y\u0131 ger\u00e7ek web sitesiyle ayn\u0131 g\u00f6r\u00fcnen sahte bir web sitesine y\u00f6nlendirir. Kullan\u0131c\u0131 daha sonra bilmeden oturum a\u00e7ma kimlik bilgilerini bilgisayar korsan\u0131na verir ve bilgisayar korsan\u0131 bu bilgileri banka hesaplar\u0131na eri\u015fmek i\u00e7in kullanabilir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Genel Wi-Fi<\/h3>\n\n\n\n<p>Bilgisayar korsanlar\u0131, MITM sald\u0131r\u0131lar\u0131n\u0131 ba\u015flatmak i\u00e7in genel Wi-Fi a\u011flar\u0131n\u0131 kullanabilir. Kullan\u0131c\u0131lar halka a\u00e7\u0131k bir Wi-Fi a\u011f\u0131na ba\u011fland\u0131klar\u0131nda genellikle ba\u011flant\u0131lar\u0131n\u0131n g\u00fcvenli oldu\u011funu varsayar. Ancak bilgisayar korsanlar\u0131 a\u011fdan ge\u00e7en trafi\u011fi engelleyebilir ve kullan\u0131c\u0131 adlar\u0131, parolalar ve kredi kart\u0131 numaralar\u0131 gibi hassas bilgileri \u00e7alabilir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. HTTPS Stripping<\/h3>\n\n\n\n<p>HTTPS, web trafi\u011fini \u015fifreleyerek bilgisayar korsanlar\u0131n\u0131n verileri ele ge\u00e7irmesini ve okumas\u0131n\u0131 zorla\u015ft\u0131ran bir protokold\u00fcr. Ancak bilgisayar korsanlar\u0131, bir web sitesinin g\u00fcvenlik ayarlar\u0131n\u0131 HTTP&#8217;ye d\u00fc\u015f\u00fcrmek i\u00e7in HTTPS stripping ad\u0131 verilen bir teknik kullanabilir. Bu, bilgisayar korsan\u0131n\u0131n web sitesinden ge\u00e7en trafi\u011fi engellemesine ve de\u011fi\u015ftirmesine olanak tan\u0131r.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. K\u00f6t\u00fc Ama\u00e7l\u0131 Ba\u011flant\u0131 Noktalar\u0131<\/h3>\n\n\n\n<p>Bilgisayar korsanlar\u0131, kullan\u0131c\u0131lar\u0131 kendilerine ba\u011flanmaya ikna etmek i\u00e7in sahte Wi-Fi noktalar\u0131 olu\u015fturabilir. Kullan\u0131c\u0131 k\u00f6t\u00fc ama\u00e7l\u0131 ortak eri\u015fim noktas\u0131na ba\u011fland\u0131\u011f\u0131nda, bilgisayar korsan\u0131 trafi\u011fini kesebilir ve hassas bilgileri \u00e7alabilir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. DNS Sahtekarl\u0131\u011f\u0131<\/h3>\n\n\n\n<p>Bilgisayar korsanlar\u0131, kullan\u0131c\u0131lar\u0131 sahte web sitelerine y\u00f6nlendirmek i\u00e7in DNS sahtekarl\u0131\u011f\u0131n\u0131 kullanabilir. \u00d6rne\u011fin, bir bilgisayar korsan\u0131 hedefledi\u011fi ki\u015finincihaz\u0131n\u0131n DNS ayarlar\u0131n\u0131 de\u011fi\u015ftirerek onu sahte bir bankac\u0131l\u0131k web sitesine y\u00f6nlendirebilir. Hedeflenen ki\u015fi bilmeden oturum a\u00e7ma kimlik bilgilerini bilgisayar korsan\u0131na verebilir ve bilgisayar korsan\u0131 bu bilgileri hedeflenen ki\u015finin banka hesab\u0131na eri\u015fmek i\u00e7in kullanabilir.<\/p>\n\n\n\n<p>Bunlar, ger\u00e7ek hayatta meydana gelebilecek bir\u00e7ok farkl\u0131 t\u00fcrde MITM sald\u0131r\u0131s\u0131n\u0131n yaln\u0131zca birka\u00e7 \u00f6rne\u011fidir. Halka a\u00e7\u0131k Wi-Fi a\u011flar\u0131na ba\u011flan\u0131rken dikkatli olunmas\u0131 ve hassas bilgiler girmeden \u00f6nce web sitelerinin ve web uygulamalar\u0131n\u0131n yasall\u0131\u011f\u0131n\u0131n her zaman do\u011frulanmas\u0131 \u00f6nemlidir.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Ortadaki Adam Sald\u0131r\u0131s\u0131 Belirtileri<\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"1000\" height=\"500\" src=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/05\/ortadaki-adam-saldirisi-belirtileri.jpeg\" alt=\"Ortadaki Adam Sald\u0131r\u0131s\u0131 Belirtileri\" class=\"wp-image-3309\" srcset=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/05\/ortadaki-adam-saldirisi-belirtileri.jpeg 1000w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/05\/ortadaki-adam-saldirisi-belirtileri-300x150.jpeg 