{"id":2939,"date":"2022-04-17T12:03:44","date_gmt":"2022-04-17T12:03:44","guid":{"rendered":"https:\/\/bulutistan.com\/blog\/?p=2939"},"modified":"2023-02-22T08:22:42","modified_gmt":"2023-02-22T08:22:42","slug":"xss-cross-site-scripting-nedir","status":"publish","type":"post","link":"https:\/\/bulutistan.com\/blog\/xss-cross-site-scripting-nedir\/","title":{"rendered":"XSS Nedir? Cross-Site Scripting Zafiyeti Nas\u0131l Giderilir?"},"content":{"rendered":"<p>Cross-Site Scripting (XSS), internetteki en yayg\u0131n siber g\u00fcvenlik a\u00e7\u0131klar\u0131ndan biridir. XSS, genellikle web uygulamalar\u0131n\u0131 hedefleyen sald\u0131rganlar taraf\u0131ndan yayg\u0131n olarak kullan\u0131l\u0131r ve ba\u015flang\u0131c\u0131ndan bu yana OWASP ilk 10&#8217;a dahil edilmi\u015ftir.<\/p>\n<p>Peki Cross-Site Scripting (XSS) tam olarak nedir?<\/p>\n<h2 id=\"xss-nedir\">XSS Nedir?<\/h2>\n<p>Cross-site scripting attack (XSS) yani siteler aras\u0131 komut dosyas\u0131 \u00e7al\u0131\u015ft\u0131rma sald\u0131r\u0131s\u0131, bir bilgisayar korsan\u0131n\u0131n, iyi huylu ve g\u00fcvenilir olarak g\u00f6r\u00fclen bir web sayfas\u0131n\u0131n i\u00e7eri\u011fine, genellikle istemci taraf\u0131 komut dosyas\u0131 bi\u00e7iminde k\u00f6t\u00fc ama\u00e7l\u0131 kod enjekte etmesiyle olu\u015fur. K\u00f6t\u00fc ama\u00e7l\u0131 komut dosyas\u0131 genellikle, JavaScript ve HTML olan istemci taraf\u0131 programlama dillerinde yaz\u0131l\u0131r.<\/p>\n<p>Genel olarak, XSS sald\u0131r\u0131lar\u0131na yatk\u0131n web uygulamalar\u0131, kullan\u0131c\u0131lar\u0131n girdilerini do\u011frulamaz veya kodlamaz. Bir siber su\u00e7lu, bu kusurdan yararlanabilir ve \u015f\u00fcphelenmeyen bir son kullan\u0131c\u0131ya tehlikeli bir komut dosyas\u0131 g\u00f6nderebilir. Ne yaz\u0131k ki, kullan\u0131c\u0131n\u0131n taray\u0131c\u0131s\u0131, komut dosyas\u0131na g\u00fcvenilir bir kaynaktan geliyormu\u015f gibi davran\u0131r ve onu y\u00fcr\u00fct\u00fcr; bu, potansiyel olarak \u015f\u00fcphelenmeyen kullan\u0131c\u0131ya zarar verir.<\/p>\n<h2 id=\"xss-saldirisi-nasil-calisir\">XSS Sald\u0131r\u0131s\u0131 Nas\u0131l \u00c7al\u0131\u015f\u0131r?<\/h2>\n<p>Tipik olarak, siteler aras\u0131 komut dosyas\u0131 \u00e7al\u0131\u015ft\u0131rma sald\u0131r\u0131s\u0131 \u015fu \u015fekilde \u00e7al\u0131\u015f\u0131r:<\/p>\n<ul>\n<li>Siber su\u00e7lular, kullan\u0131c\u0131lar\u0131n girdilerini kabul eden bir web sayfas\u0131n\u0131n XSS sald\u0131r\u0131lar\u0131na a\u00e7\u0131k oldu\u011funu ke\u015ffeder. Kullan\u0131c\u0131lar\u0131n yorum kutular\u0131, giri\u015f formlar\u0131 veya arama kutular\u0131 arac\u0131l\u0131\u011f\u0131yla girdilerini kabul ediyor olabilir.<\/li>\n<li>Sald\u0131rganlar k\u00f6t\u00fc ama\u00e7l\u0131 bir komut dosyas\u0131 (y\u00fck) olu\u015fturur ve bunu \u015f\u00fcphelenmeyen bir kullan\u0131c\u0131ya g\u00f6nderir. Y\u00fck\u00fc bir kimlik av\u0131 ba\u011flant\u0131s\u0131na ekleyebilir ve hedef al\u0131nan ki\u015fiyi t\u0131klamaya ikna edebilir.<\/li>\n<li>Hedeflenen ki\u015fi k\u00f6t\u00fc niyetli ba\u011flant\u0131y\u0131 t\u0131klad\u0131\u011f\u0131nda, \u015fimdiye kadar g\u00fcvendi\u011fi savunmas\u0131z web sayfas\u0131na y\u00f6nlendirilir.