{"id":4765,"date":"2018-03-05T11:00:37","date_gmt":"2018-03-05T08:00:37","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=4765"},"modified":"2019-11-15T14:43:12","modified_gmt":"2019-11-15T11:43:12","slug":"mwc2018-insecure-iot","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/mwc2018-insecure-iot\/4765\/","title":{"rendered":"Ak\u0131ll\u0131 ev k\u0131yameti"},"content":{"rendered":"<p>Ak\u0131ll\u0131 ev geli\u015ftiricilerinin g\u00f6rmenizi istedi\u011fi hayat\u0131 bir hayal edin: \u0130\u015fteki yo\u011fun g\u00fcn\u00fcn\u00fcz sona ermi\u015f ve eve girmek \u00fczeresiniz. Kap\u0131n\u0131z y\u00fcz ve iris tan\u0131mas\u0131 ger\u00e7ekle\u015ftirdi\u011fi an otomatik olarak a\u00e7\u0131l\u0131yor. Ev \u00e7oktan \u0131s\u0131nm\u0131\u015f ve koridordaki \u0131\u015f\u0131k a\u00e7\u0131k, hafif bir m\u00fczik \u00e7al\u0131yor ve elektrikli su \u0131s\u0131t\u0131c\u0131s\u0131 tam o anda kendi kendine kapan\u0131yor. B\u00f6ylece siz eve ad\u0131m\u0131n\u0131z\u0131 atar atmaz kaynam\u0131\u015f suyunuz haz\u0131r.<\/p>\n<p>Ak\u015fam yeme\u011finizi yediniz ve koltukta dinlenirken ak\u0131ll\u0131 telefonunuzu kullanarak \u0131\u015f\u0131klar\u0131 hafif k\u0131s\u0131yorsunuz ve televizyonu a\u00e7\u0131yorsunuz. Ak\u0131ll\u0131 bir evde ya\u015famak her \u015feyi daha pratik hale getirir. B\u00fct\u00fcn o k\u00fc\u00e7\u00fck g\u00fcnl\u00fck i\u015fler ya otomatikle\u015ftirilir ya da telefonunuz taraf\u0131ndan kontrol edilir.<\/p>\n<p>Fakat ger\u00e7ekle\u015fme ihtimali en az bu senaryo kadar y\u00fcksek olan ba\u015fka bir senaryo daha var. Kap\u0131ya yakla\u015f\u0131yorsunuz ama a\u00e7\u0131lm\u0131yor. Y\u00fcz\u00fcn\u00fcz\u00fc ve irisinizi unutmu\u015f. Bunun olabilece\u011fini biliyordunuz bu y\u00fczden eski dostunuz \u00e7elik anahtar\u0131n\u0131z\u0131 yan\u0131n\u0131za alm\u0131\u015fs\u0131n\u0131z. Kap\u0131y\u0131 a\u00e7\u0131yorsunuz ve a\u015f\u0131r\u0131 derecede karanl\u0131k olan eve giriyorsunuz. Ev a\u015f\u0131r\u0131 so\u011fuk \u00e7\u00fcnk\u00fc \u0131s\u0131tma sistemi 2 saat \u00f6nceye programland\u0131\u011f\u0131 halde \u00e7al\u0131\u015fmam\u0131\u015f.<\/p>\n<p>Birka\u00e7 saniye sonra ak\u0131ll\u0131 alarm sanki eve zorla girilmi\u015f gibi y\u00fcksek sesle \u00e7almaya ba\u015fl\u0131yor. Alarm sisteminin ak\u0131ll\u0131 telefonunuzu alg\u0131lay\u0131p kendini kapatmas\u0131 gerekiyordu! En az\u0131ndan bir \u015feyler do\u011fru \u00e7al\u0131\u015f\u0131yor gibi g\u00f6z\u00fck\u00fcyor: TV \u00e7oktan a\u00e7\u0131k ama o da tavandaki ak\u0131ll\u0131 kameradan sizin g\u00f6z\u00fckt\u00fc\u011f\u00fcn\u00fcz ger\u00e7ek zamanl\u0131 yay\u0131n\u0131 g\u00f6steriyor. Ve itfaiye ara\u00e7lar\u0131n\u0131n yakla\u015fan sirenlerini duyuyorsunuz. Ne oldu b\u00f6yle? Ak\u0131ll\u0131 eviniz hacklendi.<\/p>\n<p>E\u011fer birisi evdeki b\u00fct\u00fcn cihazlar\u0131 kontrol eden ak\u0131ll\u0131 merkezi (smart hub) hacklerse bu senaryo ya\u015fanabilir. 2018 Mobile World Congress\u2019de, Kaspersky Lab\u2019den Vladimir Daschenko bunu yapman\u0131n o kadar da zor olmad\u0131\u011f\u0131n\u0131 g\u00f6sterdi.<\/p>\n<h2>Peki nedir bu ak\u0131ll\u0131 merkez?<\/h2>\n<p>Ak\u0131ll\u0131 merkez, ak\u0131ll\u0131 evinizin sinir sistemi ve beynidir. Bu merkez, genellikle k\u00fc\u00e7\u00fck bir kutudur. Baz\u0131lar\u0131nda dokunmatik ekran bulunur, baz\u0131lar\u0131nda bulunmaz. Ak\u0131ll\u0131 merkez, \u00f6zel protokoller kullanarak evdeki b\u00fct\u00fcn ak\u0131ll\u0131 cihazlar ile kar\u015f\u0131l\u0131kl\u0131 ileti\u015fim kurarak bilgi sa\u011flar veya komutlar\u0131 yerine getirir.