300w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/05\/ortadaki-adam-saldirisi-belirtileri-768x384.jpeg 768w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/05\/ortadaki-adam-saldirisi-belirtileri-360x180.jpeg 360w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/05\/ortadaki-adam-saldirisi-belirtileri-750x375.jpeg 750w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/figure><\/div>\n\n\n\n<p>A\u015fa\u011f\u0131daki listede ortadaki adam sald\u0131r\u0131lar\u0131n\u0131n \u00f6nemli belirtilerini bulabilirsiniz:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Ola\u011fand\u0131\u015f\u0131 A\u011f Etkinli\u011fi<\/h3>\n\n\n\n<p>A\u011f trafi\u011findeki \u00f6nemli bir art\u0131\u015f, ortadaki adam sald\u0131r\u0131s\u0131n\u0131n bir g\u00f6stergesi olabilir. Ola\u011fand\u0131\u015f\u0131 ba\u011flant\u0131lar veya ola\u011fand\u0131\u015f\u0131 kaynaklardan gelen istekler, bir bilgisayar korsan\u0131n\u0131n veri paketlerini ele ge\u00e7irmeye \u00e7al\u0131\u015ft\u0131\u011f\u0131n\u0131n bir i\u015fareti olabilir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Beklenmedik Kimlik Bilgileri Talepleri<\/h3>\n\n\n\n<p>Bir web sitesi veya uygulama, kullan\u0131c\u0131n\u0131n a\u015fina olmad\u0131\u011f\u0131 kimlik bilgilerini isterse, bu, ortadaki adam sald\u0131r\u0131s\u0131n\u0131n bir i\u015fareti olabilir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Ola\u011fand\u0131\u015f\u0131 Oturum A\u00e7ma Hatalar\u0131<\/h3>\n\n\n\n<p>Kullan\u0131c\u0131, do\u011fru kimlik bilgilerini girdikten sonra web sitesinin veya uygulaman\u0131n oturum a\u00e7ma hatalar\u0131 g\u00f6sterdi\u011fini fark ederse, bu, bir bilgisayar korsan\u0131n veri paketlerini ele ge\u00e7irmeye \u00e7al\u0131\u015ft\u0131\u011f\u0131n\u0131 g\u00f6sterebilir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Beklenmedik Y\u00f6nlendirmeler<\/h3>\n\n\n\n<p>Bilinmeyen web sitelerine beklenmedik y\u00f6nlendirmeler, ortadaki adam sald\u0131r\u0131s\u0131n\u0131n bir i\u015fareti olabilir. Bu nedenle, kullan\u0131c\u0131lar genel wi-fi a\u011flar\u0131n\u0131 kullanmaktan ka\u00e7\u0131nmal\u0131 ve sanal bir \u00f6zel a\u011f kullanmay\u0131 d\u00fc\u015f\u00fcnmelidir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. Ola\u011fand\u0131\u015f\u0131 IP Adresleri<\/h3>\n\n\n\n<p>Kullan\u0131c\u0131, verilerinin bilinmeyen bir IP adresi \u00fczerinden y\u00f6nlendirildi\u011fini fark ederse, bu, ortadaki adam sald\u0131r\u0131s\u0131n\u0131n bir i\u015fareti olabilir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">6. G\u00fcvenli Bir A\u011fa Ba\u011flanamama<\/h3>\n\n\n\n<p>Bir kullan\u0131c\u0131n\u0131n bir web sitesine veya uygulamaya g\u00fcvenli bir ba\u011flant\u0131 kuramamas\u0131, bir bilgisayar korsan\u0131n\u0131n veri paketlerini ele ge\u00e7irdi\u011fini g\u00f6sterebilir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">7. Sertifika Ayr\u0131nt\u0131lar\u0131ndaki De\u011fi\u015fiklikler<\/h3>\n\n\n\n<p>Kullan\u0131c\u0131, bir web sitesinin veya uygulaman\u0131n sertifika ayr\u0131nt\u0131lar\u0131nda herhangi bir de\u011fi\u015fiklik fark ederse, bu, bir bilgisayar korsan\u0131n\u0131n ortadaki adam sald\u0131r\u0131s\u0131 ger\u00e7ekle\u015ftirdi\u011fini g\u00f6sterebilir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">8. Beklenmeyen A\u00e7\u0131l\u0131r Pencereler<\/h3>\n\n\n\n<p>Beklenmeyen a\u00e7\u0131l\u0131r pencereler veya bildirimler, ortadaki adam sald\u0131r\u0131s\u0131n\u0131n bir i\u015fareti olabilir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">9. Hesaplarda Ola\u011fand\u0131\u015f\u0131 Etkinlik<\/h3>\n\n\n\n<p>Kullan\u0131c\u0131, hesaplar\u0131nda yetkisiz giri\u015fler veya sat\u0131n almalar gibi herhangi bir ola\u011fand\u0131\u015f\u0131 etkinlik fark ederse, bu, bir ortadaki adam sald\u0131r\u0131s\u0131n\u0131n meydana geldi\u011fini g\u00f6sterebilir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">10. Ola\u011fand\u0131\u015f\u0131 Hesap Etkinli\u011fi<\/h3>\n\n\n\n<p>Kullan\u0131c\u0131, hesap ayarlar\u0131nda veya i\u00e7erikte de\u011fi\u015fiklik gibi, hesaplar\u0131nda herhangi bir ola\u011fand\u0131\u015f\u0131 etkinlik fark ederse, bu, ortadaki adam sald\u0131r\u0131s\u0131n\u0131n bir i\u015fareti olabilir.