<\/li>\n<li>Y\u00fck, savunmas\u0131z web sayfas\u0131na enjekte edilir ve hedef al\u0131nan ki\u015finin web taray\u0131c\u0131s\u0131 bunu me\u015fru kaynak kodu olarak de\u011ferlendirir.<\/li>\n<li>\u015e\u00fcphelenmeyen kullan\u0131c\u0131 baz\u0131 girdiler girip bunlar\u0131 g\u00f6nderdi\u011finde, y\u00fck siber su\u00e7lular\u0131n talimatlar\u0131na g\u00f6re y\u00fcr\u00fct\u00fcl\u00fcr.<\/li>\n<\/ul>\n<h2 id=\"xss-saldiri-turleri\">XSS Sald\u0131r\u0131 T\u00fcrleri<\/h2>\n<p>XSS i\u00e7in \u00fc\u00e7 ana sald\u0131r\u0131 stratejisi vard\u0131r. Bunlar DOM XSS, reflected XSS ve stored XSS&#8217;dir.<\/p>\n<p><b>DOM XSS: <\/b>DOM tabanl\u0131 bir XSS sald\u0131r\u0131 stratejisinde, bilgisayar korsan\u0131, orijinal istemci komut dosyas\u0131n\u0131n \u00e7al\u0131\u015ft\u0131\u011f\u0131 kurban\u0131n taray\u0131c\u0131s\u0131nda belge nesne modelini (DOM) de\u011fi\u015ftirerek y\u00fck\u00fc enjekte eder. Sayfa de\u011fi\u015fmez, ancak sayfada bulunan istemci taraf\u0131 kodu, k\u00f6t\u00fc ama\u00e7l\u0131 kod de\u011fi\u015fiklikleriyle \u00e7al\u0131\u015f\u0131r.<\/p>\n<p><b>Reflected XSS: <\/b>Kal\u0131c\u0131 olmayan XSS olarak da bilinen reflected XSS siber sald\u0131r\u0131s\u0131nda, bilgisayar korsanlar\u0131 k\u00f6t\u00fc ama\u00e7l\u0131 komut dosyas\u0131n\u0131 do\u011frudan bir HTTP iste\u011fine enjekte eder. Ard\u0131ndan, web sunucusundan y\u00fcr\u00fct\u00fcld\u00fc\u011f\u00fc kullan\u0131c\u0131n\u0131n taray\u0131c\u0131s\u0131na yans\u0131t\u0131r. Bilgisayar korsan\u0131 s\u0131kl\u0131kla hedeflenen ki\u015filere, onlar\u0131 savunmas\u0131z bir sayfaya getiren \u00f6zelle\u015ftirilmi\u015f ba\u011flant\u0131lar g\u00f6nderir.<\/p>\n<p>Reflected XSS sald\u0131r\u0131lar\u0131 kal\u0131c\u0131 de\u011fildir. Bir kullan\u0131c\u0131 k\u00f6t\u00fc niyetli bir ba\u011flant\u0131y\u0131 t\u0131klad\u0131\u011f\u0131nda, \u00f6zel olarak haz\u0131rlanm\u0131\u015f bir formun g\u00f6ndermesi veya k\u00f6t\u00fc niyetli bir siteye g\u00f6z atmas\u0131 i\u00e7in kand\u0131r\u0131ld\u0131\u011f\u0131nda, enjekte edilen kod savunmas\u0131z web sitesine gider. Web sunucusu, s\u0131rayla, enjekte edilen komut dosyas\u0131n\u0131 kullan\u0131c\u0131n\u0131n taray\u0131c\u0131s\u0131na d\u00f6nd\u00fcr\u00fcr veya yans\u0131t\u0131r. Bu aldatma, bir hata mesaj\u0131nda, arama sonucunda veya iste\u011fin bir par\u00e7as\u0131 olarak sunucuya g\u00f6nderilen verileri i\u00e7eren ba\u015fka bir yan\u0131t t\u00fcr\u00fcnde olabilir. Taray\u0131c\u0131, yan\u0131t\u0131n, kullan\u0131c\u0131n\u0131n zaten etkile\u015fimde bulundu\u011fu &#8220;g\u00fcvenilir&#8221; bir sunucudan geldi\u011fini varsayd\u0131\u011f\u0131 i\u00e7in kodu y\u00fcr\u00fct\u00fcr.