{"id":94580,"date":"2018-11-19T01:51:37","date_gmt":"2018-11-19T09:51:37","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=94580"},"modified":"2018-11-19T01:51:37","modified_gmt":"2018-11-19T09:51:37","slug":"tehdit-ozeti-office-belgeleri-tehlikeli-olabilir-ancak-yine-de-onlari-kullanmaya-devam-ederiz","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2018\/11\/tehdit-ozeti-office-belgeleri-tehlikeli-olabilir-ancak-yine-de-onlari-kullanmaya-devam-ederiz\/?lang=tr","title":{"rendered":"TEHDIT \u00d6ZETI: OFFICE BELGELERI TEHLIKELI OLABILIR (Ancak Yine de Onlar\u0131 Kullanmaya Devam Ederiz)"},"content":{"rendered":"<p>Neredeyse hepimiz Microsoft Office belgeleri kullan\u0131yoruz. \u0130ster i\u015f belgeleri olsun, ister elektronik faturalar veya yeni bir evin kira kontrat\u0131 olsun, Office belgeleri hepimiz i\u00e7in kullan\u0131\u015fl\u0131d\u0131r ve e-posta eklentisi olarak ald\u0131\u011f\u0131m\u0131z bir Office belgesini a\u00e7mam\u0131z\u0131n nedenlerinden biri de budur. Pek \u00e7ok ki\u015finin, g\u00fcvenilir olmayan bir kaynaktan gelmese bile hemen hemen her belgeyi a\u00e7aca\u011f\u0131n\u0131 bilen ki\u015filer, bir sistemin g\u00fcvenli\u011fini ihlal etmek i\u00e7in sald\u0131r\u0131lar\u0131nda genelde bu dosyalar\u0131 se\u00e7er.<\/p>\n<p>Bu tehdit \u00f6zetinde size, Office belgelerinin bir Windows u\u00e7 noktas\u0131na sald\u0131rma ve tehlikeye sokma amac\u0131yla bozulup k\u00f6t\u00fcye kullan\u0131lmas\u0131n\u0131n be\u015f yolunu g\u00f6sterece\u011fiz. Bunlar\u0131n baz\u0131lar\u0131n\u0131 daha \u00f6nce anlatm\u0131\u015ft\u0131k, baz\u0131lar\u0131 ise yeni.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Makrolar<\/strong><\/p>\n<p>Makrolar bir sald\u0131rgan\u0131n Office belgelerini silaha d\u00f6n\u00fc\u015ft\u00fcrmesinin en basit yoludur. Office uygulamalar\u0131, VBA (Visual Basic for Applications) komut dosyalar\u0131n\u0131 \u00e7al\u0131\u015ft\u0131ran yerle\u015fik komut dosyas\u0131\u00a0 altyap\u0131s\u0131na sahiptir. Bu komut dosyalar\u0131 belge a\u00e7\u0131l\u0131r\u00a0 a\u00e7\u0131lmaz, herhangi bir kullan\u0131c\u0131 etkile\u015fimi olmaks\u0131z\u0131n y\u00fcr\u00fct\u00fcl\u00fcr (kullan\u0131c\u0131n\u0131n \u00f6nceden makrolar\u0131 etkinle\u015ftirdi\u011fi varsay\u0131l\u0131r) ve sistemde k\u00f6t\u00fc ama\u00e7l\u0131 kod \u00e7al\u0131\u015ft\u0131r\u0131r. Kullan\u0131c\u0131 makrolar\u0131 etkinle\u015ftirmemi\u015fse, bunlar\u0131 etkinle\u015ftirmesini isteyen bir a\u00e7\u0131l\u0131r pencere g\u00f6r\u00fcn\u00fcr. A\u00e7\u0131l\u0131r pencere, makrolar\u0131n ortaya \u00e7\u0131kard\u0131\u011f\u0131 g\u00fcvenlik riskini azaltmak i\u00e7in Microsoft taraf\u0131ndan eklenen bir\u00e7ok g\u00fcvenlik mekanizmas\u0131ndan biridir. Microsoft ayr\u0131ca farkl\u0131 bir dosya uzant\u0131s\u0131n\u0131 da zorunlu k\u0131lar (makrolar i\u00e7eren yeni dosyalar i\u00e7in .docx yerine .docm). Bu \u00f6nlemlere ra\u011fmen kullan\u0131c\u0131lar yine de bu dosyalar\u0131 a\u00e7\u0131p i\u00e7eriklerini etkinle\u015ftirmeyi tercih etti\u011fi i\u00e7in, bu <u><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2018\/02\/unit42-sofacy-attacks-multiple-government-entities\/\">Sofacy kampanyas\u0131<\/a><\/u> gibi karma\u015f\u0131k sald\u0131r\u0131larda oldu\u011fu kadar <u><a href=\"https:\/\/autofocus.paloaltonetworks.com\/#\/tag\/Unit42.Emotet\">Emotet<\/a><\/u> gibi fidye yaz\u0131l\u0131mlar\u0131n\u0131 bula\u015ft\u0131rmak i\u00e7in de, gerek kapsaml\u0131 gerekse basit sald\u0131r\u0131larda makrolar s\u0131k\u00e7a ba\u015fvurulan bir sald\u0131r\u0131 vekt\u00f6r\u00fc olmaya devam ediyor.