{"id":5330,"date":"2025-06-10T19:22:26","date_gmt":"2025-06-10T16:22:26","guid":{"rendered":"https:\/\/hostingdunyam.com.tr\/blog\/?p=5330"},"modified":"2025-06-10T19:23:59","modified_gmt":"2025-06-10T16:23:59","slug":"dns-spoofing-nedir","status":"publish","type":"post","link":"https:\/\/hostingdunyam.com.tr\/blog\/dns-spoofing-nedir","title":{"rendered":"DNS Spoofing Nedir?"},"content":{"rendered":"<p data-start=\"185\" data-end=\"514\">DNS Spoofing (veya DNS Zehirlenmesi), kullan\u0131c\u0131y\u0131 sahte bir web sitesine y\u00f6nlendirmek amac\u0131yla DNS (Alan Ad\u0131 Sistemi) kay\u0131tlar\u0131n\u0131n manip\u00fcle edilmesiyle yap\u0131lan bir siber sald\u0131r\u0131 t\u00fcr\u00fcd\u00fcr. Bu t\u00fcr sald\u0131r\u0131larda kullan\u0131c\u0131, ziyaret etti\u011fini sand\u0131\u011f\u0131 me\u015fru bir site yerine sald\u0131rgan\u0131n kontrol\u00fcndeki k\u00f6t\u00fc niyetli bir siteye y\u00f6nlendirilir.<\/p>\n<p data-start=\"516\" data-end=\"752\">Sald\u0131rganlar genellikle bu y\u00f6ntemle <strong data-start=\"552\" data-end=\"620\">ki\u015fisel verileri, \u015fifreleri veya kredi kart\u0131 bilgilerini \u00e7almay\u0131<\/strong> hedefler. DNS spoofing, g\u00f6r\u00fcn\u00fcrde teknik kullan\u0131c\u0131lar d\u0131\u015f\u0131nda fark edilmesi olduk\u00e7a zor olan ve son derece tehlikeli bir y\u00f6ntemdir.<\/p>\n<h2 data-start=\"759\" data-end=\"797\">DNS Zehirlenmesi Nas\u0131l \u00c7al\u0131\u015f\u0131r?<\/h2>\n<p data-start=\"799\" data-end=\"1085\">DNS zehirlenmesi, DNS \u00f6nbelle\u011fine sahte IP adreslerinin yerle\u015ftirilmesiyle ger\u00e7ekle\u015fir. Bir kullan\u0131c\u0131 bir alan ad\u0131 (\u00f6rne\u011fin <code data-start=\"923\" data-end=\"938\">www.ornek.com<\/code>) girdi\u011finde, sistem \u00f6nce DNS \u00f6nbelle\u011fine bakar. Bu \u00f6nbellekte yanl\u0131\u015f ya da zararl\u0131 bir IP adresi varsa, kullan\u0131c\u0131 bu sahte sunucuya y\u00f6nlendirilir.<\/p>\n<p data-start=\"1087\" data-end=\"1105\"><strong data-start=\"1087\" data-end=\"1105\">Temel ad\u0131mlar:<\/strong><\/p>\n<ol>\n<li data-start=\"1110\" data-end=\"1161\">Sald\u0131rgan, DNS sunucusuna sahte bir kay\u0131t g\u00f6nderir.<\/li>\n<li data-start=\"1165\" data-end=\"1240\">Sunucu, bu sahte kayd\u0131 ge\u00e7ici bir s\u00fcreli\u011fine do\u011fruymu\u015f gibi saklar (cache).<\/li>\n<li data-start=\"1244\" data-end=\"1345\">Kullan\u0131c\u0131, bu DNS sunucusunu kullanarak siteye girmeye \u00e7al\u0131\u015ft\u0131\u011f\u0131nda, sahte IP adresine y\u00f6nlendirilir.<\/li>\n<li data-start=\"1349\" data-end=\"1451\">Kar\u015f\u0131s\u0131na \u00e7\u0131kan site, orijinalin birebir kopyas\u0131 olabilir \u2014 bu da kullan\u0131c\u0131y\u0131 aldatmay\u0131 kolayla\u015ft\u0131r\u0131r.<\/li>\n<\/ol>\n<h2 data-start=\"1458\" data-end=\"1507\">DNS \u00d6nbellek Zehirlenmesi Neden Tehlikeli?<\/h2>\n<p data-start=\"1509\" data-end=\"1672\">DNS spoofing&#8217;in tehlikesi, sald\u0131r\u0131n\u0131n \u00e7ok sessiz ve g\u00f6r\u00fcnmez \u015fekilde ger\u00e7ekle\u015fmesinden kaynaklan\u0131r. Kullan\u0131c\u0131lar genellikle bir \u015feylerin ters gitti\u011fini anlamazlar.