<\/p>\n<p><b>Stored XSS: <\/b>Bilgisayar korsanlar\u0131 y\u00fcklerini g\u00fcvenli\u011fi ihlal edilmi\u015f bir sunucuda depolad\u0131\u011f\u0131nda sald\u0131r\u0131lar ger\u00e7ekle\u015fir. Genellikle zarar veren bir XSS sald\u0131r\u0131 y\u00f6ntemidir. Sald\u0131rgan, y\u00fcklerini hedef uygulamaya enjekte etmek i\u00e7in bu yakla\u015f\u0131m\u0131 kullan\u0131r. Uygulaman\u0131n giri\u015f do\u011frulamas\u0131 yoksa, k\u00f6t\u00fc ama\u00e7l\u0131 kod, uygulama taraf\u0131ndan veri taban\u0131 gibi bir konumda kal\u0131c\u0131 olarak depolan\u0131r veya kal\u0131c\u0131 olur. Pratikte bu, sald\u0131rgan\u0131n bir blog veya forum g\u00f6nderisindeki yorum b\u00f6l\u00fcmleri gibi kullan\u0131c\u0131 giri\u015f alanlar\u0131na k\u00f6t\u00fc ama\u00e7l\u0131 bir komut dosyas\u0131 girmesine olanak tan\u0131r.<\/p>\n<p>Sald\u0131rgan\u0131n y\u00fck\u00fc, vir\u00fcsl\u00fc sayfay\u0131 a\u00e7t\u0131\u011f\u0131nda, taray\u0131c\u0131s\u0131nda me\u015fru bir yorumun g\u00f6r\u00fcnmesiyle ayn\u0131 \u015fekilde, kullan\u0131c\u0131n\u0131n taray\u0131c\u0131s\u0131na sunulur. Hedeflenen ki\u015filer, sayfay\u0131 taray\u0131c\u0131lar\u0131nda g\u00f6r\u00fcnt\u00fclediklerinde yanl\u0131\u015fl\u0131kla k\u00f6t\u00fc ama\u00e7l\u0131 komut dosyas\u0131n\u0131 y\u00fcr\u00fct\u00fcrler.<\/p>\n<h2 id=\"cross-site-scripting-zafiyeti-vektorleri\">Cross-Site Scripting Zafiyeti Vekt\u00f6rleri<\/h2>\n<p>Siteler aras\u0131 komut dosyalar\u0131n\u0131 enjekte etme y\u00f6ntemleri \u00f6nemli \u00f6l\u00e7\u00fcde farkl\u0131l\u0131k g\u00f6sterir. Bilgisayar korsanlar\u0131, savunmas\u0131z web i\u015flevselli\u011finin kendisiyle do\u011frudan etkile\u015fime girmeden bir\u00e7ok g\u00fcvenlik a\u00e7\u0131\u011f\u0131ndan yararlanabilir. Bir bilgisayar korsan\u0131n\u0131n bir web uygulamas\u0131ndan ve denetimden alabilece\u011fi herhangi bir veri, bir enjeksiyon vekt\u00f6r\u00fc olabilir.<\/p>\n<p>Bilgisayar korsanlar\u0131, \u00e7e\u015fitli t\u00fcrlerde etiketler kullanabilir ve orada ama\u00e7lanan\u0131n yerine JavaScript kodunu bu etiketlere yerle\u015ftirebilir. \u00d6rne\u011fin, bu etiketlerin t\u00fcm\u00fc, ger\u00e7eklere ba\u011fl\u0131 olarak baz\u0131 taray\u0131c\u0131larda \u00e7al\u0131\u015ft\u0131r\u0131labilen k\u00f6t\u00fc ama\u00e7l\u0131 kodlar ta\u015f\u0131yabilir.<\/p>\n<p>Daha yayg\u0131n siteler aras\u0131 komut dosyas\u0131 \u00e7al\u0131\u015ft\u0131rma sald\u0131r\u0131 vekt\u00f6rlerinden baz\u0131lar\u0131 a\u015fa\u011f\u0131daki \u015fekildedir:<\/p>\n<ul>\n<li><strong>script tags<\/strong> (komut dosyas\u0131 etiketleri)<\/li>\n<li><strong>iframe tags<\/strong> (iframe etiketleri)<\/li>\n<li><strong>img attributes<\/strong> (img \u00f6zellikleri)<\/li>\n<li><strong>input tags<\/strong> (giri\u015f etiketleri)<\/li>\n<li><strong>link tags<\/strong> (ba\u011flant\u0131 etiketleri)<\/li>\n<li><strong>the background attribute of table tags and td tags<\/strong> (tablo etiketlerinin ve td etiketlerinin arka plan \u00f6zelli\u011fi)<\/li>\n<li><strong>div tags<\/strong> (div etiketleri)<\/li>\n<li><strong>object tags<\/strong> (nesne etiketleri)<\/li>\n<\/ul>\n<p>Onerror ve onload gibi JavaScript olay \u00f6znitelikleri \u00e7o\u011fu zaman bir\u00e7ok etikette kullan\u0131l\u0131r ve bu da onlar\u0131 bir ba\u015fka pop\u00fcler siteler aras\u0131 komut dosyas\u0131 \u00e7al\u0131\u015ft\u0131rma sald\u0131r\u0131 vekt\u00f6r\u00fc haline getirir.