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"837\"><span class=\"ar-custom\" style=\"padding-bottom:97.01%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone size-full wp-image-92538 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/10\/WordDocImage1zhCN.png\" alt=\"\" width=\"837\" height=\"812\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/10\/WordDocImage1zhCN.png 837w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/10\/WordDocImage1zhCN-230x223.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/10\/WordDocImage1zhCN-768x745.png 768w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/10\/WordDocImage1zhCN-500x485.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/10\/WordDocImage1zhCN-309x300.png 309w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/10\/WordDocImage1zhCN-41x40.png 41w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/10\/WordDocImage1zhCN-32x32.png 32w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/10\/WordDocImage1zhCN-50x50.png 50w\" sizes=\"auto, (max-width: 837px) 100vw, 837px\" \/><\/span><\/div><\/p>\n<p>\u015eekil 1. Sofacy belgesinin i\u00e7erik etkinle\u015ftirilmeden \u00f6nceki ve i\u00e7erik etkinle\u015ftirildikten sonraki hali.<\/p>\n<p>Bu \u00f6rnekte de g\u00f6rd\u00fc\u011f\u00fcn\u00fcz gibi, sald\u0131rganlar sosyal m\u00fchendislik yoluyla, belgenin tamam\u0131n\u0131 g\u00f6rebilmeleri i\u00e7in i\u00e7eri\u011fi etkinle\u015ftirmeleri gerekti\u011fine inand\u0131rarak, kullan\u0131c\u0131lar\u0131n Microsoft taraf\u0131ndan eklenmi\u015f g\u00fcvenlik mekanizmalar\u0131n\u0131 devre d\u0131\u015f\u0131 b\u0131rakmaya ikna etmeye \u00e7al\u0131\u015f\u0131yor. Sofacy \u00f6rne\u011finde, sald\u0131rganlar yaz\u0131 rengini beyaz yapm\u0131\u015ft\u0131r ve b\u00f6ylece, kullan\u0131c\u0131 makrolar\u0131 etkinle\u015ftirilmeden \u00f6nce sunulmu\u015f metin a\u00e7\u0131k bir bi\u00e7imde g\u00f6r\u00fcnmemektedir.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Ekli Flash dosyalar\u0131<\/strong><\/p>\n<p>Office belgelerine makrolar gibi yerle\u015fik \u00f6zelliklere ilave olarak Adobe Flash dosyalar\u0131 gibi harici nesneler de eklenebilir. Bu nesneler i\u015flenmek \u00fczere uygun yaz\u0131l\u0131ma ge\u00e7er, b\u00f6ylelikle yaz\u0131l\u0131mdaki herhangi bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131, nesnenin Office belgesindeki Adobe Flash i\u00e7eri\u011fine eklenmesiyle de istismar edilebilir. Sald\u0131rganlar\u0131n kulland\u0131\u011f\u0131 bu t\u00fcr sald\u0131r\u0131 vekt\u00f6r\u00fcne \u00f6rnek olarak, k\u00f6t\u00fc ama\u00e7l\u0131 SWF dosyalar\u0131n\u0131n Excel belgelerine eklenmesiyle istismar edilmi\u015f bir Adobe Flash Player S\u0131f\u0131r\u0131nc\u0131 G\u00fcn sald\u0131r\u0131s\u0131 olan\u00a0<u><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2018\/02\/unit42-traps-prevents-adobe-flash-player-zero-day\/\">CVE-2018-4878<\/a><\/u> verilebilir. Bu t\u00fcr sald\u0131r\u0131larda k\u00f6t\u00fc ama\u00e7l\u0131 Excel belgesi, Flash g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131 tetikleyebilecek ve ekli kabuk kodunu y\u00fcr\u00fctebilecek Adobe Flash i\u00e7eri\u011fini bar\u0131nd\u0131r\u0131r.