{"id":3388,"date":"2017-07-12T11:14:40","date_gmt":"2017-07-12T08:14:40","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=3388"},"modified":"2022-05-24T14:16:41","modified_gmt":"2022-05-24T11:16:41","slug":"android-root-faq","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/android-root-faq\/3388\/","title":{"rendered":"Android cihaz\u0131n\u0131z\u0131 root etmek: Avantajlar\u0131, dezavantajlar\u0131 ve zorluklar\u0131"},"content":{"rendered":"<p>Bir\u00e7ok Android kullan\u0131c\u0131 eninde sonunda cihazlar\u0131n\u0131 root etmek istiyor. Bug\u00fcn Android cihazlar\u0131 rootlaman\u0131n avantajlar\u0131n\u0131 ve dezavantajlar\u0131n\u0131 anlat\u0131rken cihaz\u0131n\u0131z\u0131 rootlaman\u0131z gerekip gerekmedi\u011fini anlataca\u011f\u0131z.<\/p>\n<h2>\u0130nsanlar Android cihazlar\u0131n\u0131 neden Rootluyor<\/h2>\n<p>S\u00fcper kullan\u0131c\u0131 haklar\u0131 elde etmek ki \u2013 pop\u00fcler olarak rootlamak olarak bilinir -, kullan\u0131c\u0131lara cihazlar\u0131nda tam yetki sa\u011flar. Sanal olarak bu s\u00fcper kullan\u0131c\u0131 haklar\u0131 ile her \u015feyi yapmak m\u00fcmk\u00fcnd\u00fcr. Baz\u0131lar\u0131 Google Play\u2019de olmak \u00fczere baz\u0131 uygulamalar da tam olarak \u00e7al\u0131\u015fmak i\u00e7in bu \u201ck\u00f6k izinleri\u201d talep eder.<\/p>\n<p>S\u00fcper kullan\u0131c\u0131 ayr\u0131cal\u0131klar\u0131 genel olarak cihaz \u00fczerindeki yetki kapasitesini artt\u0131r\u0131r. \u00d6rne\u011fin, baz\u0131 uygulamalar\u0131n network aktivitelerini limitlendirebilirsiniz, \u00f6nceden y\u00fcklenmi\u015f ve silemedi\u011finiz rahats\u0131z edici uygulamalar\u0131 silebilirsiniz, CPU\u2019yu h\u0131zland\u0131rabilirsiniz ve dahas\u0131n\u0131 yapabilirsiniz.<\/p>\n<p><a href=\"https:\/\/www.kaspersky.com\/blog\/kaspersky-security-network-explained\/8657\/\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Security Network<\/a>\u2018\u00fc kullanarak kullan\u0131c\u0131lar\u0131n pop\u00fcler Android cihaz rootlama sebeplerini derledik.<\/p>\n<ul>\n<li><strong>Oyunlar\u0131 hackleyen uygulamalar y\u00fcklemek.<\/strong> Bu uygulamalar oyunun kay\u0131tl\u0131 oldu\u011fu haf\u0131zaya eri\u015fip parametreleri de\u011fi\u015ftirerek \u00fccretsiz oyun, \u00fccretsiz hak vb \u015feyler sa\u011flayabiliyor.<\/li>\n<li><strong>Sistem dosyalar\u0131na eri\u015fim.<\/strong> Sistem dosyalar\u0131na s\u0131n\u0131rs\u0131z eri\u015fim, silinmi\u015f dosyalar\u0131 kurtarmak i\u00e7in s\u0131n\u0131rs\u0131z yetki kullanmak kullan\u0131\u015fl\u0131 olabilir. Ayr\u0131ca uygulamalar\u0131 SD karta ta\u015f\u0131tabilirsiniz ve geli\u015fmi\u015f dosya sistemi i\u015flevlerine sahip uygulamalar\u0131 kullanabilirsiniz.<\/li>\n<li><strong>Tweak, overclock ve cihaz temizleme.<\/strong> Overclock demek, CPU\u2019yu h\u0131zland\u0131rmaya denir, b\u00f6ylece cihaz daha h\u0131zl\u0131 \u00e7al\u0131\u015f\u0131r.<\/li>\n<li><strong>Android versiyonunu de\u011fi\u015ftirmek.