<\/p>\n<h2 id=\"cross-site-scripting-saldirilarinin-isletmelere-etkileri\">Cross-Site Scripting Sald\u0131r\u0131lar\u0131n\u0131n \u0130\u015fletmelere Etkileri<\/h2>\n<p>Cross-site scripting sald\u0131r\u0131lar\u0131n\u0131n i\u015fletmelere etkileri a\u015fa\u011f\u0131daki \u015fekildedir:<\/p>\n<h3 id=\"1-hassas-musteri-bilgilerinin-kaybi\">1. Hassas M\u00fc\u015fteri Bilgilerinin Kayb\u0131<\/h3>\n<p>XSS sald\u0131r\u0131lar\u0131; kredi kart\u0131 verileri, ad ve adres gibi hassas bilgilerin \u00e7al\u0131nmas\u0131n\u0131 i\u00e7erebilir. \u0130\u015fletmenin b\u00fcy\u00fckl\u00fc\u011f\u00fcne ve sald\u0131r\u0131n\u0131n kapsam\u0131na ba\u011fl\u0131 olarak milyonlarca ki\u015fi bu durumdan etkilenebilir. Kullan\u0131c\u0131 kimli\u011fine b\u00fcr\u00fcnmeye yol a\u00e7abilecek yetkilendirme tan\u0131mlama bilgisi h\u0131rs\u0131zl\u0131\u011f\u0131n\u0131 da i\u00e7erebilir.<\/p>\n<h3 id=\"2-kar-kaybi\">2. K\u00e2r Kayb\u0131<\/h3>\n<p>XSS sald\u0131r\u0131lar\u0131 itibar\u0131 olumsuz etkileyebilir ve m\u00fc\u015fteri g\u00fcvenini k\u0131rabilir. Bu da k\u00e2r \u00fczerinde negatif bir etkiye sahip olabilir.<\/p>\n<h3 id=\"3-duzenleyici-ve-uyumluluk-sorunlari\">3. D\u00fczenleyici ve Uyumluluk Sorunlar\u0131<\/h3>\n<p>PCI DSS, GDPR ve KVKK gibi devlet ve sekt\u00f6r d\u00fczenlemeleri, ticari m\u00fc\u015fterilerin bir XSS sald\u0131r\u0131s\u0131ndan etkilenmesi durumunda i\u015fletmeleri dava ve para cezalar\u0131na tabi tutabilir.<\/p>\n<h2 id=\"cross-site-scripting-zafiyeti-nasil-giderilir\">Cross-Site Scripting Zafiyeti Nas\u0131l Giderilir?<\/h2>\n<p>\u0130\u015fletmeler, a\u015fa\u011f\u0131daki en iyi uygulamalar\u0131 izleyerek XSS sald\u0131r\u0131lar\u0131n\u0131n say\u0131s\u0131n\u0131 ve etkisini azaltabilir:<\/p>\n<h3 id=\"1-web-varliklarini-denetleyin\">1. Web varl\u0131klar\u0131n\u0131 denetleyin<\/h3>\n<p>Web varl\u0131klar\u0131n\u0131z\u0131n envanterini \u00e7\u0131kar\u0131n ve sahip olduklar\u0131 veri t\u00fcr\u00fcn\u00fc \u00f6\u011frenin. Savunmas\u0131z komut dosyalar\u0131 ve herhangi bir manip\u00fclasyon belirtisi olup olmad\u0131\u011f\u0131na bak\u0131n.<\/p>\n<h3 id=\"2-istemci-tarafini-duzenli-olarak-tarayin\">2. \u0130stemci taraf\u0131n\u0131 d\u00fczenli olarak taray\u0131n<\/h3>\n<p>\u0130zinsiz giri\u015fleri, davran\u0131\u015fsal anormallikleri ve bilinmeyen tehditleri ortaya \u00e7\u0131karmak i\u00e7in istemci taraf\u0131 uygulamalara ve yaz\u0131l\u0131mlara d\u00fczenli olarak derinlemesine taramalar yap\u0131n.<\/p>\n<h3 id=\"3-girislerde-htmlyi-engelleyin\">3. Giri\u015flerde HTML&#8217;yi engelleyin<\/h3>\n<p>Kullan\u0131c\u0131 giri\u015fini\u00a0 front-end ve back-end\u2019de temizleyerek, k\u00f6t\u00fc ama\u00e7l\u0131 kodun giri\u015f g\u00f6ndermesini engelleyin.<\/p>\n<h3 id=\"4-otomatik-izleme-ve-incelemeyi-kullanin\">4. Otomatik izleme ve incelemeyi kullan\u0131n<\/h3>\n<p>\u0130zleme ve inceleme etkinlikleri kritiktir, ancak istemci taraf\u0131 JavaScript kodunu d\u00fczenli olarak g\u00f6zden ge\u00e7irmek i\u00e7in otomatik bir \u00e7\u00f6z\u00fcm\u00fcn\u00fcz yoksa zaman al\u0131c\u0131d\u0131r. S\u00fcreci otomatikle\u015ftiren amaca y\u00f6nelik bir \u00e7\u00f6z\u00fcm, yetkisiz komut dosyas\u0131 etkinli\u011fini belirlemenin h\u0131zl\u0131 ve kolay bir yolu olabilir.