{"id":1333,"date":"2014-08-25T09:34:14","date_gmt":"2014-08-25T13:34:14","guid":{"rendered":"http:\/\/www.kaspersky.com.tr\/blog\/?p=1333"},"modified":"2019-11-15T15:07:14","modified_gmt":"2019-11-15T12:07:14","slug":"oturma-odaniz-hacklenmis-olabilir","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/oturma-odaniz-hacklenmis-olabilir\/1333\/","title":{"rendered":"Oturma Odan\u0131z Hack&#8217;lenmi\u015f Olabilir"},"content":{"rendered":"<p>Kaspersky Lab G\u00fcvenlik Analisti David Jacoby, evinin siber g\u00fcvenlik a\u00e7\u0131s\u0131ndan ne kadar g\u00fcvenli oldu\u011funu anlamak amac\u0131yla kendi oturma odas\u0131nda bir deney ger\u00e7ekle\u015ftirdi. Siber sald\u0131r\u0131lara kar\u015f\u0131 zay\u0131f olup olmad\u0131klar\u0131n\u0131 anlamak i\u00e7in a\u011f ba\u011flant\u0131l\u0131 Ak\u0131ll\u0131 TV&#8217;ler, Blu-ray oynat\u0131c\u0131 vb. gibi ev e\u011flence cihazlar\u0131n\u0131 kontrol etti. Ve sald\u0131r\u0131lara kar\u015f\u0131 \u00e7ok zay\u0131f olduklar\u0131n\u0131 g\u00f6rd\u00fc.<\/p>\n<p>\u0130ncelenen iki a\u011f ba\u011flant\u0131l\u0131 depolama modeli, farkl\u0131 tedarik\u00e7ilere aitti, bunlar bir Ak\u0131ll\u0131 TV, bir uydu al\u0131c\u0131s\u0131 ve ba\u011flant\u0131l\u0131 bir yaz\u0131c\u0131yd\u0131. Ara\u015ft\u0131rmas\u0131n\u0131n sonucu olarak David Jacoby, a\u011fa ba\u011fl\u0131 depolarda 14 zay\u0131f nokta bulmay\u0131 ba\u015fard\u0131, bu zay\u0131f noktalardan biri Ak\u0131ll\u0131 TV&#8217;de, potansiyel olarak gizli pek \u00e7ok uzaktan kumanda fonksiyonu ise y\u00f6nelticide bulundu.<\/p>\n<p>Gizlilik ilkesi do\u011frultusunda Kaspersky Lab, zay\u0131f noktalar\u0131 kapatan bir g\u00fcvenlik yamas\u0131 piyasaya s\u00fcr\u00fclene kadar \u00fcr\u00fcnleri ara\u015ft\u0131rmaya tabi olan tedarik\u00e7ilerin adlar\u0131n\u0131 a\u00e7\u0131klamayacak. Ancak b\u00fct\u00fcn bu tedarik\u00e7iler, zay\u0131f noktalar\u0131n varl\u0131\u011f\u0131ndan haberdar edildi. Kaspersky Lab uzmanlar\u0131, ke\u015ffettikleri b\u00fct\u00fcn zay\u0131f noktalar\u0131 ortadan kald\u0131rmak i\u00e7in tedarik\u00e7ilerle yak\u0131n i\u015fbirli\u011fi i\u00e7inde \u00e7al\u0131\u015f\u0131yor.<\/p>\n<p>Ara\u015ft\u0131rman\u0131n yazar\u0131 <strong>David Jacoby<\/strong>, \u015funlar\u0131 s\u00f6yl\u00fcyor: <em>&#8220;Bireylerin ve \u015firketlerin ba\u011flant\u0131l\u0131 cihazlar\u0131n \u00e7evresindeki g\u00fcvenlik risklerini anlamas\u0131 gerekiyor. Ayr\u0131ca sadece g\u00fc\u00e7l\u00fc bir parolam\u0131z oldu\u011fu i\u00e7in bilgilerimizin g\u00fcvende olmad\u0131\u011f\u0131n\u0131 ve kontrol edemeyece\u011fimiz pek \u00e7ok \u015feyin bulundu\u011funu hesaba katmal\u0131y\u0131z. G\u00fcvenli bir cihaz gibi g\u00f6r\u00fcnen ve hatta kendi ad\u0131nda g\u00fcvenlik kelimesini \u00e7a\u011fr\u0131\u015ft\u0131ran bir cihazda son derece ciddi zay\u0131f noktalar bulmam ve bunlar\u0131 do\u011frulamam 20 dakikadan daha az zaman\u0131m\u0131 ald\u0131. Peki benim oturma odamdan \u00e7ok daha geni\u015f bir \u00f6l\u00e7ekte yap\u0131lm\u0131\u015f