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Ortadaki Adam Sald\u0131r\u0131lar\u0131yla \u0130li\u015fkili Riskleri Anlama<\/h2>\n\n\n\n<p>Ortadaki adam (MITM) sald\u0131r\u0131lar\u0131, veri h\u0131rs\u0131zl\u0131\u011f\u0131ndan mali kay\u0131plara kadar ciddi sonu\u00e7lar do\u011furabilir, bu nedenle i\u015fletmelerin bu siber sald\u0131r\u0131larla ili\u015fkili riskleri anlamas\u0131 \u00f6nemlidir.&nbsp;<\/p>\n\n\n\n<p>A\u015fa\u011f\u0131daki riskler MITM sald\u0131r\u0131lar\u0131yla ili\u015fkilidir:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Hassas verilerin kayb\u0131<\/h3>\n\n\n\n<p>Bilgisayar korsan\u0131, oturum a\u00e7ma kimlik bilgileri veya finansal ayr\u0131nt\u0131lar gibi ki\u015fisel bilgileri ele ge\u00e7irebilir ve \u015fifresini \u00e7\u00f6zebilir. Bu, hesaplara eri\u015fmelerini veya para \u00e7almalar\u0131n\u0131 sa\u011flar.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Veri manip\u00fclasyonu<\/h3>\n\n\n\n<p>Bir bilgisayar korsan\u0131, ileti\u015fim i\u00e7eri\u011fini de\u011fi\u015ftirerek yanl\u0131\u015f veya yan\u0131lt\u0131c\u0131 bilgilerin g\u00f6nderilmesine neden olabilir. Bunun finansal kay\u0131plar veya itibar kayb\u0131 gibi ciddi etkileri olabilir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. G\u00fcvenli\u011fi ihlal edilmi\u015f kimlik do\u011frulama<\/h3>\n\n\n\n<p>Ortadaki adam sald\u0131r\u0131lar\u0131, bir mesaj\u0131n g\u00f6ndericisini veya al\u0131c\u0131s\u0131n\u0131 taklit etmek i\u00e7in kullan\u0131labilir ve bilgisayar korsan\u0131n\u0131n g\u00fcvenli olmas\u0131 gereken hizmetlere eri\u015fim kazanmas\u0131na olanak tan\u0131r.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Sistemlere yetkisiz eri\u015fim<\/h3>\n\n\n\n<p>Bilgisayar korsanlar\u0131, trafi\u011fe m\u00fcdahale ederek ve kullan\u0131c\u0131lar\u0131n kimli\u011fine b\u00fcr\u00fcnerek, eri\u015fmemeleri gereken sistemlere ve a\u011flara eri\u015fim sa\u011flayabilir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. Hizmet reddi sald\u0131r\u0131lar\u0131<\/h3>\n\n\n\n<p>Ortadaki adam sald\u0131r\u0131lar\u0131, bir bilgisayar korsan\u0131n\u0131n bir sistemi isteklerle doldurdu\u011fu ve me\u015fru kullan\u0131c\u0131lar i\u00e7in kullan\u0131lamaz hale getirdi\u011fi hizmet reddi sald\u0131r\u0131lar\u0131n\u0131 ba\u015flatmak i\u00e7in kullan\u0131labilir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">6. K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m bula\u015fmalar\u0131<\/h3>\n\n\n\n<p>Bilgisayar korsanlar\u0131, bir kullan\u0131c\u0131n\u0131n sistemine k\u00f6t\u00fc ama\u00e7l\u0131 kod veya k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m enjekte etmek i\u00e7in ortadaki adam sald\u0131r\u0131lar\u0131n\u0131 kullanabilir ve sistemin kontrol\u00fcn\u00fc ele ge\u00e7irmelerine olanak tan\u0131r. Bunun veri imhas\u0131 veya a\u011f istismar\u0131&nbsp;<\/p>\n\n\n\n<p>gibi ciddi sonu\u00e7lar\u0131 olabilir.<\/p>\n\n\n\n<p>\u0130\u015fletmelerin MITM sald\u0131r\u0131lar\u0131yla ili\u015fkili risklerin fark\u0131nda olmas\u0131 ve bunlar\u0131 hafifletmek i\u00e7in ad\u0131mlar atmas\u0131 \u00f6nemlidir. Bu, hassas verilerin \u015fifrelenmesinin yan\u0131 s\u0131ra iki fakt\u00f6rl\u00fc kimlik do\u011frulama gibi g\u00fc\u00e7l\u00fc kimlik do\u011frulama \u00f6nlemlerinin uygulanmas\u0131n\u0131 i\u00e7erir.