<\/p>\n<p data-start=\"1674\" data-end=\"1690\"><strong data-start=\"1674\" data-end=\"1690\">Tehlikeleri:<\/strong><\/p>\n<ul>\n<li data-start=\"1694\" data-end=\"1772\">Kullan\u0131c\u0131lar\u0131n banka, e-ticaret veya sosyal medya hesap bilgileri \u00e7al\u0131nabilir.<\/li>\n<li data-start=\"1775\" data-end=\"1889\">Oturum \u00e7alma (session hijacking) veya zararl\u0131 yaz\u0131l\u0131m bula\u015ft\u0131rma gibi daha ileri sald\u0131r\u0131lara zemin haz\u0131rlanabilir.<\/li>\n<li data-start=\"1892\" data-end=\"1975\">Geni\u015f \u00f6l\u00e7ekli DNS zehirlenmeleriyle, binlerce kullan\u0131c\u0131 ayn\u0131 anda hedef al\u0131nabilir.<\/li>\n<li data-start=\"1978\" data-end=\"2064\">Kurumsal a\u011flar \u00fczerinden bilgi s\u0131zd\u0131rma gibi daha b\u00fcy\u00fck \u00e7apl\u0131 tehditler olu\u015fturabilir.<\/li>\n<\/ul>\n<h2 data-start=\"2071\" data-end=\"2100\">DNS Spoofing \u00d6rnekleri<\/h2>\n<h3 data-start=\"2102\" data-end=\"2142\">Fake Banka Sitesi Sald\u0131r\u0131s\u0131<\/h3>\n<p data-start=\"2143\" data-end=\"2368\">Bir kullan\u0131c\u0131 bankas\u0131n\u0131n adresini yazd\u0131\u011f\u0131nda (\u00f6rne\u011fin <code data-start=\"2197\" data-end=\"2209\">bankam.com<\/code>), DNS \u00f6nbellek zehirlenmesi sonucu sahte bir kopya siteye y\u00f6nlendirilir. Kullan\u0131c\u0131 giri\u015f bilgilerini girdi\u011finde, bu bilgiler do\u011frudan sald\u0131rgan\u0131n eline ge\u00e7er.<\/p>\n<h3 data-start=\"2370\" data-end=\"2409\">Kamu Wi-Fi A\u011flar\u0131nda Tuzak<\/h3>\n<p data-start=\"2410\" data-end=\"2610\">Sald\u0131rgan, halka a\u00e7\u0131k bir Wi-Fi a\u011f\u0131na ba\u011fl\u0131 kullan\u0131c\u0131n\u0131n DNS trafi\u011fini y\u00f6nlendirerek t\u00fcm giri\u015flerini sahte sitelere aktarabilir. Bu, \u00f6zellikle oteller, kafeler ve havaalanlar\u0131nda yayg\u0131n bir taktiktir.<\/p>\n<h2 data-start=\"2617\" data-end=\"2679\">DNS \u00d6nbellek Zehirlenmesinden Korunma Yollar\u0131 Nelerdir?<\/h2>\n<ol>\n<li data-start=\"2684\" data-end=\"2890\"><strong data-start=\"2684\" data-end=\"2731\">DNSSEC (DNS Security Extensions) Kullan\u0131m\u0131:<\/strong><br data-start=\"2731\" data-end=\"2734\" \/>DNSSEC, DNS verilerine dijital imza ekleyerek verinin do\u011frulu\u011funu garanti alt\u0131na al\u0131r. Destekleyen sunucular ve alan adlar\u0131nda sahte yan\u0131tlar reddedilir.<\/li>\n<li data-start=\"2895\" data-end=\"3050\"><strong data-start=\"2895\" data-end=\"2934\">G\u00fcvenilir DNS Sunucular\u0131 Kullanmak:<\/strong><br data-start=\"2934\" data-end=\"2937\" \/>Google DNS (8.8.8.8), Cloudflare DNS (1.1.1.1) gibi bilinen ve g\u00fcvenilir DNS sa\u011flay\u0131c\u0131lar\u0131 tercih edilmelidir.<\/li>\n<li data-start=\"3055\" data-end=\"3184\"><strong data-start=\"3055\" data-end=\"3076\">SSL\/TLS Kontrol\u00fc:<\/strong><br data-start=\"3076\" data-end=\"3079\" \/>Ger\u00e7ek siteler HTTPS protokol\u00fc kullan\u0131r. Taray\u0131c\u0131 adres \u00e7ubu\u011fundaki kilit simgesi kontrol edilmelidir.<\/li>\n<li data-start=\"3189\" data-end=\"3328\"><strong data-start=\"3189\" data-end=\"3224\">Firewall ve Antivir\u00fcs Korumas\u0131:<\/strong><br data-start=\"3224\" data-end=\"3227\" \/>G\u00fcncel g\u00fcvenlik yaz\u0131l\u0131mlar\u0131, sahte IP y\u00f6nlendirmelerini tespit edebilir ve kullan\u0131c\u0131y\u0131 uyarabilir.