olsayd\u0131, benzer bir ara\u015ft\u0131rma nas\u0131l sonu\u00e7lan\u0131rd\u0131? Bu, cihaz tedarik\u00e7ilerinin ve bu cihazlar\u0131n g\u00fcvenlik topluluklar\u0131n\u0131n ve kullan\u0131c\u0131lar\u0131n\u0131n en yak\u0131n zamanda birlikte cevaplamas\u0131 gereken pek \u00e7ok sorudan sadece biri. Di\u011fer bir \u00f6nemli soru ise, cihazlar\u0131n kullan\u0131m \u00f6mr\u00fc. Tedarik\u00e7ilerle yapt\u0131\u011f\u0131m g\u00f6r\u00fc\u015fmelerden \u00f6\u011frendi\u011fim kadar\u0131yla, baz\u0131 tedarik\u00e7iler kullan\u0131m \u00f6mr\u00fc doldu\u011fu zaman zay\u0131f noktalar\u0131 bulunan bir cihaz i\u00e7in bir g\u00fcvenlik yamas\u0131 geli\u015ftirmeyecek. Genellikle bu kullan\u0131m \u00f6mr\u00fc bir ya da iki y\u0131l s\u00fcrer ancak cihazlar\u0131n, \u00f6rne\u011fin NAS&#8217;lerin, ger\u00e7ek \u00f6mr\u00fc bundan \u00e7ok daha uzundur&#8221;,<\/em> \u015feklinde konu\u015ftu.<\/p>\n<p><strong>Zay\u0131f parolalar<\/strong> <strong>b\u00fcy\u00fck tehlike<\/strong><\/p>\n<p>En ciddi zay\u0131f noktalar, a\u011fa ba\u011fl\u0131 depolarda bulundu. Bunlar\u0131n pek \u00e7o\u011fu, bir sald\u0131rgan\u0131n sistem komutlar\u0131n\u0131 y\u00f6netici \u00f6ncelikleriyle uzaktan y\u00fcr\u00fctmesine izin veriyordu. Zay\u0131f parolalara ve yanl\u0131\u015f izinleri olan pek \u00e7ok konfig\u00fcrasyon dosyas\u0131na sahip olan test edilen cihazlar\u0131n parolalar\u0131 d\u00fcz metin i\u00e7erisinde bar\u0131nd\u0131r\u0131yorlard\u0131. \u00d6rne\u011fin test edilen bir cihaz, \u015fifrelenmi\u015f parolalar\u0131 i\u00e7eren b\u00fct\u00fcn konfig\u00fcrasyon dosyas\u0131n\u0131 a\u011f \u00fczerindeki herkesle payla\u015f\u0131yordu.<\/p>\n<p>Ara\u015ft\u0131rmac\u0131, farkl\u0131 bir zay\u0131f nokta kullanarak, bir dosyay\u0131 depolama belle\u011finin genel bir kullan\u0131c\u0131n\u0131n ula\u015famayaca\u011f\u0131 bir alan\u0131na y\u00fckleyebiliyordu. Bu dosyan\u0131n zararl\u0131 bir dosya olmas\u0131 halinde, gizlili\u011fi ihlal edilen bu cihaz, bu NAS&#8217;ye ba\u011flanan di\u011fer cihazlar, \u00f6rne\u011fin bir ev bilgisayar\u0131 i\u00e7in bir vir\u00fcs bula\u015ft\u0131rma kayna\u011f\u0131 olabiliyordu. Hatta bir botnet i\u00e7erisinde DDoS olarak g\u00f6rev yapabiliyordu. Ayr\u0131ca zay\u0131f nokta, dosyan\u0131n cihaz\u0131n dosya sisteminin \u00f6zel bir b\u00f6l\u00fcm\u00fcne y\u00fcklenmesine izin verdi\u011fi i\u00e7in, bunu silmenin tek yolu, ayn\u0131 zay\u0131f noktay\u0131 kullanmakt\u0131. A\u00e7\u0131k\u00e7a g\u00f6r\u00fcl\u00fcyor ki bu, ortalama ev e\u011flencesi ekipman\u0131 kullan\u0131c\u0131s\u0131n\u0131 b\u0131rak\u0131n, bir teknik uzman\u0131 i\u00e7in bile kolay bir i\u015flem de\u011fil.<\/p>\n<p>Ba\u011flant\u0131l\u0131 cihazlar d\u00fcnyas\u0131nda nas\u0131l g\u00fcvende olabiliriz<\/p>\n<ul>\n<li>Bilgisayar korsan\u0131n\u0131n hayat\u0131n\u0131 zorla\u015ft\u0131r\u0131n: B\u00fct\u00fcn cihazlar\u0131n\u0131z, en yeni g\u00fcvenlik ve ayg\u0131t yaz\u0131l\u0131m\u0131 g\u00fcncellemelerine sahip olmal\u0131d\u0131r. Bu \u015fekilde bilinen zay\u0131f noktalardan faydalanma riski minimuma inecektir.