<\/strong> Baz\u0131 kullan\u0131c\u0131lar, merakl\u0131lar\u0131 taraf\u0131ndan olu\u015fturulan \u00fc\u00e7\u00fcnc\u00fc parti yaz\u0131l\u0131m ROM\u2019lar\u0131n\u0131 (i\u015fletim sisteminin farkl\u0131 s\u00fcr\u00fcmlerini) deneyebilirler.<\/li>\n<\/ul>\n<h2>Kullan\u0131c\u0131lar k\u00f6k ayr\u0131cal\u0131klar\u0131na nas\u0131l eri\u015fiyor<\/h2>\n<p>Verilerimize g\u00f6re, kullan\u0131c\u0131lar Kingroot, 360 Root, Framaroot, Baidu Easy Root, Towelroot, One Click Root ve Mgyun gibi programlar kullanarak s\u00fcper kullan\u0131c\u0131 haklar\u0131 elde ediyor. Maalesef, bu uygulamalar\u0131n bir\u00e7o\u011fu ya reklam g\u00f6steriyor veya cihaza <a href=\"https:\/\/forum.xda-developers.com\/android\/general\/kingroot-malware-adware-root-t3563090\" target=\"_blank\" rel=\"noopener nofollow\">reklam vir\u00fcs\u00fc y\u00fckl\u00fcyorlar<\/a>. Bu davran\u0131\u015fa zararl\u0131 diyemeyiz ancak haliyle yararl\u0131 da de\u011fildir.<\/p>\n<p>Cihaz rootlamak i\u00e7in bu tarz uygulamalar\u0131n hi\u00e7birini \u00f6nermiyoruz. Asl\u0131nda, cihazlar\u0131 rootlaman\u0131z\u0131 ba\u015fl\u0131 ba\u015f\u0131na \u00f6nermiyoruz. Sebebi i\u00e7in okumaya devam edin.<\/p>\n<h2>Rootlaman\u0131n tehlikeleri<\/h2>\n<p>Dedi\u011fimiz gibi, s\u00fcper kullan\u0131c\u0131 haklar\u0131 cihaz \u00fczerinde tam kontrol sa\u011flar. Bu yetkinin avantajlar\u0131 oldu\u011fu gibi (yukar\u0131da bahsettik), dezavantajlar\u0131 da mevcuttur.<\/p>\n<p>\u00d6ncelikle \u015funu anlamakta fayda var, cihaz\u0131 s\u00fcper kullan\u0131c\u0131 sistem izinleriyle kullanmak Android\u2019in temel g\u00fcvenlik prensiplerine ayk\u0131r\u0131. Rootlamak, elinizdeki cihaz\u0131 kendi kendinize hacklemek demektir.<\/p>\n<p>Normalde, Android uygulamalar\u0131 izole ortamlarda \u00e7al\u0131\u015f\u0131r (Bu ortama Sandbox denir) ve sistemdeki di\u011fer uygulamalara eri\u015fim yetene\u011fi yoktur. Ancak s\u00fcper kullan\u0131c\u0131 haklar\u0131 olan ve izole bir ortamda bulunmayan uygulama cihaz\u0131n t\u00fcm kontrol\u00fcn\u00fc ele alabilir.<\/p>\n<p>S\u00fcper kullan\u0131c\u0131 izinleri ile uygulamalar istediklerini yapabilirler. \u00d6rne\u011fin i\u00e7eri\u011fe bakabilirler, d\u00fczenleyebilirler, sistemin \u00e7al\u0131\u015fmas\u0131 i\u00e7in laz\u0131m olan dosyalar\u0131 dahi silebilirler.<\/p>\n<p>Ayr\u0131ca, rootlanan cihaz\u0131n garanti kapsam\u0131 d\u0131\u015f\u0131nda kald\u0131\u011f\u0131n\u0131 da unutmay\u0131n. Bazen rootlama i\u015flemi s\u0131ras\u0131nda yap\u0131lan hatalar y\u00fcz\u00fcnden cihaz\u0131n\u0131z takozdan farks\u0131z hale gelebilir. B\u00f6yle durumlarda yap\u0131labilecek hi\u00e7bir \u015fey yok. Telefonunuzu ger\u00e7ekten takoz olarak kullanabilirsiniz.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"android-malware\">\n<h2>Zararl\u0131 uygulamalar ve rootlanm\u0131\u015f Androidler<\/h2>\n<p>S\u00fcper kullan\u0131c\u0131 haklar\u0131n\u0131 elde ettikten sonra, zararl\u0131 yaz\u0131l\u0131mlar elde ettikleri yetkilerin tad\u0131n\u0131 \u00e7\u0131kart\u0131r. Asl\u0131nda, bir\u00e7ok zararl\u0131 Android Trojan\u0131 \u00f6ncelikle k\u00f6k dizine eri\u015fmeye \u00e7al\u0131\u015f\u0131r. Rootlanm\u0131\u015f cihazlara giren zararl\u0131 yaz\u0131l\u0131mlar i\u00e7in bu cihazlar velinimettir.