<\/li>\n<li data-start=\"3333\" data-end=\"3531\"><strong data-start=\"3333\" data-end=\"3375\">DNS \u00d6nbelle\u011fini Temizleme (Flush DNS):<\/strong><br data-start=\"3375\" data-end=\"3378\" \/>E\u011fer \u015f\u00fcpheli bir durumdan \u015f\u00fcpheleniliyorsa, DNS \u00f6nbelle\u011fi temizlenerek (\u00f6rne\u011fin <code data-start=\"3461\" data-end=\"3481\">ipconfig \/flushdns<\/code>) yeniden g\u00fcvenli adres \u00e7\u00f6z\u00fcmlemeleri yap\u0131labilir.<\/li>\n<\/ol>\n<p data-start=\"3552\" data-end=\"3969\">DNS Spoofing, hem bireysel kullan\u0131c\u0131lar hem de kurumlar i\u00e7in b\u00fcy\u00fck bir g\u00fcvenlik riskidir. Bu sald\u0131r\u0131 t\u00fcr\u00fcyle m\u00fccadelede fark\u0131ndal\u0131k ve do\u011fru yap\u0131land\u0131rma en \u00f6nemli ad\u0131md\u0131r. G\u00fcvenli DNS kullan\u0131m\u0131, HTTPS kontrol\u00fc ve DNSSEC gibi \u00e7\u00f6z\u00fcmler, bu tehdide kar\u015f\u0131 etkili \u00f6nlemler aras\u0131nda yer al\u0131r. Unutmay\u0131n: Girdi\u011finiz site ne kadar tan\u0131d\u0131k g\u00f6r\u00fcnse de, arka plandaki y\u00f6nlendirme sizi tamamen ba\u015fka bir yere g\u00f6t\u00fcr\u00fcyor olabilir.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>DNS Spoofing (veya DNS Zehirlenmesi), kullan\u0131c\u0131y\u0131 sahte bir web sitesine y\u00f6nlendirmek amac\u0131yla DNS (Alan Ad\u0131 Sistemi) kay\u0131tlar\u0131n\u0131n manip\u00fcle edilmesiyle yap\u0131lan bir siber sald\u0131r\u0131 t\u00fcr\u00fcd\u00fcr. Bu t\u00fcr sald\u0131r\u0131larda kullan\u0131c\u0131, ziyaret etti\u011fini sand\u0131\u011f\u0131 me\u015fru bir site yerine sald\u0131rgan\u0131n kontrol\u00fcndeki k\u00f6t\u00fc niyetli bir siteye y\u00f6nlendirilir. Sald\u0131rganlar genellikle bu y\u00f6ntemle ki\u015fisel verileri, \u015fifreleri veya kredi kart\u0131 bilgilerini \u00e7almay\u0131 hedefler. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":5331,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-5330","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-genel"],"_links":{"self":[{"href":"https:\/\/hostingdunyam.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5330","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hostingdunyam.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hostingdunyam.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hostingdunyam.com.tr\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hostingdunyam.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=5330"}],"version-history":[{"count":1,"href":"https:\/\/hostingdunyam.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5330\/revisions"}],"predecessor-version":[{"id":5332,"href":"https:\/\/hostingdunyam.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5330\/revisions\/5332"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hostingdunyam.com.tr\/blog\/wp-json\/wp\/v2\/media\/5331"}],"wp:attachment":[{"href":"https:\/\/hostingdunyam.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=5330"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hostingdunyam.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=5330"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hostingdunyam.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=5330"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}