<\/p>\n<h3 id=\"5-form-girislerini-dogrulayin\">5. Form giri\u015flerini do\u011frulay\u0131n<\/h3>\n<p>Bir kullan\u0131c\u0131n\u0131n bir forma girdi\u011fi bilgileri s\u0131n\u0131rlay\u0131n. \u00d6rne\u011fin, t\u00fcm i\u00e7eri\u011fin alfasay\u0131sal olmas\u0131n\u0131 zorunlu k\u0131l\u0131n ve siteler aras\u0131 komut dosyas\u0131 olu\u015fturmada yayg\u0131n olarak kullan\u0131lan HTML veya etiketleri engelleyin.<\/p>\n<h3 id=\"6-guvenli-tanimlama-bilgileri-olusturun\">6. G\u00fcvenli tan\u0131mlama bilgileri olu\u015fturun<\/h3>\n<p>Siteler aras\u0131 komut dosyas\u0131 \u00e7al\u0131\u015ft\u0131rma sald\u0131r\u0131lar\u0131nda kullan\u0131lmalar\u0131n\u0131 \u00f6nlemek i\u00e7in bunlar\u0131 belirli bir IP adresine ba\u011flamak gibi tan\u0131mlama bilgisi kurallar\u0131 uygulay\u0131n.<\/p>\n<h2 id=\"bulutistan-cross-site-scripting-zafiyeti-icin-isletmenize-nasil-yardimci-olabilir\">Bulutistan Cross-Site Scripting Zafiyeti \u0130\u00e7in \u0130\u015fletmenize Nas\u0131l Yard\u0131mc\u0131 Olabilir?<\/h2>\n<p>Bulutistan Web Uygulama G\u00fcvenlik Duvar\u0131 (WAF), i\u015fletmelerin XSS sald\u0131r\u0131lar\u0131n\u0131 ve g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 \u00f6nlemesine ve tespit etmesine yard\u0131mc\u0131 olur. Bulutistan WAF, i\u015f a\u00e7\u0131s\u0131ndan kritik web uygulamalar\u0131n\u0131 bilinen tehditlerden, yeni ve ortaya \u00e7\u0131kan sald\u0131r\u0131 y\u00f6ntemlerinden, bilinmeyen veya s\u0131f\u0131r\u0131nc\u0131 g\u00fcn g\u00fcvenlik a\u00e7\u0131klar\u0131ndan korur. \u0130\u015fletmelerin, yeni bir \u00f6zelli\u011fi devreye soktuklar\u0131, mevcut bir \u00f6zelli\u011fi g\u00fcncelledikleri veya yeni web API&#8217;lerini kullan\u0131ma sunduklar\u0131 veya ba\u015flatt\u0131klar\u0131 her zaman, de\u011fi\u015fen h\u0131zla geli\u015fen sald\u0131r\u0131 y\u00fczeylerini korur.<\/p>\n<p>Bulutistan WAF, i\u015fletmelerin web uygulamalar\u0131n\u0131n ve API&#8217;lerinin korumas\u0131n\u0131 art\u0131ran geli\u015fmi\u015f \u00f6zellikleri kullanmalar\u0131n\u0131 da sa\u011flar. Bu \u00f6zellikler, Open Web Application Security Project&#8217;in (OWASP) &#8211; En \u0130yi 10 web g\u00fcvenlik riski de dahil olmak \u00fczere, i\u015fletmeleri tehditlerden korumaya y\u00f6nelik \u00e7ok katmanl\u0131 bir yakla\u015f\u0131m sunar. Ayr\u0131ca Bulutistan, korumay\u0131 her uygulama i\u00e7in \u00f6zelle\u015ftirmek i\u00e7in makine \u00f6\u011frenimini kullan\u0131r; bu, web uygulamalar\u0131n\u0131 manuel olarak ayarlamak i\u00e7in zaman alan bir s\u00fcre\u00e7 olmadan sa\u011flam bir koruma sa\u011flar. Bu ayr\u0131ca i\u015fletmelerin anormal davran\u0131\u015flar\u0131 h\u0131zl\u0131 bir \u015fekilde tespit etmesine ve k\u00f6t\u00fc niyetli bot etkinli\u011fini engellemesine olanak tan\u0131r.<\/p>\n<p>Bulutistan WAF; donan\u0131m ara\u00e7lar\u0131, veri merkezindeki kapsay\u0131c\u0131lar, bulut tabanl\u0131 uygulamalar veya bulutta yerel Hizmet Olarak Yaz\u0131l\u0131m (SaaS) \u00e7\u00f6z\u00fcmleri gibi t\u00fcm i\u015f uygulamalar\u0131n\u0131 korumak i\u00e7in kurulabilir.