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Microsoft Denklem D\u00fczenleyicisi<\/strong><\/p>\n<p>Adobe Flash dosyalar\u0131n\u0131 bir Office belgesine eklemede kullan\u0131lana benzer bir y\u00f6ntemle, kolayca matematik denklemleri yazman\u0131z\u0131 sa\u011flayan bir program olan Microsoft Denklem D\u00fczenleyicisi taraf\u0131ndan ayr\u0131\u015ft\u0131r\u0131lacak belgelere de denklemler ekleyebilirsiniz.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"893\"><span class=\"ar-custom\" style=\"padding-bottom:53.08%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone size-full wp-image-92577 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/10\/WordDocImage2zhCN.png\" alt=\"\" width=\"893\" height=\"474\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/10\/WordDocImage2zhCN.png 893w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/10\/WordDocImage2zhCN-230x122.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/10\/WordDocImage2zhCN-768x408.png 768w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/10\/WordDocImage2zhCN-500x265.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/10\/WordDocImage2zhCN-510x271.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/10\/WordDocImage2zhCN-75x40.png 75w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/10\/WordDocImage2zhCN-565x300.png 565w\" sizes=\"auto, (max-width: 893px) 100vw, 893px\" \/><\/span><\/div><\/p>\n<p>\u015eekil 2. \u00a0Microsoft Denklem D\u00fczenleyicisi<\/p>\n<p>\u00d6nceki \u00f6rne\u011fimizde oldu\u011fu gibi, denklem d\u00fczenleyicisindeki g\u00fcvenlik a\u00e7\u0131klar\u0131 k\u00f6t\u00fc ama\u00e7l\u0131 Office belgeleri kullan\u0131larak istismar edilebilir. <u><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/12\/unit42-analysis-of-cve-2017-11882-exploit-in-the-wild\/\">CVE-2017-11882<\/a><\/u> istismar edildi\u011finde bunun \u00f6rneklerini yak\u0131n zamanda g\u00f6rd\u00fck. Bu durum <u><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2018\/01\/unit42-traps-prevents-microsoft-office-equation-editor-zero-day-cve-2017-11882\/\">CVE-2018-0802<\/a><\/u> gibi ba\u015fka istismarlar\u0131n da yolunu a\u00e7t\u0131. Bunlar\u0131n her ikisi de denklem d\u00fczenleyicisindeki kusurlar\u0131 istismar ederek, kullan\u0131c\u0131n\u0131n bir Office belgesini a\u00e7mas\u0131yla sald\u0131rganlar\u0131n uzaktan kod y\u00fcr\u00fctmesini sa\u011flamaktad\u0131r. H\u00e2l\u00e2 ge\u00e7erli olmamakla birlikte, Microsoft Denklem D\u00fczenleyicisi\u2019nde Unit 42 ara\u015ft\u0131rmac\u0131lar\u0131 taraf\u0131ndan <u><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0807\" rel=\"nofollow,noopener\" >CVE-2018-0807<\/a><\/u>\u00a0ve\u00a0<u><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0798\" rel=\"nofollow,noopener\" >CVE-2018-0798<\/a><\/u> gibi benzer istismarlar saptanm\u0131\u015ft\u0131r.<\/p>\n<p>Microsoft Denklem D\u00fczenleyicisi kendi i\u015flemiyle (eqnedt32.exe) \u00e7al\u0131\u015ft\u0131\u011f\u0131ndan, EMET ve Windows Defender Exploit Guard gibi Microsoft Office\u2019e \u00f6zg\u00fc korumalar varsay\u0131lan olarak etkili de\u011fildir, \u00e7\u00fcnk\u00fc bunlar yaln\u0131zca Microsoft Office i\u015flemlerini (winword.exe gibi) korumaktad\u0131r.