<\/li>\n<li>Varsay\u0131lan kullan\u0131c\u0131 ad\u0131 ve parolas\u0131n\u0131n de\u011fi\u015ftirildi\u011finden emin olun: Cihaz\u0131n\u0131zdan faydalanmaya \u00e7al\u0131\u015f\u0131rken bir sald\u0131rgan\u0131n deneyece\u011fi ilk \u015fey bu olacakt\u0131r.<\/li>\n<li>Ev y\u00f6nelticilerinin ve anahtarlar\u0131n\u0131n \u00e7o\u011fu, her cihaz i\u00e7in kendi a\u011f\u0131n\u0131z\u0131 kurma se\u00e7ene\u011fine sahiptir ve ayr\u0131ca pek \u00e7ok farkl\u0131 DMZ (daha b\u00fcy\u00fck taviz riski ta\u015f\u0131yan sistemler i\u00e7in ayr\u0131 bir a\u011f b\u00f6l\u00fcm\u00fc) \/ VLAN (ayn\u0131 fiziksel a\u011f \u00fczerindeki farkl\u0131 mant\u0131ksal a\u011flar aras\u0131nda mant\u0131ksal ayr\u0131lma elde etmek i\u00e7in bir mekanizma) yard\u0131m\u0131yla cihaza eri\u015fimi k\u0131s\u0131tlar. \u00d6rne\u011fin bir TV&#8217;niz varsa, bu TV&#8217;ye eri\u015fimi k\u0131s\u0131tlamak ve a\u011f\u0131n\u0131z i\u00e7erisinde yaln\u0131zca belirli bir kayna\u011fa eri\u015fim izni vermek isteyebilirsiniz. Yaz\u0131c\u0131n\u0131z\u0131n TV&#8217;nize ba\u011fl\u0131 olmas\u0131n\u0131 gerektiren pek neden yok.<\/li>\n<\/ul>\n<p>&#8216;Cihazlardaki Internet: Evime Nas\u0131l \u0130zinsiz Giri\u015f Yapt\u0131m&#8217; adl\u0131 ara\u015ft\u0131rma \u00e7al\u0131\u015fmas\u0131n\u0131n tam metni, Securelist.com adresinde bulunmaktad\u0131r.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kaspersky Lab G\u00fcvenlik Analisti David Jacoby, evinin siber g\u00fcvenlik a\u00e7\u0131s\u0131ndan ne kadar g\u00fcvenli oldu\u011funu anlamak amac\u0131yla kendi oturma odas\u0131nda bir deney ger\u00e7ekle\u015ftirdi. Siber sald\u0131r\u0131lara kar\u015f\u0131 zay\u0131f olup olmad\u0131klar\u0131n\u0131 anlamak i\u00e7in<\/p>\n","protected":false},"author":350,"featured_media":1334,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1287,1284,1351],"tags":[627,503,78,628,629],"class_list":{"0":"post-1333","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-tips","9":"category-threats","10":"tag-great","11":"tag-guvenlik-acigi","12":"tag-hackers","13":"tag-internet-of-things","14":"tag-iot"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/oturma-odaniz-hacklenmis-olabilir\/1333\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/great\/","name":"GReAT"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/1333","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/350"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=1333"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/1333\/revisions"}],"predecessor-version":[{"id":7293,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/1333\/revisions\/7293"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/1334"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=1333"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=1333"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=1333"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}