<\/p>\n<p>S\u00fcper kullan\u0131c\u0131 eri\u015fimiyle, mobil Trojanlar \u015funlar\u0131 yapabilir;<\/p>\n<ul>\n<li>Taray\u0131c\u0131lardan parola \u00e7alabilir (<a href=\"https:\/\/securelist.com\/76101\/the-banker-that-can-steal-anything\/\" target=\"_blank\" rel=\"noopener\">Tordow<\/a> bankac\u0131l\u0131k Trojan\u0131 bunu yapt\u0131),<\/li>\n<li>Google Play\u2019den gizlice uygulama sat\u0131n alabilir (<a href=\"https:\/\/securelist.com\/75894\/how-trojans-manipulate-google-play\/\" target=\"_blank\" rel=\"noopener\">Guerilla ve Ztorg Trojanlar\u0131<\/a> bunu yapt\u0131)<\/li>\n<li>Taray\u0131c\u0131daki URL\u2019leri de\u011fi\u015ftirebilir (<a href=\"https:\/\/securelist.com\/everyone-sees-not-what-they-want-to-see\/74997\/\" target=\"_blank\" rel=\"noopener\">Triada<\/a> Trojan\u0131 bunu yapt\u0131)<\/li>\n<li>Gizlice uygulama y\u00fckleyebilir, sistem b\u00f6l\u00fcm\u00fcne bile uygulama y\u00fckleyebilir<\/li>\n<li>Ayg\u0131t yaz\u0131l\u0131m\u0131n\u0131 modifiye edebilir, b\u00f6ylece cihaz fabrika ayarlar\u0131na d\u00f6nd\u00fcr\u00fclse bile zararl\u0131 yaz\u0131l\u0131m cihazda kalmaya devam eder<\/li>\n<\/ul>\n<p>Baz\u0131 fidye yaz\u0131l\u0131m\u0131 trojanlar\u0131 s\u00fcper kullan\u0131c\u0131 izinlerini kullanarak sistemde kalma \u015fanslar\u0131n\u0131 artt\u0131r\u0131rlar.<\/p>\n<p>Bir\u00e7ok durumda, zararl\u0131 yaz\u0131l\u0131mlar s\u00fcper kullan\u0131c\u0131 haklar\u0131n\u0131 elde etmek i\u00e7in sistem a\u00e7\u0131klar\u0131n\u0131 kullan\u0131rlar. Ama baz\u0131 zararl\u0131 uygulamalar var olan izinleri kullan\u0131r. Dahas\u0131, verilerimize g\u00f6re zararl\u0131 yaz\u0131l\u0131mlar\u0131n ortalama %5\u2019i \u2013 mesela Obad mobil trojan\u0131 \u2013 cihaz\u0131 k\u00f6k izinleri i\u00e7in tarar.<\/p>\n<h2>Rootlaman\u0131n co\u011frafyas\u0131<\/h2>\n<p>\u0130statistiklerimiz g\u00f6steriyor ki, rootlama i\u015flemi en \u00e7ok %26 ile Venez\u00fcella\u2019da yap\u0131l\u0131yor. Cezayir %19 ile Afrika \u00fclkelerinde ba\u015f\u0131 \u00e7ekiyor. Asya\u2019da %13 ile Banglade\u015f, Avrupa\u2019da ise %15 ile Moldova ba\u015f\u0131 \u00e7ekiyor.<\/p>\n<p>Rusya\u2019da ise Android kullan\u0131c\u0131lar\u0131n\u0131n %6.6\u2019s\u0131 ak\u0131ll\u0131 cihazlar\u0131n\u0131 rootlam\u0131\u015f. D\u00fcnya ortalamas\u0131na bakt\u0131\u011f\u0131m\u0131zda ise g\u00f6rd\u00fc\u011f\u00fcm\u00fcz rakam %7.6. Kuzey Amerika ve Bat\u0131 Avrupa \u00fclkeleri \u201cen \u00e7ok rootlayan\u201d \u00fclkeler aralar\u0131na giremediler.<\/p>\n<p>\u0130statistiklerimize g\u00f6re cihazlar\u0131 en \u00e7ok rootlayan 10 \u00fclke ile en \u00e7ok mobil sald\u0131r\u0131 alan 10 \u00fclke %60 oran\u0131nda ayn\u0131. Ayr\u0131ca cihazlar\u0131n\u0131 en \u00e7ok rootlayan 10 \u00fclkeden 9\u2019u, cihazlar\u0131na en \u00e7ok sald\u0131r\u0131 yap\u0131lan 25 \u00fclke s\u0131ralamas\u0131nda.