<\/p>\n<p>E\u011fer ak\u0131ll\u0131 merkezde ekran bulunmuyorsa ak\u0131ll\u0131 cihazlar\u0131n\u0131z\u0131 programlamak i\u00e7in kullanabilece\u011finiz sisteme ait bir mobil uygulama veya web tabanl\u0131 hizmet veya ikisi birden bulunur. Evdeki b\u00fct\u00fcn aletleri senkronize etmek ve hepsini ayn\u0131 anda kontrol edebilmek i\u00e7in ak\u0131ll\u0131 merkez gerekir. Bu merkez, kullan\u0131c\u0131 i\u00e7in epey pratiktir ama ayn\u0131 zamanda bir k\u00f6t\u00fc yan\u0131 bulunur; ak\u0131ll\u0131 evi hacklemek isteyen birinin tek bir \u015feyi hacklemesi yeterlidir: Ak\u0131ll\u0131 merkez.<\/p>\n<h2>Ak\u0131ll\u0131 merkez nas\u0131l hacklenebilir?<\/h2>\n<p>Belirli bir firman\u0131n (burda ad\u0131n\u0131 vermeyece\u011fiz) \u00fcretti\u011fi ak\u0131ll\u0131 merkezlerin kodlar\u0131nda \u00f6nemli bir a\u00e7\u0131k bulunmamaktad\u0131r. Fakat sistemlerdeki mevcut birka\u00e7 mant\u0131ksal hata, uzmanlar\u0131m\u0131z\u0131n kullan\u0131c\u0131n\u0131n Wi-Fi a\u011f\u0131na bile eri\u015fim sa\u011flamadan uzaktan bir \u015fekilde hacklemesine yetti.<\/p>\n<p>Kullan\u0131c\u0131, merkezi Web portal\u0131 \u00fczerinden kontrol etmek i\u00e7in web aray\u00fcz\u00fcnden merkeze senkronizasyon komutu yollar. Yak\u0131ndan inceledi\u011fimizde, yap\u0131land\u0131rma dosyas\u0131n\u0131n bir b\u00fct\u00fcn olarak merkeze belirli bir seri numaras\u0131 ile atand\u0131\u011f\u0131n\u0131 ve merkezin daha sonra bunu indirdi\u011fini ve uygulamaya ge\u00e7irdi\u011fini g\u00f6r\u00fcr\u00fcz. Dosya HTTP (\u015fifrelenmemi\u015f) kanal\u0131 \u00fczerinden g\u00f6nderilir fakat al\u0131c\u0131y\u0131 tan\u0131mlamak i\u00e7in kullan\u0131lan tek bilgi, merkezin seri numaras\u0131d\u0131r.<\/p>\n<p>Sald\u0131rgan hackleyece\u011fi merkezin seri numaras\u0131n\u0131 \u00f6\u011frenirse merkeze \u00f6zel bir yap\u0131land\u0131rma dosyas\u0131 g\u00f6nderebilir ve bu dosya ek bir ileti\u015fim ger\u00e7ekle\u015fmeden kabul edilir. Kula\u011fa pek inand\u0131r\u0131c\u0131 gelmese de \u00e7o\u011fu kullan\u0131c\u0131 seri numaras\u0131n\u0131n ak\u0131ll\u0131 evleri i\u00e7in ana anahtar oldu\u011funun bilincinde de\u011fildir. Bu y\u00fczden ak\u0131ll\u0131 merkezleri hakk\u0131ndaki g\u00f6r\u00fc\u015flerini kayg\u0131s\u0131z bir \u015fekilde YouTube\u2019da payla\u015farak seri numaralar\u0131 da dahil hacklenmesi i\u00e7in gereken b\u00fct\u00fcn bilgileri g\u00f6stermi\u015f olur. \u0130\u015fin daha da k\u00f6t\u00fcs\u00fc seri numaralar\u0131 brute-force (kaba kuvvet) metodu ile de k\u0131r\u0131labilir.<\/p>\n<p>B\u00fct\u00fcn ak\u0131ll\u0131 merkezlerin oturum bilgileri ve parolas\u0131 kendi yap\u0131land\u0131rma dosyas\u0131 i\u00e7inde mevcuttur. Oturum bilgileri do\u011frudan \u00e7\u0131kar\u0131labilir fakat neyse ki parolan\u0131n \u015fifreli halde korunur. Fakat bu \u015fifreleme zay\u0131ft\u0131r ve ne yaz\u0131k ki herkese a\u00e7\u0131k programlar taraf\u0131ndan nispeten h\u0131zl\u0131ca k\u0131r\u0131labilir durumdad\u0131r. Buna ek olarak firman\u0131n karma\u015f\u0131k parola olu\u015fturma zorunlulu\u011funu uygulamamas\u0131ndan dolay\u0131 g\u00fcvenlik iyice zay\u0131f duruma d\u00fc\u015fer ve b\u00f6ylece hackerlar i\u00e7in i\u015fler daha da kolayla\u015f\u0131r.