<\/p>\n\n\n\n<p>Ek olarak, i\u015fletmeler her zaman tetikte kalmal\u0131 ve a\u011flar\u0131n\u0131 \u015f\u00fcpheli etkinlik belirtileri i\u00e7in izlemelidir. \u0130\u015fletmeler, MITM sald\u0131r\u0131lar\u0131yla ili\u015fkili riskleri anlayarak ve a\u011flar\u0131n\u0131 korumak i\u00e7in gerekli ad\u0131mlar\u0131 atarak bu t\u00fcr siber sald\u0131r\u0131lar\u0131n kurban\u0131 olma riskini en aza indirebilir.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Ortadaki Adam Sald\u0131r\u0131lar\u0131 Nas\u0131l Tespit Edilir?<\/h2>\n\n\n\n<p>Bir MitM sald\u0131r\u0131s\u0131nda, doland\u0131r\u0131c\u0131 veya bilgisayar korsan\u0131, de\u011fi\u015f toku\u015f edilen bilgileri de\u011fi\u015ftirebilir veya \u00e7alabilir. Bu nedenle, i\u015fletmelerin MitM sald\u0131r\u0131lar\u0131n\u0131 tespit etmesi ve \u00f6nlemesi \u00e7ok \u00f6nemlidir. Bir MitM sald\u0131r\u0131s\u0131n\u0131 tespit etmenin bir yolu \u015fifreleme kullanmakt\u0131r. Verilerin \u015fifrelenmesi, k\u00f6t\u00fc niyetli bir \u00fc\u00e7\u00fcnc\u00fc \u015fah\u0131s taraf\u0131ndan ele ge\u00e7irilmemesini veya de\u011fi\u015ftirilememesini sa\u011flar.<\/p>\n\n\n\n<p>\u0130\u015fletmeler ayr\u0131ca herhangi bir \u015f\u00fcpheli etkinlik i\u00e7in a\u011f trafi\u011fini d\u00fczenli olarak izlemelidir. Olas\u0131 MitM sald\u0131r\u0131lar\u0131 i\u00e7in a\u011f trafi\u011findeki herhangi bir ani de\u011fi\u015fiklik ara\u015ft\u0131r\u0131lmal\u0131d\u0131r.<\/p>\n\n\n\n<p>Plan, bir siber sald\u0131r\u0131 tespit edildi\u011finde, ilgili makamlara bildirimde bulunmak, etkilenen sistemi izole etmek ve sistemi g\u00fcvenli bir duruma geri y\u00fcklemek gibi at\u0131lacak ad\u0131mlar\u0131 i\u00e7ermelidir.<\/p>\n\n\n\n<p>Yukar\u0131daki \u00f6nlemleri uygulayarak i\u015fletmeler kendilerini MitM siber sald\u0131r\u0131lar\u0131ndan koruyabilir. <strong>Ortadaki adam sald\u0131r\u0131lar\u0131n\u0131 \u00f6nlemek<\/strong>, i\u015fletmelerin bilgisayar korsanlar\u0131 taraf\u0131ndan kullan\u0131lan en son MitM teknik ve teknolojilerinden haberdar olmas\u0131 ve bir siber sald\u0131r\u0131 durumunda h\u0131zla yan\u0131t vermeye haz\u0131r olmas\u0131 gerekti\u011finden \u00e7ok \u00f6nemlidir.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Ortadaki Adam Sald\u0131r\u0131lar\u0131 Nas\u0131l \u00d6nlenir?<\/h2>\n\n\n\n<p>Ortadaki adam sald\u0131r\u0131lar\u0131n\u0131 \u00f6nlerken a\u015fa\u011f\u0131dakiler dahil birka\u00e7 en iyi uygulama uygulanmal\u0131d\u0131r:<\/p>\n\n\n\n<p>\u00d6ncelikle, SSL\/TLS veya IPSec gibi \u015fifreleme protokollerini kullanarak verileri \u015fifreleyin. Bu, g\u00f6nderilen t\u00fcm verilerin g\u00fcvenli olmas\u0131n\u0131 ve bir bilgisayar korsan\u0131 taraf\u0131ndan eri\u015filememesini sa\u011flayacakt\u0131r.<\/p>\n\n\n\n<p>\u0130kincisi, \u00e7ok fakt\u00f6rl\u00fc kimlik do\u011frulama gibi g\u00fc\u00e7l\u00fc kimlik do\u011frulama protokolleri kullan\u0131n. Bu, yaln\u0131zca yetkili kullan\u0131c\u0131lar\u0131n hassas verilere eri\u015febilmesini sa\u011flamaya yard\u0131mc\u0131 olacakt\u0131r. \u0130\u015fletmeler ayr\u0131ca iki fakt\u00f6rl\u00fc kimlik do\u011frulama ve g\u00fc\u00e7l\u00fc parolalar uygulamal\u0131d\u0131r. \u0130ki fakt\u00f6rl\u00fc kimlik do\u011frulama, kullan\u0131c\u0131lar\u0131n bilgilere eri\u015fmek i\u00e7in iki t\u00fcr kimlik sa\u011flamas\u0131n\u0131 gerektirir, bu da bilgisayar korsan\u0131n\u0131n eri\u015fim kazanmas\u0131n\u0131 zorla\u015ft\u0131r\u0131r.<\/p>\n\n\n\n<p>\u00dc\u00e7\u00fcnc\u00fcs\u00fc, \u015f\u00fcpheli etkinli\u011fi alg\u0131lamak ve k\u00f6t\u00fc ama\u00e7l\u0131 trafi\u011fi engellemek i\u00e7in uygulama g\u00fcvenlik duvarlar\u0131n\u0131 kullan\u0131n.