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3389\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2017\/07\/12105525\/map_EN.png\" alt=\"\" width=\"1430\" height=\"1430\"><\/p>\n<h2>Anti vir\u00fcs programlar\u0131 rootlanm\u0131\u015f Android cihazlarda \u00e7al\u0131\u015f\u0131yor mu?<\/h2>\n<p>Maalesef, su\u00e7lular k\u00f6k dizine eri\u015ftikten sonra s\u00fcper kullan\u0131c\u0131 haklar\u0131n\u0131 k\u00f6t\u00fcye kullanarak g\u00fcvenlik mekanizmalar\u0131n\u0131 ge\u00e7ebilmesine ra\u011fmen, iyiler oyunu kurallar\u0131na g\u00f6re oynamak zorundad\u0131r. K\u0131sacas\u0131, anti vir\u00fcs rootlanm\u0131\u015f cihazlarda \u00e7al\u0131\u015f\u0131r ancak s\u00fcper kullan\u0131c\u0131 haklar\u0131 olan bir zararl\u0131 yaz\u0131l\u0131ma kar\u015f\u0131 etkili olamazlar.<\/p>\n<p>Ancak tabi, zararl\u0131 yaz\u0131l\u0131m\u0131n da k\u00f6k dizinine eri\u015fti\u011fi sistemi nas\u0131l kulland\u0131\u011f\u0131na g\u00f6re de\u011fi\u015fir. Ama yine de k\u00f6k dizin eri\u015fimi olan bir zararl\u0131 yaz\u0131l\u0131m\u0131 yakalama ihtimali rootlanm\u0131\u015f cihazda daha d\u00fc\u015f\u00fckt\u00fcr.<\/p>\n<h2>Yani, Android cihaz\u0131m\u0131 rootlamal\u0131 m\u0131y\u0131m?<\/h2>\n<p>S\u00fcper kullan\u0131c\u0131 yetkileri olan cihaz kullanmak a\u011f\u0131r bir kamyon kullanmak gibidir. E\u011fer ger\u00e7ekten ba\u015fa \u00e7\u0131kabilece\u011finizi d\u00fc\u015f\u00fcn\u00fcyorsan\u0131z, evet neden olmas\u0131n? Ama emin de\u011filseniz, \u00f6ncelikle yeteri kadar bilgi edinmeli ve deneyimli olmal\u0131s\u0131n\u0131z. E\u011fer BT sekt\u00f6r\u00fc \u00e7al\u0131\u015fan\u0131 veya uzman say\u0131labilecek derecede bilgi sahibi de\u011filseniz, Android cihaz\u0131n\u0131z\u0131 rootlaman\u0131z\u0131 \u00f6nermiyoruz.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"android-malware\">\n<p>\u00a0<\/p>\n<h2>Ufak \u00f6neriler;<\/h2>\n<ul>\n<li>Sadece resmi uygulama sitelerinden uygulama indirin. Resmi kaynaktan indirmi\u015f olsan\u0131z bile k\u00f6r\u00fc k\u00f6r\u00fcne g\u00fcvenmeyin. Google Play herhangi bir siteye g\u00f6re daha g\u00fcvenilir olsa da, <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/ztorg-botnet\/3236\/\" target=\"_blank\" rel=\"noopener\">Trojanlar<\/a> <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/dresscode-android-trojan\/2523\/\" target=\"_blank\" rel=\"noopener\">Google Store\u2019a<\/a> da <a href=\"https:\/\/www.kaspersky.com\/blog\/acecard-android-trojan\/11368\/\" target=\"_blank\" rel=\"noopener nofollow\">bula\u015fabiliyor<\/a>.<\/li>\n<li>Sadece bilinen uygulamalar\u0131 ve bilinen uygulama geli\u015ftiricilerin uygulamalar\u0131n\u0131 kullan\u0131n. \u0130htiyac\u0131n\u0131z olmayan uygulamalar\u0131 indirmeyin.