{"id":4591,"date":"2018-01-09T09:09:06","date_gmt":"2018-01-09T06:09:06","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=4591"},"modified":"2019-11-15T14:44:45","modified_gmt":"2019-11-15T11:44:45","slug":"xiaomi-mi-robot-hacked","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/xiaomi-mi-robot-hacked\/4591\/","title":{"rendered":"Xiaomi Mi Robot s\u00fcp\u00fcrge hacklendi"},"content":{"rendered":"<p>\u0130nternet ve Nesneleri hikayesi \u015fimdiye kadar talihsiz bir hikaye gibi g\u00f6r\u00fcnse de \u00fcmitsizli\u011fe kap\u0131lmaya gerek yok. G\u00fcvenlik ara\u015ft\u0131rmac\u0131lar Dennis Giese ve Daniel Wegemer sonunda Xiaomi Mi Robot s\u00fcp\u00fcrgeyi hacklemeyi ba\u015fard\u0131 ama ara\u015ft\u0131rmalar\u0131, bu cihaz\u0131n di\u011fer ak\u0131ll\u0131 nesnelere g\u00f6re \u00e7ok daha g\u00fcvenli oldu\u011funu ortaya \u00e7\u0131kard\u0131.<\/p>\n<p>K\u0131sa zaman \u00f6nce Leipzig\u2019de d\u00fczenlenen Chaos Communication Congress 34 kongresinde konu\u015fan ara\u015ft\u0131rmac\u0131lar, cihaz yaz\u0131l\u0131m\u0131n\u0131n nas\u0131l \u00e7al\u0131\u015ft\u0131\u011f\u0131n\u0131 ve korumay\u0131 k\u0131rmak i\u00e7in hangi g\u00fcvenlik a\u00e7\u0131klar\u0131ndan yararland\u0131klar\u0131 a\u00e7\u0131klad\u0131.<\/p>\n<h2>Mi Robot\u2019u al\u00fcminyum folyo ile hacklemek<\/h2>\n<p>Giese ve Wegemer ara\u015ft\u0131rmaya ba\u015flad\u0131klar\u0131nda Xiaomi s\u00fcp\u00fcrgesinin bir\u00e7ok ak\u0131ll\u0131 telefondan daha g\u00fc\u00e7l\u00fc bir donan\u0131ma sahip olduklar\u0131n\u0131 fark etti: Bir tanesi d\u00f6rt \u00e7ekirdekli olan \u00fc\u00e7 adet ARM i\u015flemcisiyle donat\u0131lm\u0131\u015ft\u0131. Son derece umut verici de\u011fil mi? Giese ve Wegemer, ba\u015flang\u0131\u00e7 olarak sistemi hacklemek i\u00e7in birka\u00e7 klasik sald\u0131r\u0131 vekt\u00f6r\u00fcn\u00fc denedi.<\/p>\n<p>\u00d6ncelikle s\u00fcp\u00fcrgenin mikro USB ba\u011flant\u0131 noktas\u0131 arac\u0131l\u0131\u011f\u0131yla bir giri\u015f yolu olup olmad\u0131\u011f\u0131n\u0131 g\u00f6rmek i\u00e7in birimi kontrol ettiler. Bu i\u015flemden bir sonu\u00e7 elde edemediler. \u00c7\u00fcnk\u00fc Xiaomi bu ba\u011flant\u0131y\u0131 bir t\u00fcr do\u011frulama ile kapatm\u0131\u015ft\u0131. Daha sonra ara\u015ft\u0131rmac\u0131lar Mi Robot\u2019u par\u00e7alar\u0131na ay\u0131rarak ana kart\u0131nda bir seri ba\u011flant\u0131 noktas\u0131 bulmaya \u00e7al\u0131\u015ft\u0131. Bu giri\u015fim de ba\u015far\u0131s\u0131zl\u0131kla sonu\u00e7land\u0131.<\/p>\n<p>\u0130kinci hackleme y\u00f6ntemi a\u011f tabanl\u0131yd\u0131. Ara\u015ft\u0131rmac\u0131lar cihaz\u0131n a\u011f ba\u011flant\u0131 noktalar\u0131n\u0131 taramaya \u00e7al\u0131\u015ft\u0131; ancak t\u00fcm ba\u011flant\u0131 noktalar\u0131 kapal\u0131yd\u0131. A\u011f trafi\u011fini izlemeye \u00e7al\u0131\u015fmaktan da bir sonu\u00e7 elde edemediler. \u00c7\u00fcnk\u00fc robotun ileti\u015fimleri \u015fifreliydi. Bu noktaya kadar olduk\u00e7a etkilendi\u011fimi s\u00f6ylemeliyim. Di\u011fer IoT cihazlar\u0131n\u0131n tasar\u0131mc\u0131lar\u0131 genellikle g\u00fcvenlik a\u00e7\u0131s\u0131ndan bu kadar ileriye gitmedi\u011fi i\u00e7in di\u011fer cihazlar \u015fimdiye kadar \u00e7oktan hacklenirdi. Ba\u011flant\u0131l\u0131 cihazlar\u0131n ne kadar g\u00fcvensiz olduklar\u0131yla ilgili <a href=\"https:\/\/securelist.com\/iot-lottery\/83300\/\" target=\"_blank\" rel=\"noopener\">ara\u015ft\u0131rmam\u0131z<\/a> bunu m\u00fckemmel \u015fekilde g\u00f6steriyor.