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>OLE Nesneleri ve HTA \u0130\u015fleyicileri<\/strong><\/p>\n<p>OLE Nesneleri ve HTA \u0130\u015fleyicileri, Office belgelerinin, i\u00e7eriklerinde ba\u015fka belgeler bulundurmak i\u00e7in ba\u015fvuruda bulunmak \u00fczere kulland\u0131\u011f\u0131 mekanizmalard\u0131r. Bir u\u00e7 noktay\u0131 tehlikeye sokmak i\u00e7in a\u015fa\u011f\u0131daki \u015fekilde kullan\u0131labilirler:<\/p>\n<ul>\n<li>Bir Microsoft Word belgesine Bir OLE ekli ba\u011flant\u0131 nesnesi eklidir<\/li>\n<li>Belge a\u00e7\u0131l\u0131nca Word i\u015flemi (winword.exe) k\u00f6t\u00fc ama\u00e7l\u0131 komut dosyas\u0131 i\u00e7eren bir HTA dosyas\u0131 almak i\u00e7in uzak bir sunucuya http iste\u011fi g\u00f6nderir<\/li>\n<li>Daha sonra winword.exe, Microsoft HTA uygulamas\u0131n\u0131n (mshta.exe) k\u00f6t\u00fc ama\u00e7l\u0131 komut dosyas\u0131n\u0131 y\u00fckleyip y\u00fcr\u00fctmesine neden olan bir COM nesnesi yoluyla uygulama\/hta i\u00e7in dosya i\u015fleyicisini arar<\/li>\n<\/ul>\n<p>Bu i\u015flev, bir Microsoft Office\/WordPad uzaktan kod y\u00fcr\u00fctme g\u00fcvenlik a\u00e7\u0131\u011f\u0131 olan ve Microsoft taraf\u0131ndan Eyl\u00fcl 2017\u2019de d\u00fczeltilen <u><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-0199\" rel=\"nofollow,noopener\" >CVE-2017-0199<\/a><\/u>\u2019un istismar\u0131nda geli\u015ftirilmi\u015f ve bu <u><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/10\/unit42-oilrig-group-steps-attacks-new-delivery-documents-new-injector-trojan\/\">OilRig kampanyas\u0131<\/a><\/u> gibi birden \u00e7ok kampanyada kullan\u0131lm\u0131\u015ft\u0131r.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"337\"><span class=\"ar-custom\" style=\"padding-bottom:40.06%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone size-full wp-image-92616 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/10\/WordDocImage3zhCN.png\" alt=\"\" width=\"337\" height=\"135\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/10\/WordDocImage3zhCN.png 337w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/10\/WordDocImage3zhCN-230x92.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/10\/WordDocImage3zhCN-100x40.png 100w\" sizes=\"auto, (max-width: 337px) 100vw, 337px\" \/><\/span><\/div><\/p>\n<p>\u015eekil 3. RTF dosyalar\u0131 t\u0131pk\u0131 normal bir Word belgesi gibi g\u00f6r\u00fcn\u00fcr<\/p>\n<p>\u00d6nceki OLE ve HTA istismar\u0131na ek olarak, sald\u0131rganlar RTF dosyalar\u0131n\u0131n da MSHTML kullanan \u2018text\/html\u2019 mime t\u00fcr\u00fc OLE nesnelerini y\u00fcr\u00fctebildi\u011fini ke\u015ffetmi\u015ftir. Bu, RTF dosyalar\u0131n\u0131n Internet Explorer\u2019la ayn\u0131 sald\u0131r\u0131 y\u00fczeyini ortaya \u00e7\u0131kard\u0131\u011f\u0131 anlam\u0131na gelmektedir!<\/p>\n<p><u><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8174\" rel=\"nofollow,noopener\" >CVE-2018-8174<\/a><\/u> olarak bilinen bu mant\u0131ksal g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131n kullan\u0131lmas\u0131, sald\u0131rganlar\u0131 rastgele HTML\/JavaScript\/VBScript y\u00fcr\u00fctmesine izin verir. Bu \u015fekilde y\u00fcr\u00fct\u00fclen kod, Internet Explorer\u2019dan \u00e7al\u0131\u015ft\u0131r\u0131lan di\u011fer kod gibi \u2018korumal\u0131\u2019 durumdayken (yeni i\u015flemler \u00e7al\u0131\u015ft\u0131ramaz veya dosya sistemine yazamaz, vb.) bu kusur, Word uygulamas\u0131n\u0131n ba\u011flam\u0131nda rastgele kod y\u00fcr\u00fctme elde etmek amac\u0131yla VBScript altyap\u0131s\u0131ndaki bellek bozulmas\u0131 UAF g\u00fcvenlik a\u00e7\u0131\u011f\u0131 gibi ba\u015fka g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 geli\u015ftirmek i\u00e7in kullan\u0131labilir, sald\u0131rganlar\u0131n sistemin kontrol\u00fcn\u00fc ele ge\u00e7irmelerini sa\u011flayabilir.