<\/p>\n<p>Bir hacker, oturum bilgileri ve parola ile ak\u0131ll\u0131 merkez ve ona ba\u011fl\u0131 t\u00fcm cihazlar \u00fczerinde tam kontrol sa\u011flayabilir. B\u00f6ylece ak\u0131ll\u0131 ev k\u0131yameti senaryosu, ak\u0131ll\u0131 merkez kullan\u0131c\u0131s\u0131 i\u00e7in ac\u0131mas\u0131z bir ger\u00e7ek haline d\u00f6n\u00fc\u015f\u00fcr.<\/p>\n<h2>Ak\u0131ll\u0131 ev k\u0131yametinden nas\u0131l ka\u00e7\u0131n\u0131r\u0131z?<\/h2>\n<p>Ak\u0131ll\u0131 evler d\u00fcnyam\u0131za nispeten yeni girdi. Bu y\u00fczden hen\u00fcz yeterince detayl\u0131 \u015fekilde incelenmediler ve bundan dolay\u0131 ara\u015ft\u0131rmam\u0131z\u0131n ne yaz\u0131k ki bir kez daha kan\u0131tlad\u0131\u011f\u0131 \u00fczere, savunmas\u0131z y\u00f6nleri bulunuyor. (Bir\u00e7ok ba\u015fka ak\u0131ll\u0131 cihaz\u0131n nas\u0131l hacklendi\u011fini g\u00f6sterirken bunu daha \u00f6nce de kan\u0131tlam\u0131\u015ft\u0131k.)<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"ycmoMwAKb4\"><p><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/internet-of-vulnerabilities\/4503\/\" target=\"_blank\" rel=\"noopener\">Korunmas\u0131z Nesnelerin \u0130nterneti<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"\u201cKorunmas\u0131z Nesnelerin \u0130nterneti\u201d \u2014 Daily - Turkish - Turkey - www.kaspersky.com.tr\/blog\" src=\"https:\/\/www.kaspersky.com.tr\/blog\/internet-of-vulnerabilities\/4503\/embed\/#?secret=prGrIqDTbC#?secret=ycmoMwAKb4\" data-secret=\"ycmoMwAKb4\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>Bu durumda, \u00fcreticinin yapt\u0131\u011f\u0131 birka\u00e7 mant\u0131ksal hata birle\u015fti\u011finde ak\u0131ll\u0131 ev sistemini hacklemek m\u00fcmk\u00fcn. Hatalara tekrar g\u00f6z atal\u0131m: yap\u0131land\u0131rma dosyas\u0131n\u0131n \u015fifrelenmemi\u015f HTTP ile transferi, sadece seri numaralar\u0131 yap\u0131land\u0131rma g\u00fcncellemeleri i\u00e7in kimlik do\u011frulama olarak kullanmak, kullan\u0131c\u0131 ad\u0131 ve parola bilgilerine eri\u015fimin kolay olmas\u0131.<\/p>\n<p>Ak\u0131ll\u0131 hayat\u0131n\u0131z\u0131 nas\u0131l koruyabilirsiniz? \u00d6zellikle bu ak\u0131ll\u0131 merkezi kullan\u0131yorsan\u0131z, cevap gayet basit:<\/p>\n<ul>\n<li>Ak\u0131ll\u0131 merkez seri numaran\u0131z\u0131 kimseyle payla\u015fmay\u0131n. Bu sizin ak\u0131ll\u0131 hayat\u0131n\u0131z\u0131n kilit anahtar\u0131.<\/li>\n<li>\u0130kinci el ak\u0131ll\u0131 cihaz sat\u0131n almay\u0131n. Yaz\u0131l\u0131mlar\u0131 \u00f6nceki sahipleri taraf\u0131ndan de\u011fi\u015ftirilmi\u015f olabilir, bu da sald\u0131rganlar\u0131n i\u015flerini koylayla\u015ft\u0131rabilir.<\/li>\n<\/ul>\n<p>Sald\u0131rganlar\u0131n yine de rastgele seri numaralara sald\u0131r\u0131 d\u00fczenleyerek ak\u0131ll\u0131 merkezleri hackleyebilece\u011fini unutmay\u0131n. Bu y\u00fczden maalesef seri numaran\u0131z\u0131 payla\u015fmamak %100 koruma garanti edemez. Yapman\u0131z\u0131 \u00f6nerdi\u011fimiz \u015fey ise, ak\u0131ll\u0131 merkezlerin g\u00fcvenli\u011fi artt\u0131r\u0131lana \u2013 tam anlam\u0131yla g\u00fcncellenene kadar bekleyin. Bu yaz\u0131m\u0131zda bahsetti\u011fimiz firma \u015fu an g\u00fcncelleme \u00fczerinde \u00e7al\u0131\u015f\u0131yor ve yak\u0131nda yay\u0131nlayacak. Biz de bu y\u00fczden firma ismi payla\u015fm\u0131yoruz. Daha fazla detay\u0131 <a href=\"https:\/\/securelist.com\/iot-hack-how-to-break-a-smart-homeagain\/84092\" target=\"_blank\" rel=\"noopener\">Securelist<\/a>\u2018te bulabilirsiniz.