<\/p>\n\n\n\n<p>D\u00f6rd\u00fcnc\u00fcs\u00fc, herhangi bir \u015f\u00fcpheli etkinlik i\u00e7in a\u011f trafi\u011fini izleyin. IP adresi filtreleme, k\u00f6t\u00fc ama\u00e7l\u0131 IP adreslerini engellemek i\u00e7in kullan\u0131labilir.<\/p>\n\n\n\n<p>Son olarak, uzak sistemlere eri\u015fmek i\u00e7in SSH ve SFTP gibi g\u00fcvenli protokolleri kullan\u0131n. \u0130\u015fletmeler, bu en iyi uygulamalar\u0131 izleyerek bir MITM sald\u0131r\u0131s\u0131n\u0131n kurban\u0131 olma riskini b\u00fcy\u00fck \u00f6l\u00e7\u00fcde azaltabilir.<\/p>\n\n\n\n<p>Ek olarak, hesaplar\u0131 ve verileri korumak i\u00e7in g\u00fc\u00e7l\u00fc parolalar kullan\u0131lmal\u0131d\u0131r. \u0130\u015fletmelerin ayr\u0131ca bir MitM sald\u0131r\u0131s\u0131n\u0131n hasar\u0131n\u0131 s\u0131n\u0131rlamak i\u00e7in bir olay m\u00fcdahale plan\u0131 olmal\u0131d\u0131r.<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p><strong>\u0130lgili \u0130\u00e7erikler:<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/penetrasyon-sizma-testi\/\">Penetrasyon (S\u0131zma) Testi Nedir, A\u015famalar\u0131 Nelerdir? Firmalar G\u00fcvenlik A\u00e7\u0131klar\u0131n\u0131 Nas\u0131l Giderebilir?<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/uctan-uca-sifreleme-e2ee\/\">U\u00e7tan Uca \u015eifreleme (E2EE): Nedir, Nas\u0131l \u00c7al\u0131\u015f\u0131r? E-posta \u0130leti\u015fiminde U\u00e7tan Uca \u015eifreleme<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/malware\/\">Malware: Nedir? Nas\u0131l Temizlenir, Nas\u0131l Bula\u015f\u0131r? \u0130\u015fletmeler E-posta G\u00fcvenli\u011fi Hususunda Malware Sald\u0131r\u0131s\u0131ndan Nas\u0131l Korunabilir?<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/e-posta-sifreleme-nedir-nasil-gonderilir-nasil-sifrelenir-e-posta-guvenliginde-e-posta-sifreleme-guvenli-mi\/\">E-posta \u015eifreleme: Nedir, Nas\u0131l G\u00f6nderilir, Nas\u0131l \u015eifrelenir? E-posta G\u00fcvenli\u011finde E-Posta \u015eifreleme G\u00fcvenli mi?<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/advanced-persistent-threat-apt\/\">Advanced Persistent Threat (APT) Nedir? Ki\u015filer ve \u0130\u015fletmeler Kendilerini Geli\u015fmi\u015f Kal\u0131c\u0131 Tehdit Sald\u0131r\u0131lar\u0131ndan Nas\u0131l Korumal\u0131?<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/spoofing\/\">Spoofing Nedir? \u015eirketler \u0130\u00e7in Spoofing Tehditleri: IP Spoofing Sald\u0131r\u0131lar\u0131na Kar\u015f\u0131 Korunma Stratejileri<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/credential-stuffing\/\">Credential Stuffing Nedir? Kimlik Bilgisi Doldurma Sald\u0131r\u0131s\u0131 Nas\u0131l \u00d6nlenir? E-ticaret Sitelerinin Verileri \u0130\u00e7in B\u00fcy\u00fck Tehlike<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/botnet\/\">Botnet Nedir? \u0130\u015fletmeler Verilerinin G\u00fcvenli\u011fini Nas\u0131l Sa\u011flamal\u0131? Botnet Sald\u0131r\u0131s\u0131ndan Nas\u0131l Korunmal\u0131d\u0131r?<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/mail-transfer-agent-mta\/\">Mail Transfer Agent (MTA) Nedir? \u0130\u015fletmeler Online Ortamda E-Posta Hesaplar\u0131n\u0131 Nas\u0131l Korumal\u0131?<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/dlp-data-loss-prevention\/\">DLP (Data Loss Prevention) Nedir? Kurumlar \u0130\u00e7in \u0130nternet Ortam\u0131nda Tehditleri \u0130zleme ve Verileri G\u00fcvende Tutma Rehberi<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/firewall-nedir\/\">Firewall Nedir, Ne \u0130\u015fe Yarar? Firewall T\u00fcrleri<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/phishing-nedir\/\">Phishing (Oltalama) Nedir? Phishing Sald\u0131r\u0131s\u0131 Nas\u0131l Engellenir?