<\/p>\n<p><a href=\"https:\/\/bulutistan.com\/waf\/\" target=\"_blank\" rel=\"noopener\">Bulutistan WAF<\/a>\u00a0ile ilgili daha fazla bilgi almak isterseniz, linke t\u0131klayabilirsiniz.<\/p>\n<h2 id=\"xss-cross-site-scripting-ile-ilgili-en-cok-sorulan-sorular\">XSS (Cross-Site Scripting) \u0130le \u0130lgili En \u00c7ok Sorulan Sorular<\/h2>\n<h3 id=\"1-xssnin-hedefleri-hangi-dillerdir\">1. XSS&#8217;nin hedefleri hangi dillerdir?<\/h3>\n<p>XSS sald\u0131r\u0131lar\u0131 i\u00e7in en yayg\u0131n dil JavaScript&#8217;tir, ancak XSS HTML, Flash, VBScript, CSS ve di\u011fer web geli\u015ftirme dillerini ve \u00e7er\u00e7evelerini etkileyebilir.<\/p>\n<h3 id=\"2-xss-nasil-kesfedilir\">2. XSS nas\u0131l ke\u015ffedilir?<\/h3>\n<p>XSS&#8217;yi ke\u015ffetmenin en etkili yolu, bir web g\u00fcvenlik a\u00e7\u0131\u011f\u0131 taray\u0131c\u0131s\u0131 kullanmakt\u0131r. Bu ara\u00e7lar, bir XSS sald\u0131r\u0131s\u0131na yol a\u00e7abilecek g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 ve olas\u0131 sorunlar\u0131 ke\u015ffetmek i\u00e7in siteleri tarar.<\/p>\n<h3 id=\"3-xss-ve-sql-injection-saldirilari-arasindaki-fark-nedir\">3. XSS ve SQL Injection sald\u0131r\u0131lar\u0131 aras\u0131ndaki fark nedir?<\/h3>\n<p>Siteler aras\u0131 komut dosyas\u0131 olu\u015fturma, web uygulamalar\u0131n\u0131n kullan\u0131c\u0131lar\u0131n\u0131 hedef almas\u0131 nedeniyle SQL enjeksiyon sald\u0131r\u0131lar\u0131 gibi web sald\u0131r\u0131lar\u0131 i\u00e7in di\u011fer vekt\u00f6rlerden farkl\u0131d\u0131r. SQL enjeksiyon sald\u0131r\u0131lar\u0131 do\u011frudan uygulamalar\u0131 hedefler.<\/p>\n<h3 id=\"4-cross-site-scripting-saldirilari-neden-olusur\">4. Cross-site scripting sald\u0131r\u0131lar\u0131 neden olu\u015fur?<\/h3>\n<p>Cross-site scripting, giri\u015fler g\u00fcvenli olmayan bir \u015fekilde i\u015flendi\u011finde web sitelerinde bulunur. \u00d6rne\u011fin, http:\/\/test.com\/xss?xssparam= gibi bir URL i\u00e7indeki bir de\u011fi\u015fken olabilir. <strong>xss?param<\/strong> de\u011feri, site i\u00e7in dinamik i\u00e7erik olu\u015fturmak i\u00e7in kullan\u0131labilir ve sitenin \u00e7\u0131kt\u0131s\u0131 i\u00e7inde d\u00f6nd\u00fcr\u00fcl\u00fcr. Parametrenin de\u011feri \u00fczerinde do\u011frulama veya kodlama yap\u0131lmazsa, bir sald\u0131rgan parametreyi kendi JavaScript&#8217;lerini i\u00e7erecek \u015fekilde de\u011fi\u015ftirebilir.<\/p>\n","protected":false},"excerpt":{"rendered":"Cross-Site Scripting (XSS), internetteki en yayg\u0131n siber g\u00fcvenlik a\u00e7\u0131klar\u0131ndan biridir. XSS, genellikle web uygulamalar\u0131n\u0131 hedefleyen sald\u0131rganlar taraf\u0131ndan yayg\u0131n&hellip;\n","protected":false},"author":1,"featured_media":3012,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"csco_singular_sidebar":"","csco_page_header_type":"","csco_appearance_grid":"","csco_page_load_nextpost":"","csco_post_video_location":[],"csco_post_video_location_hash":"","csco_post_video_url":"","csco_post_video_bg_start_time":0,"csco_post_video_bg_end_time":0},"categories":[11,3],"tags":[24],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>XSS