{"id":7301,"date":"2025-01-23T21:27:19","date_gmt":"2025-01-23T17:27:19","guid":{"rendered":"https:\/\/linuxoyren.com\/?p=7301"},"modified":"2025-01-23T21:27:19","modified_gmt":"2025-01-23T17:27:19","slug":"osi-model-attack","status":"publish","type":"post","link":"https:\/\/linuxoyren.com\/osi-model-attack\/","title":{"rendered":"OSI modeli \u00fczr\u0259 kiber h\u00fccumlar"},"content":{"rendered":"
OSI (Open Systems Interconnection) modeli, komp\u00fcter \u015f\u0259b\u0259k\u0259sinin t\u0259\u015fkilini asanla\u015fd\u0131rmaq \u00fc\u00e7\u00fcn yeddi s\u0259viyy\u0259d\u0259n ibar\u0259t olan referans modelidir. Bu s\u0259viyy\u0259l\u0259rin h\u0259r biri \u00fczr\u0259 spesifik kiber h\u00fccum \u00fcsullar\u0131 m\u00f6vcuddur. Bu m\u0259qal\u0259d\u0259 OSI modelinin h\u0259r bir s\u0259viyy\u0259sin\u0259 uy\u011fun olan kiber h\u00fccum n\u00f6vl\u0259ri n\u00fcmun\u0259l\u0259rl\u0259 izah edilmi\u015fdir.Kiber t\u0259hl\u00fck\u0259sizlik \u00fczr\u0259 effektiv m\u00fcdafi\u0259 sistemi qurmaq \u00fcn OSI modelinin b\u00fct\u00fcn s\u0259viyy\u0259l\u0259rini yax\u015f\u0131 ba\u015fa d\u00fc\u015fm\u0259k vacibdir. H\u0259r bir s\u0259viyy\u0259 \u00fczr\u0259 z\u0259iflikl\u0259ri \u0259vv\u0259lc\u0259d\u0259n t\u0259yin ed\u0259r\u0259k, sisteminizi daha etibarl\u0131 hala g\u0259tir\u0259 bil\u0259rsiniz.<\/p>\n
1. Physical Layer<\/em> <\/strong>-Fiziki s\u0259viyy\u0259 \u015f\u0259b\u0259k\u0259 cihazlar\u0131 aras\u0131nda m\u0259lumat\u0131n fiziki \u015f\u0259kild\u0259 (kabell\u0259r, fiber-optik x\u0259tl\u0259r, radio siqnallar\u0131) \u00f6t\u00fcr\u00fclm\u0259sini \u0259hat\u0259 edir.Siqnal \u0259l\u0259ke\u00e7irm\u0259 fiber-optik kabell\u0259rin q\u0131r\u0131lmas\u0131 yaxud elektromaqnit siqnallar\u0131n \u0259l\u0259 ke\u00e7irilm\u0259si.<\/p>\n 2. Data Link Layer<\/em> <\/strong>– Bu s\u0259viyy\u0259 m\u0259lumat\u0131n \u00e7\u0259r\u00e7iv\u0259l\u0259nib qon\u015fu cihazlara \u00f6t\u00fcr\u00fclm\u0259sini t\u0259min edir.MAC spoofing h\u00fccum\u00e7u qanuni cihaz\u0131n MAC adresini saxtala\u015fd\u0131raraq \u015f\u0259b\u0259k\u0259y\u0259 daxil olur.ARP z\u0259h\u0259rl\u0259nm\u0259si (ARP poisoning) ARP (Address Resolution Protocol) c\u0259dv\u0259ll\u0259rinin manipulyasiyas\u0131 il\u0259 trafikin \u0259l\u0259ke\u00e7irilm\u0259si.<\/p>\n 3. Network Layer<\/em><\/strong> -Bu s\u0259viyy\u0259 m\u0259lumat paketl\u0259rinin mar\u015frutland\u0131r\u0131lmas\u0131na cavabdehdir.H\u00fccum n\u00f6v\u00fcn\u0259 baxd\u0131qda IP spoofing saxta IP adresl\u0259 h\u00fccum etm\u0259k,DDoS (Distributed Denial of Service) \u015f\u0259b\u0259k\u0259 resurslar\u0131na \u00e7oxsayl\u0131 h\u00fccumlarla \u015f\u0259b\u0259k\u0259nin \u00e7\u00f6kd\u00fcr\u00fclm\u0259si.<\/p>\n 4. Transport Layer – <\/strong><\/em>N\u0259qliyyat s\u0259viyy\u0259si m\u0259lumat\u0131n etibarl\u0131 \u00f6t\u00fcr\u00fclm\u0259sini t\u0259min edir.H\u00fccumun n\u00f6vl\u0259rin\u0259 baxaq TCP Syn flood TCP \u0259laq\u0259 prosesinin yar\u0131m\u00e7\u0131q burax\u0131lmas\u0131 il\u0259 serverin \u00e7\u00f6kd\u00fcr\u00fclm\u0259si,Port scanningn hans\u0131 portlar\u0131n a\u00e7\u0131q oldu\u011funu yoxlamaq.<\/p>\n 5. Session Layer –\u00a0<\/em><\/strong>Sessiya s\u0259viyy\u0259si iki cihaz aras\u0131nda ba\u011flant\u0131n\u0131 yaradir v\u0259 idar\u0259 edir.H\u00fccumun n\u00f6vl\u0259rin\u0259 n\u0259z\u0259r salaq Session hijacking sessiya ID-l\u0259rin \u0259l\u0259 ke\u00e7irilm\u0259si, Replay attacks \u00f6nc\u0259ki sessiyalar\u0131n m\u0259lumatlar\u0131n\u0131 yenid\u0259n istif\u0259d\u0259 etm\u0259k.<\/p>\n 6. Presentation Layer<\/em><\/strong> -Bu s\u0259viyy\u0259 m\u0259lumat\u0131n formatlanmas\u0131 v\u0259 \u015fifr\u0259l\u0259nm\u0259sin\u0259 cavabdehdir.H\u00fccum n\u00f6vl\u0259ri\u0259 baxaq SSL\/TLS vulnerabilities \u015fifr\u0259l\u0259m\u0259 protokollar\u0131ndak\u0131 z\u0259iflikl\u0259r,Malware injection formatlanm\u0131\u015f m\u0259lumat daxilind\u0259 ziyanverici kodlar\u0131 yerle\u015fdirm\u0259k.<\/p>\n 7. Application Layer – <\/em><\/strong>Bu s\u0259viyy\u0259 istif\u0259d\u0259\u00e7i proqramlar\u0131n\u0131n \u015f\u0259b\u0259k\u0259 il\u0259 \u0259laq\u0259sini idar\u0259 edir.H\u00fccumlara baxaq Phishing saxta veb saytlarla m\u0259lumat \u0259l\u0259ke\u00e7irm\u0259k,SQL injection\u00a0 veril\u0259nl\u0259r bazas\u0131na qeyri-qanuni sor\u011fu g\u00f6nd\u0259rm\u0259k v\u0259 Cross-site scripting (XSS) veb sayt\u0131n m\u0259zmununa ziyanverici skript yerle\u015fdirm\u0259k.<\/p>\n