<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/mail-gateway-guvenli-e-posta-ag-gecidi-nedir\/\">Mail Gateway (G\u00fcvenli E-Posta A\u011f Ge\u00e7idi) Nedir?<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/ransomware\/\">Ransomware Nedir, Nas\u0131l \u00c7al\u0131\u015f\u0131r? Ransomware Vir\u00fcs\u00fcn\u00fcn Mail Yoluyla Bula\u015fmas\u0131n\u0131 Engelleme\u00a0<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/sosyal-muhendislik\/\">Sosyal M\u00fchendislik Nedir? Sosyal M\u00fchendislik Sald\u0131r\u0131lar\u0131 Nas\u0131l \u00d6nlenir?<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/bec\/\">Business Email Compromise (BEC) Nedir? BEC Sald\u0131r\u0131lar\u0131 Nas\u0131l Engellenir?<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/kimlik-avi-nedir-nasil-onlenir\/\">Kimlik Av\u0131 Nedir, Nas\u0131l \u00d6nlenir?<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/e-posta-uzerinden-yapilan-saldirilar-ve-alinmasi-gereken-onlemler\/\">E-Posta \u00dczerinden Yap\u0131lan Sald\u0131r\u0131lar ve Al\u0131nmas\u0131 Gereken \u00d6nlemler<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00c7evrimi\u00e7i g\u00fcvenlik d\u00fcnyas\u0131nda, Man-in-the-Middle sald\u0131r\u0131s\u0131 olduk\u00e7a tehlikeli bir tehdittir. Bu siber sald\u0131r\u0131, iki taraf aras\u0131ndaki ileti\u015fimleri yakalayarak ve manip\u00fcle ederek, bir bilgisayar korsan\u0131n\u0131n hassas bilgilere ve kaynaklara eri\u015fmesine olanak sa\u011flayabilir. Man-in-the-Middle (MitM) Sald\u0131r\u0131s\u0131 Nedir? Man-in-the-Middle (MITM) yani Ortadaki Adam sald\u0131r\u0131s\u0131, bir bilgisayar korsan\u0131n\u0131n iki taraf aras\u0131ndaki ileti\u015fimi engelleyebildi\u011fi ve de\u011fi\u015ftirebildi\u011fi bir t\u00fcr siber sald\u0131r\u0131d\u0131r. Bu [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":3305,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[86,1],"tags":[],"class_list":["post-3279","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guvenlik","category-nedir-nasil-yapilir"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Man-in-the-Middle Ata\u011f\u0131 (MitM) Nedir? Nas\u0131l \u00c7al\u0131\u015f\u0131r? Nas\u0131l \u00d6nlenir? - Uzman Posta<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/uzmanposta.com\/blog\/man-in-the-middle-atagi-mitm\/\" \/>\n<meta property=\"og:locale\" content=\"tr_TR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Man-in-the-Middle Ata\u011f\u0131 (MitM) Nedir? Nas\u0131l \u00c7al\u0131\u015f\u0131r? Nas\u0131l \u00d6nlenir? - Uzman Posta\" \/>\n<meta property=\"og:description\" content=\"\u00c7evrimi\u00e7i g\u00fcvenlik d\u00fcnyas\u0131nda, Man-in-the-Middle sald\u0131r\u0131s\u0131 olduk\u00e7a tehlikeli bir tehdittir. Bu siber sald\u0131r\u0131, iki taraf aras\u0131ndaki ileti\u015fimleri yakalayarak ve manip\u00fcle ederek, bir bilgisayar korsan\u0131n\u0131n hassas bilgilere ve kaynaklara eri\u015fmesine olanak sa\u011flayabilir. Man-in-the-Middle (MitM) Sald\u0131r\u0131s\u0131 Nedir? Man-in-the-Middle (MITM) yani Ortadaki Adam sald\u0131r\u0131s\u0131, bir bilgisayar korsan\u0131n\u0131n iki taraf aras\u0131ndaki ileti\u015fimi engelleyebildi\u011fi ve de\u011fi\u015ftirebildi\u011fi bir t\u00fcr siber sald\u0131r\u0131d\u0131r. Bu [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/uzmanposta.com\/blog\/man-in-the-middle-atagi-mitm\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/uzmanposta\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-18T17:58:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-18T17:58:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/05\/man-in-the-middle-atagi-mitm-nedir-nasil-calisir-nasil-onlenir.