Nedir? Cross-Site Scripting Zafiyeti Nas\u0131l Giderilir? - Bulutistan Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bulutistan.com\/blog\/xss-cross-site-scripting-nedir\/\" \/>\n<meta property=\"og:locale\" content=\"tr_TR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"XSS Nedir? Cross-Site Scripting Zafiyeti Nas\u0131l Giderilir? - Bulutistan Blog\" \/>\n<meta property=\"og:description\" content=\"Cross-Site Scripting (XSS), internetteki en yayg\u0131n siber g\u00fcvenlik a\u00e7\u0131klar\u0131ndan biridir. XSS, genellikle web uygulamalar\u0131n\u0131 hedefleyen sald\u0131rganlar taraf\u0131ndan yayg\u0131n&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bulutistan.com\/blog\/xss-cross-site-scripting-nedir\/\" \/>\n<meta property=\"og:site_name\" content=\"Bulutistan Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-17T12:03:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-22T08:22:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/bulutistan.com\/blog\/wp-content\/uploads\/2022\/04\/XSSNedir-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bulutistan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Yazan:\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bulutistan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tahmini okuma s\u00fcresi\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 dakika\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/bulutistan.com\/blog\/xss-cross-site-scripting-nedir\/\",\"url\":\"https:\/\/bulutistan.com\/blog\/xss-cross-site-scripting-nedir\/\",\"name\":\"XSS Nedir? Cross-Site Scripting Zafiyeti Nas\u0131l Giderilir? - Bulutistan Blog\",\"isPartOf\":{\"@id\":\"https:\/\/bulutistan.com\/blog\/#website\"},\"datePublished\":\"2022-04-17T12:03:44+00:00\",\"dateModified\":\"2023-02-22T08:22:42+00:00\",\"author\":{\"@id\":\"https:\/\/bulutistan.com\/blog\/#\/schema\/person\/06a4312aff9f5a9fc23e25fe7a27076e\"},\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/bulutistan.com\/blog\/xss-cross-site-scripting-nedir\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/bulutistan.com\/blog\/#website\",\"url\":\"https:\/\/bulutistan.com\/blog\/\",\"name\":\"Bulutistan Blog\",\"description\":\"Teknolojide Yol Arkada\u015f\u0131n\u0131z\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/bulutistan.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"tr\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/bulutistan.com\/blog\/#\/schema\/person\/06a4312aff9f5a9fc23e25fe7a27076e\",\"name\":\"Bulutistan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/bulutistan.