<\/p>\n<p>\u015eimdi Xiaomi Mi Robot\u2019a geri d\u00f6nelim. Ara\u015ft\u0131rmac\u0131lar, di\u011fer denemelerinde s\u00fcp\u00fcrgenin donan\u0131m\u0131na sald\u0131rmaya \u00e7al\u0131\u015ft\u0131. \u0130\u015fte bu noktada da ba\u015far\u0131l\u0131 oldular. \u0130\u015flemciyi anakarta ba\u011flayan k\u00fc\u00e7\u00fck kontaklar\u0131n k\u0131sa devre yapmas\u0131 i\u00e7in al\u00fcminyum folyo kulland\u0131lar. Bu sayede i\u015flemci, do\u011frudan USB ba\u011flant\u0131s\u0131 arac\u0131l\u0131\u011f\u0131yla flash belle\u011fi okumaya ve hatta yazmaya izin veren \u00f6zel bir moda girdi.<\/p>\n<p>Giese ve Wegemer, Mi Robot\u2019un \u00fcr\u00fcn yaz\u0131l\u0131m\u0131n\u0131 elde ettiler, tersine m\u00fchendislik y\u00f6ntemlerini kullanarak sonunda bu yaz\u0131l\u0131m\u0131 de\u011fi\u015ftirdiler ve yeniden s\u00fcp\u00fcrgeye y\u00fcklediler. Bu sayede birimin kontrol\u00fcn\u00fc tamamen ele ge\u00e7irdiler.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/uhyM-bhzFsI?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<h2>Mi Robot\u2019u kablosuz olarak hackleme<\/h2>\n<p>Ancak cihaz\u0131 par\u00e7alar\u0131na ay\u0131r\u0131p donan\u0131mlar\u0131n\u0131 hacklemek, m\u00fcdahalesiz hackleme y\u00f6ntemleri kadar haval\u0131 de\u011fildir. Ara\u015ft\u0131rmac\u0131lar, cihaz\u0131n \u00fcr\u00fcn yaz\u0131l\u0131m\u0131nda tersine m\u00fchendislik y\u00f6ntemlerini kullanarak yaz\u0131l\u0131m\u0131 yaln\u0131zca Wi-Fi ile hackeleme y\u00f6ntemini buldu. Ayr\u0131ca \u00fcr\u00fcn yaz\u0131l\u0131m\u0131n\u0131n g\u00fcncelleme mekanizmas\u0131nda da birka\u00e7 hata ke\u015ffettiler.<\/p>\n<p>Xiaomi, olduk\u00e7a iyi bir \u00fcr\u00fcn yaz\u0131l\u0131m\u0131 g\u00fcncelleme prosed\u00fcr\u00fc uygulam\u0131\u015f. Yeni yaz\u0131l\u0131m \u015fifreli bir ba\u011flant\u0131 arac\u0131l\u0131\u011f\u0131yla ula\u015f\u0131yor, ayn\u0131 zamanda \u00fcr\u00fcn yaz\u0131l\u0131m\u0131 paketi de \u015fifreli. Ancak Xiaomi, g\u00fcncelleme paketlerinin \u015fifresini \u00e7\u00f6zmek i\u00e7in statik bir parola, \u201crockrobo\u201d, kullan\u0131yor (hi\u00e7bir zaman zay\u0131f parolalar kullanmay\u0131n). Bu parola ara\u015ft\u0131rmac\u0131lar\u0131n kendi sahte \u00fcr\u00fcn yaz\u0131l\u0131mlar\u0131n\u0131 i\u00e7eren \u015fifreli bir paket olu\u015fturmalar\u0131n\u0131 sa\u011flad\u0131.<\/p>\n<p>Daha sonra Xiaomi\u2019nin ak\u0131ll\u0131 telefon uygulamas\u0131ndan edinilen g\u00fcvenlik anahtar\u0131n\u0131 kullanarak s\u00fcp\u00fcrgeye yeni \u00fcr\u00fcn yaz\u0131l\u0131m\u0131n\u0131 indirmesi ve y\u00fcklemesi i\u00e7in istek g\u00f6nderildi. Bu istek Xiaomi\u2019nin bulutundan de\u011fil kendi sunucusundan iletildi. Bu sefer cihaz\u0131 kablosuz olarak hacklemeyi ba\u015fard\u0131lar.