<\/li>\n<li>Uygulamalar\u0131n\u0131z\u0131 g\u00fcvenilir bir anti vir\u00fcs program\u0131 ile taray\u0131n \u2013 \u00f6rne\u011fin \u00fccretsiz <a href=\"https:\/\/www.kaspersky.com.tr\/mobile-security?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____c8090141bf3f79f6\" target=\"_blank\" rel=\"noopener\">Kaspersky Internet Security for Android<\/a>\u2018i kullanabilirsiniz.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Bir\u00e7ok Android kullan\u0131c\u0131 eninde sonunda cihazlar\u0131n\u0131 root etmek istiyor. Bug\u00fcn Android cihazlar\u0131 rootlaman\u0131n avantajlar\u0131n\u0131 ve dezavantajlar\u0131n\u0131 anlat\u0131rken cihaz\u0131n\u0131z\u0131 rootlaman\u0131z gerekip gerekmedi\u011fini anlataca\u011f\u0131z.<\/p>\n","protected":false},"author":292,"featured_media":7700,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1284,1351],"tags":[105,744,519,685,1276,877,889],"class_list":{"0":"post-3388","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips","8":"category-threats","9":"tag-android","10":"tag-guvenlik","11":"tag-ipuclari-2","12":"tag-mobil-cihaz","13":"tag-root","14":"tag-sistem-aciklari","15":"tag-trojanlar"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/android-root-faq\/3388\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/android-root-faq\/4746\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/android-root-faq\/11581\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/android-root-faq\/10612\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/android-root-faq\/10553\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/android-root-faq\/13141\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/android-root-faq\/17785\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/android-root-faq\/17135\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/android-root-faq\/8893\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/android-root-faq\/9481\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/android-root-faq\/6927\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/android-root-faq\/13229\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/android-root-faq\/16595\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/android-root-faq\/17135\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/android-root-faq\/17135\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/android\/","name":"android"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/3388","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/292"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=3388"}],"version-history":[{"count":8,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/3388\/revisions"}],"predecessor-version":[{"id":10712,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/3388\/revisions\/10712"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/7700"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=3388"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=3388"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=3388"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}