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0b09f693645c754f52af6ce46e1749e1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0b09f693645c754f52af6ce46e1749e1?s=96&d=mm&r=g\",\"caption\":\"Bulutistan\"},\"sameAs\":[\"https:\/\/bulutistan.com\/blog\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"XSS Nedir? Cross-Site Scripting Zafiyeti Nas\u0131l Giderilir? - Bulutistan Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bulutistan.com\/blog\/xss-cross-site-scripting-nedir\/","og_locale":"tr_TR","og_type":"article","og_title":"XSS Nedir? Cross-Site Scripting Zafiyeti Nas\u0131l Giderilir? - Bulutistan Blog","og_description":"Cross-Site Scripting (XSS), internetteki en yayg\u0131n siber g\u00fcvenlik a\u00e7\u0131klar\u0131ndan biridir. XSS, genellikle web uygulamalar\u0131n\u0131 hedefleyen sald\u0131rganlar taraf\u0131ndan yayg\u0131n&hellip;","og_url":"https:\/\/bulutistan.com\/blog\/xss-cross-site-scripting-nedir\/","og_site_name":"Bulutistan Blog","article_published_time":"2022-04-17T12:03:44+00:00","article_modified_time":"2023-02-22T08:22:42+00:00","og_image":[{"width":2560,"height":1440,"url":"https:\/\/bulutistan.com\/blog\/wp-content\/uploads\/2022\/04\/XSSNedir-scaled.jpg","type":"image\/jpeg"}],"author":"Bulutistan","twitter_card":"summary_large_image","twitter_misc":{"Yazan:":"Bulutistan","Tahmini okuma s\u00fcresi":"9 dakika"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/bulutistan.com\/blog\/xss-cross-site-scripting-nedir\/","url":"https:\/\/bulutistan.com\/blog\/xss-cross-site-scripting-nedir\/","name":"XSS Nedir? Cross-Site Scripting Zafiyeti Nas\u0131l Giderilir? - Bulutistan Blog","isPartOf":{"@id":"https:\/\/bulutistan.com\/blog\/#website"},"datePublished":"2022-04-17T12:03:44+00:00","dateModified":"2023-02-22T08:22:42+00:00","author":{"@id":"https:\/\/bulutistan.com\/blog\/#\/schema\/person\/06a4312aff9f5a9fc23e25fe7a27076e"},"inLanguage":"tr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bulutistan.com\/blog\/xss-cross-site-scripting-nedir\/"]}]},{"@type":"WebSite","@id":"https:\/\/bulutistan.com\/blog\/#website","url":"https:\/\/bulutistan.com\/blog\/","name":"Bulutistan Blog","description":"Teknolojide Yol Arkada\u015f\u0131n\u0131z","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bulutistan.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"tr"},{"@type":"Person","@id":"https:\/\/bulutistan.com\/blog\/#\/schema\/person\/06a4312aff9f5a9fc23e25fe7a27076e","name":"Bulutistan","image":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/bulutistan.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0b09f693645c754f52af6ce46e1749e1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0b09f693645c754f52af6ce46e1749e1?s=96&d=mm&r=g","caption":"Bulutistan"},"sameAs":["https:\/\/bulutistan.com\/blog"]}]}},"_links":{"self":[{"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/posts\/2939"}],"collection":[{"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/comments?post=2939"}],"version-history":[{"count":2,"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/posts\/2939\/revisions"}],"predecessor-version":[{"id":2957,"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/posts\/2939\/revisions\/2957"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/media\/3012"}],"wp:attachment":[{"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/media?parent=2939"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/categories?post=2939"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/tags?post=2939"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}