<\/p>\n<h2>Mi Robot \u00fcr\u00fcn yaz\u0131l\u0131m\u0131n\u0131n \u00f6zellikleri<\/h2>\n<p>Giese ve Wegemer, \u00fcr\u00fcn yaz\u0131l\u0131m\u0131n\u0131 incelerken Xiaomi ak\u0131ll\u0131 cihazlar\u0131yla ilgili birka\u00e7 ilgin\u00e7 bilgi edinmeyi de ba\u015fard\u0131. \u00d6ncelikle Mi Robot \u00fcr\u00fcn yaz\u0131l\u0131m\u0131 temelde d\u00fczenli ve h\u0131zl\u0131 bir \u015fekilde d\u00fczeltme eki uygulanan Ubuntu Linux sistemini kullan\u0131yor. \u0130kinci olarak her cihaz i\u00e7in farkl\u0131 bir s\u00fcper kullan\u0131c\u0131 parolas\u0131 kullan\u0131l\u0131yor. T\u00fcm s\u00fcp\u00fcrgeleri tek seferde hacklemek i\u00e7in kullan\u0131labilecek bir ana parola yok. \u00dc\u00e7\u00fcnc\u00fc olarak sistem hackerlar taraf\u0131ndan kullan\u0131labilecek t\u00fcm ba\u011flant\u0131 noktalar\u0131n\u0131 engelleyen bir g\u00fcvenlik duvar\u0131 \u00e7al\u0131\u015ft\u0131r\u0131yor. IoT standartlar\u0131na g\u00f6re \u015fa\u015f\u0131rt\u0131c\u0131 derecede iyi korumas\u0131 i\u00e7in yine Xiaomi\u2019den etkilendi\u011fimi belirtmeliyim.<\/p>\n<p>Ancak ara\u015ft\u0131rmac\u0131lar Mi Robot hakk\u0131nda hayal k\u0131r\u0131kl\u0131\u011f\u0131 ya\u015fatan bir bilgi edindi. Cihaz \u00e7ok fazla veri topluyor ve bunlar\u0131 Xiaomi bulutuna y\u00fckl\u00fcyor. Veriler g\u00fcnl\u00fck birka\u00e7 megabayta ula\u015fabiliyor. Bu veriler, cihaz \u00e7al\u0131\u015fma telemetrisi gibi makul \u015feylerin yan\u0131 s\u0131ra cihaz\u0131n ba\u011fland\u0131\u011f\u0131 Wi-Fi a\u011flar\u0131n\u0131n adlar\u0131n\u0131 ve parolalar\u0131n\u0131 ve dahili lidar sens\u00f6r\u00fcyle olu\u015fturdu\u011fu oda haritalar\u0131n\u0131 da kaps\u0131yor. Daha da k\u00f6t\u00fcs\u00fc, bu veriler fabrika s\u0131f\u0131rlamas\u0131ndan sonra bile silinmiyor ve sistemde sonsuza dek kal\u0131yor. Yani birisi eBay \u00fczerinden ikinci el bir Xiaomi s\u00fcp\u00fcrgesi al\u0131p k\u0131s\u0131tlamalar\u0131n\u0131 kald\u0131r\u0131rsa t\u00fcm bu bilgilere kolayl\u0131kla ula\u015fabilir.<\/p>\n<p>Sonu\u00e7 olarak Giese ve Wegemer, kulland\u0131klar\u0131 her iki teknikte de yaln\u0131zca kendi cihazlar\u0131n\u0131 hackleyebildi. \u0130lk teknik i\u00e7in s\u00fcp\u00fcrgeye fiziksel eri\u015fiminizin olmas\u0131 gerekiyordu. \u0130kincisinde ise g\u00fcncelleme iste\u011fi yapabilmek i\u00e7in g\u00fcvenlik anahtar\u0131na ihtiya\u00e7lar\u0131 vard\u0131 ve cihaz mobil uygulamaya her ba\u011fland\u0131\u011f\u0131nda yeni bir anahtar olu\u015fturuluyordu. G\u00fcvenlik anahtarlar\u0131 benzersiz oldu\u011fu i\u00e7in hacklemek istedi\u011finiz Xiaomi cihaz\u0131yla e\u015fle\u015fen ak\u0131ll\u0131 telefona eri\u015fiminiz olmad\u0131\u011f\u0131 s\u00fcrece bu anahtarlar\u0131 alman\u0131z olduk\u00e7a zor.<\/p>\n<p>Sonu\u00e7 olarak Xiao<a href=\"https:\/\/www.kaspersky.com.tr\/blog\/internet-of-vulnerabilities\/4503\/\" target=\"_blank\" rel=\"noopener\">mirai<\/a> yak\u0131n zamanda ger\u00e7ekle\u015fecek gibi g\u00f6r\u00fcnm\u00fcyor. Tam tersine, ara\u015ft\u0131rmalar Xiaomi\u2019nin di\u011fer ak\u0131ll\u0131 cihaz \u00fcreticilerine k\u0131yasla g\u00fcvenlik konusunda \u00e7ok daha fazla \u00e7aba harcad\u0131\u011f\u0131n\u0131 g\u00f6steriyor ve bu ba\u011fl\u0131 gelece\u011fimiz i\u00e7in iyi bir i\u015faret. Neredeyse her \u015fey hacklenebilir. Ancak bir \u015feyin hacklenmesi \u00e7ok fazla \u00e7aba gerektiriyorsa su\u00e7lular\u0131n bu zahmete girme ihtimalleri de d\u00fc\u015fer. Ne de olsa yaln\u0131zca kolay kazan\u0131lan paran\u0131n pe\u015findeler.