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sibel Ho\u015f\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@uZmanPosta\" \/>\n<meta name=\"twitter:site\" content=\"@uZmanPosta\" \/>\n<meta name=\"twitter:label1\" content=\"Yazan:\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sibel Ho\u015f\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tahmini okuma s\u00fcresi\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 dakika\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Man-in-the-Middle Ata\u011f\u0131 (MitM) Nedir? Nas\u0131l \u00c7al\u0131\u015f\u0131r? Nas\u0131l \u00d6nlenir? - Uzman Posta","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/uzmanposta.com\/blog\/man-in-the-middle-atagi-mitm\/","og_locale":"tr_TR","og_type":"article","og_title":"Man-in-the-Middle Ata\u011f\u0131 (MitM) Nedir? Nas\u0131l \u00c7al\u0131\u015f\u0131r? Nas\u0131l \u00d6nlenir? - Uzman Posta","og_description":"\u00c7evrimi\u00e7i g\u00fcvenlik d\u00fcnyas\u0131nda, Man-in-the-Middle sald\u0131r\u0131s\u0131 olduk\u00e7a tehlikeli bir tehdittir. Bu siber sald\u0131r\u0131, iki taraf aras\u0131ndaki ileti\u015fimleri yakalayarak ve manip\u00fcle ederek, bir bilgisayar korsan\u0131n\u0131n hassas bilgilere ve kaynaklara eri\u015fmesine olanak sa\u011flayabilir. Man-in-the-Middle (MitM) Sald\u0131r\u0131s\u0131 Nedir? Man-in-the-Middle (MITM) yani Ortadaki Adam sald\u0131r\u0131s\u0131, bir bilgisayar korsan\u0131n\u0131n iki taraf aras\u0131ndaki ileti\u015fimi engelleyebildi\u011fi ve de\u011fi\u015ftirebildi\u011fi bir t\u00fcr siber sald\u0131r\u0131d\u0131r. Bu [&hellip;]","og_url":"https:\/\/uzmanposta.com\/blog\/man-in-the-middle-atagi-mitm\/","og_site_name":"Blog","article_publisher":"https:\/\/www.facebook.com\/uzmanposta\/","article_published_time":"2023-05-18T17:58:19+00:00","article_modified_time":"2023-05-18T17:58:20+00:00","og_image":[{"width":1000,"height":500,"url":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/05\/man-in-the-middle-atagi-mitm-nedir-nasil-calisir-nasil-onlenir.jpeg","type":"image\/jpeg"}],"author":"Sibel Ho\u015f","twitter_card":"summary_large_image","twitter_creator":"@uZmanPosta","twitter_site":"@uZmanPosta","twitter_misc":{"Yazan:":"Sibel Ho\u015f","Tahmini okuma s\u00fcresi":"13 dakika"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/uzmanposta.com\/blog\/man-in-the-middle-atagi-mitm\/#article","isPartOf":{"@id":"https:\/\/uzmanposta.com\/blog\/man-in-the-middle-atagi-mitm\/"},"author":{"name":"Sibel Ho\u015f","@id":"https:\/\/uzmanposta.com\/blog\/#\/schema\/person\/ac85212a35ebcaaf56c92a7e051813d6"},"headline":"Man-in-the-Middle Ata\u011f\u0131 (MitM) Nedir? Nas\u0131l \u00c7al\u0131\u015f\u0131r? Nas\u0131l \u00d6nlenir?","datePublished":"2023-05-18T17:58:19+00:00","dateModified":"2023-05-18T17:58:20+00:00","mainEntityOfPage":{"@id":"https:\/\/uzmanposta.com\/blog\/man-in-the-middle-atagi-mitm\/"},"wordCount":2969,"publisher":{"@id":"https:\/\/uzmanposta.com\/blog\/#organization"},"image":{"@id":"https:\/\/uzmanposta.com\/blog\/man-in-the-middle-atagi-mitm\/#primaryimage"},"thumbnailUrl":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/05\/man-in-the-middle-atagi-mitm-nedir-nasil-calisir-nasil-onlenir.jpeg","articleSection":["G\u00fcvenlik","Nedir? Nas\u0131l Yap\u0131l\u0131r?"],"inLanguage":"tr"},{"@type":"WebPage","@id":"https:\/\/uzmanposta.com\/blog\/man-in-the-middle-atagi-mitm\/","url":"https:\/\/uzmanposta.com\/blog\/man-in-the-middle-atagi-mitm\/","name":"Man-in-the-Middle Ata\u011f\u0131 (MitM) Nedir? Nas\u0131l \u00c7al\u0131\u015f\u0131r? Nas\u0131l \u00d6nlenir? - Uzman Posta","isPartOf":{"@id":"https:\/\/uzmanposta.