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ak\u0131ll\u0131 ev geli\u015ftiricilerinin g\u00f6rmenizi istedi\u011fi hayat\u0131 bir hayal edin: \u0130\u015fteki yo\u011fun g\u00fcn\u00fcn\u00fcz sona ermi\u015f ve eve girmek \u00fczeresiniz. Kap\u0131n\u0131z y\u00fcz ve iris tan\u0131mas\u0131 ger\u00e7ekle\u015ftirdi\u011fi an otomatik olarak a\u00e7\u0131l\u0131yor. Ev \u00e7oktan \u0131s\u0131nm\u0131\u015f ve koridordaki \u0131\u015f\u0131k a\u00e7\u0131k, hafif bir m\u00fczik \u00e7al\u0131yor ve elektrikli su \u0131s\u0131t\u0131c\u0131s\u0131 tam o anda kendi kendine kapan\u0131yor. B\u00f6ylece siz eve ad\u0131m\u0131n\u0131z\u0131 atar atmaz kaynam\u0131\u015f suyunuz haz\u0131r.<\/p>\n","protected":false},"author":675,"featured_media":4766,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1287,1352,1351],"tags":[1554,1350,1555,628,629,320,1063],"class_list":{"0":"post-4765","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-special-projects","9":"category-threats","10":"tag-klmwc","11":"tag-akilli-ev","12":"tag-akilli-merkez","13":"tag-internet-of-things","14":"tag-iot","15":"tag-mobile-world-congress","16":"tag-nesnelerin-interneti"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/mwc2018-insecure-iot\/4765\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/mwc2018-insecure-iot\/12630\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/mwc2018-insecure-iot\/10461\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/mwc2018-insecure-iot\/14761\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/mwc2018-insecure-iot\/13081\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/mwc2018-insecure-iot\/12536\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/mwc2018-insecure-iot\/15424\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/mwc2018-insecure-iot\/15118\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/mwc2018-insecure-iot\/19780\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/mwc2018-insecure-iot\/21343\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/mwc2018-insecure-iot\/10051\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/mwc2018-insecure-iot\/9008\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/mwc2018-insecure-iot\/15997\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/mwc2018-insecure-iot\/9395\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/mwc2018-insecure-iot\/19735\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/mwc2018-insecure-iot\/19685\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/mwc2018-insecure-iot\/19707\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/klmwc\/","name":"#KLMWC"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/4765","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/675"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=4765"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/4765\/revisions"}],"predecessor-version":[{"id":6960,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/4765\/revisions\/6960"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/4766"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=4765"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=4765"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=4765"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}