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Sonu\u00e7<\/strong><\/p>\n<p>Belge tabanl\u0131 sald\u0131r\u0131lar on y\u0131ldan uzun s\u00fcredir genel bir sald\u0131r\u0131 vekt\u00f6r\u00fc oldu\u011fu halde, bu sald\u0131r\u0131lar\u0131n pop\u00fclaritesinde ve karma\u015f\u0131kl\u0131\u011f\u0131nda son zamanlarda bir art\u0131\u015f oldu\u011funu g\u00f6r\u00fcyoruz. Bu art\u0131\u015f, taray\u0131c\u0131 geli\u015ftiricileri taraf\u0131ndan yap\u0131lan g\u00fc\u00e7lendirmeler sayesinde taray\u0131c\u0131 istismarlar\u0131n\u0131n zorla\u015fmas\u0131ndan kaynaklan\u0131yor olabilir. Sebebi ne olursa olsun, kurulu\u015flar\u0131n bu ortak tekniklere kar\u015f\u0131 savunma yapmay\u0131 bilmeleri \u00f6nemlidir.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>\u00d6nleme<\/strong><\/p>\n<p>Palo Alto Networks Traps geli\u015fmi\u015f u\u00e7 nokta korumas\u0131, a\u015fa\u011f\u0131daki tehditlere kar\u015f\u0131 korunmak i\u00e7in birden \u00e7ok k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m ve istismar \u00f6nleme y\u00f6ntemi sunar:<\/p>\n<ul>\n<li>Makro inceleme \u2013 Traps, hem WildFire tehdit bilgisi bulutunu hem de yerel makine \u00f6\u011frenimi tabanl\u0131 becerilerini kullanarak k\u00f6t\u00fc ama\u00e7l\u0131 makrolar\u0131n varl\u0131\u011f\u0131na kar\u015f\u0131 her Office belgesini inceler ve k\u00f6t\u00fc ama\u00e7l\u0131 dosyalar\u0131n kullan\u0131c\u0131 taraf\u0131ndan a\u00e7\u0131lmas\u0131n\u0131 bile \u00f6nleyebilir.<\/li>\n<li>\u0130stismar \u00f6nleme \u2013 Traps\u2019in kapsaml\u0131 istismar \u00f6nleme becerileri, bu istismar giri\u015fimlerinin t\u00fcm\u00fcn\u00fcn sald\u0131r\u0131lan u\u00e7 noktada k\u00f6t\u00fc ama\u00e7l\u0131 kabuk kodlar \u00e7al\u0131\u015ft\u0131rmas\u0131n\u0131n \u00f6nler.<\/li>\n<li>Traps, Office uygulamalar\u0131n\u0131 varsay\u0131lan olarak izleyerek, g\u00fcvenli yerle\u015fik i\u015flemlerin k\u00f6t\u00fc ama\u00e7l\u0131 ak\u0131\u015flar i\u00e7in kullan\u0131lmamas\u0131n\u0131 sa\u011flar.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Neredeyse hepimiz Microsoft Office belgeleri kullan\u0131yoruz. \u0130ster i\u015f belgeleri olsun, ister elektronik faturalar veya yeni bir evin kira kontrat\u0131 olsun, Office belgeleri hepimiz i\u00e7in kullan\u0131\u015fl\u0131d\u0131r ve e-posta eklentisi olarak ald\u0131\u011f\u0131m\u0131z bir Office &hellip;<\/p>\n","protected":false},"author":575,"featured_media":67276,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[4827],"tags":[],"coauthors":[6203],"class_list":["post-94580","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized-tr"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/03\/Linkedin.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/94580","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/575"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=94580"}],"version-history":[{"count":1,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/94580\/revisions"}],"predecessor-version":[{"id":94581,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/94580\/revisions\/94581"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/67276"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=94580"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=94580"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=94580"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=94580"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}