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/uzmanposta.com\/blog\/man-in-the-middle-atagi-mitm\/#primaryimage"},"image":{"@id":"https:\/\/uzmanposta.com\/blog\/man-in-the-middle-atagi-mitm\/#primaryimage"},"thumbnailUrl":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/05\/man-in-the-middle-atagi-mitm-nedir-nasil-calisir-nasil-onlenir.jpeg","datePublished":"2023-05-18T17:58:19+00:00","dateModified":"2023-05-18T17:58:20+00:00","breadcrumb":{"@id":"https:\/\/uzmanposta.com\/blog\/man-in-the-middle-atagi-mitm\/#breadcrumb"},"inLanguage":"tr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/uzmanposta.com\/blog\/man-in-the-middle-atagi-mitm\/"]}]},{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/uzmanposta.com\/blog\/man-in-the-middle-atagi-mitm\/#primaryimage","url":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/05\/man-in-the-middle-atagi-mitm-nedir-nasil-calisir-nasil-onlenir.jpeg","contentUrl":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/05\/man-in-the-middle-atagi-mitm-nedir-nasil-calisir-nasil-onlenir.jpeg","width":1000,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/uzmanposta.com\/blog\/man-in-the-middle-atagi-mitm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/uzmanposta.com\/blog\/"},{"@type":"ListItem","position":2,"name":"G\u00fcvenlik","item":"https:\/\/uzmanposta.com\/blog\/guvenlik\/"},{"@type":"ListItem","position":3,"name":"Man-in-the-Middle Ata\u011f\u0131 (MitM) Nedir? Nas\u0131l \u00c7al\u0131\u015f\u0131r? Nas\u0131l \u00d6nlenir?"}]},{"@type":"WebSite","@id":"https:\/\/uzmanposta.com\/blog\/#website","url":"https:\/\/uzmanposta.com\/blog\/","name":"Blog","description":"","publisher":{"@id":"https:\/\/uzmanposta.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/uzmanposta.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"tr"},{"@type":"Organization","@id":"https:\/\/uzmanposta.com\/blog\/#organization","name":"Uzman Posta","url":"https:\/\/uzmanposta.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/uzmanposta.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2020\/05\/logo.png","contentUrl":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2020\/05\/logo.png","width":131,"height":60,"caption":"Uzman Posta"},"image":{"@id":"https:\/\/uzmanposta.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/uzmanposta\/","https:\/\/x.com\/uZmanPosta","https:\/\/www.instagram.com\/uzmanposta\/","https:\/\/www.linkedin.com\/company\/uzmanposta\/","https:\/\/www.youtube.com\/channel\/UCk2n1vp1YJ0n3XaDRWBi88Q"]},{"@type":"Person","@id":"https:\/\/uzmanposta.com\/blog\/#\/schema\/person\/ac85212a35ebcaaf56c92a7e051813d6","name":"Sibel Ho\u015f","image":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/secure.gravatar.com\/avatar\/f925f03d20ff0803ddb37c96d39d3793c085014ce56421050f24823c23db1c2a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f925f03d20ff0803ddb37c96d39d3793c085014ce56421050f24823c23db1c2a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f925f03d20ff0803ddb37c96d39d3793c085014ce56421050f24823c23db1c2a?s=96&d=mm&r=g","caption":"Sibel Ho\u015f"},"sameAs":["https:\/\/sibelhos.com\/","https:\/\/www.instagram.com\/bismoothie\/","https:\/\/www.linkedin.com\/in\/sibelhos\/"]}]}},"_links":{"self":[{"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/posts\/3279","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/comments?post=3279"}],"version-history":[{"count":0,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/posts\/3279\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/media\/3305"}],"wp:attachment":[{"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/media?parent=3279"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/categories?post=3279"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/tags?post=3279"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}