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u0130nternet ve Nesneleri hikayesi \u015fimdiye kadar talihsiz bir hikaye gibi g\u00f6r\u00fcnse de \u00fcmitsizli\u011fe kap\u0131lmaya gerek yok. G\u00fcvenlik ara\u015ft\u0131rmac\u0131lar Dennis Giese ve Daniel Wegemer sonunda Xiaomi Mi Robot s\u00fcp\u00fcrgeyi hacklemeyi ba\u015fard\u0131 ama ara\u015ft\u0131rmalar\u0131, bu cihaz\u0131n di\u011fer ak\u0131ll\u0131 nesnelere g\u00f6re \u00e7ok daha g\u00fcvenli oldu\u011funu ortaya \u00e7\u0131kard\u0131.<\/p>\n","protected":false},"author":421,"featured_media":4592,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1287,1351],"tags":[1506,720,1507,1508,628,629,1509],"class_list":{"0":"post-4591","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-34c3","10":"tag-bagli-cihazlar","11":"tag-ccc","12":"tag-chaos-communication-congress","13":"tag-internet-of-things","14":"tag-iot","15":"tag-xiaomi"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/xiaomi-mi-robot-hacked\/4591\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/xiaomi-mi-robot-hacked\/12109\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/xiaomi-mi-robot-hacked\/10078\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/xiaomi-mi-robot-hacked\/14341\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/xiaomi-mi-robot-hacked\/12567\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/xiaomi-mi-robot-hacked\/12277\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/xiaomi-mi-robot-hacked\/15086\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/xiaomi-mi-robot-hacked\/14886\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/xiaomi-mi-robot-hacked\/19422\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/xiaomi-mi-robot-hacked\/20632\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/xiaomi-mi-robot-hacked\/8736\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/xiaomi-mi-robot-hacked\/15605\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/xiaomi-mi-robot-hacked\/9107\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/xiaomi-mi-robot-hacked\/19218\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/xiaomi-mi-robot-hacked\/23808\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/xiaomi-mi-robot-hacked\/19309\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/xiaomi-mi-robot-hacked\/19297\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/34c3\/","name":"34c3"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/4591","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/421"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=4591"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/4591\/revisions"}],"predecessor-version":[{"id":6980,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/4591\/revisions\/6980"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/4592"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=4591"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=4591"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=4591"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}