{"id":6082,"date":"2019-06-28T11:33:11","date_gmt":"2019-06-28T08:33:11","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=6082"},"modified":"2019-11-15T14:27:33","modified_gmt":"2019-11-15T11:27:33","slug":"school-hacking","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/school-hacking\/6082\/","title":{"rendered":"Dark Web&#8217;deki Okullar"},"content":{"rendered":"<p>Okul s\u0131navlar\u0131n\u0131z, pland\u0131\u011f\u0131n\u0131z gibi ge\u00e7medi mi? Bu, herkesin ba\u015f\u0131na gelebilir. S\u0131navlar\u0131 iyi gitmeyen \u00f6\u011frencilerin \u00e7o\u011fu, kendilerini toparlay\u0131p s\u0131navlara yeniden girerler veya hedeflerini de\u011fi\u015ftirirler. Ancak baz\u0131 durumlarda \u00f6\u011frenciler ba\u015far\u0131l\u0131 olmak i\u00e7in hile yapmaya y\u00f6nelebilir.<\/p>\n<p>Y\u0131llar i\u00e7inde bu e\u011filimin taleplerini kar\u015f\u0131layan bir yeralt\u0131 sekt\u00f6r\u00fc olu\u015ftu. Bu sekt\u00f6r, okul sistemini hacklemeyi anlatan tart\u0131\u015fma forumlar\u0131 ve nas\u0131l yap\u0131l\u0131r videolar\u0131ndan kara borsada sat\u0131\u015fa sunulan sahte sertifikalara ve diplomalara kadar her t\u00fcrl\u00fc hileyi i\u00e7eriyor. Biz de bu sekt\u00f6r\u00fc biraz incelemeye ve okullar ile \u00fcniversitelerin kendilerini ve \u00f6\u011frencilerini korumak i\u00e7in neler yapabileceklerini ara\u015ft\u0131rmaya karar verdik.<\/p>\n<h2>Notlara eri\u015fim sa\u011flama<\/h2>\n<p>Bir\u00e7ok okulda okul etkinlikleri, ev \u00f6devleri, de\u011ferlendirmeler, ebeveyn ve aile ileti\u015fimi ve daha bir\u00e7ok etkinlik i\u00e7in web tabanl\u0131 bilgi platformlar\u0131 kullan\u0131lmaya ba\u015fland\u0131. Bu sistemlerin baz\u0131lar\u0131 internete a\u00e7\u0131k ve en yayg\u0131n olarak kullan\u0131lanlar dahil olmak \u00fczere bir\u00e7o\u011fu ge\u00e7mi\u015fte g\u00fcvenlik a\u00e7\u0131klar\u0131yla ilgili sorunlar ya\u015fam\u0131\u015f.<\/p>\n<p>En pop\u00fcler okul bilgi platformlar\u0131ndan birisi PowerSchool adl\u0131 bir platform. PowerSchool platformunun, ge\u00e7mi\u015fte bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131 (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2007-1044\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CVE-2007-1044<\/a>) sorunu ya\u015fad\u0131\u011f\u0131 biliniyor. Bu g\u00fcvenlik a\u00e7\u0131\u011f\u0131, sald\u0131rgan\u0131n \u00f6zel olarak geli\u015ftirilen bir URL arac\u0131l\u0131\u011f\u0131yla y\u00f6netici klas\u00f6r\u00fcn\u00fcn i\u00e7eriklerini listemesine izin veriyor. Bu g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131n etkisi, Web sunucusunun ayarlar\u0131na ve y\u00f6netici klas\u00f6r\u00fcn\u00fcn i\u00e7eri\u011fine ba\u011fl\u0131.<\/p>\n<p>Ancak bu a\u00e7\u0131k gibi g\u00fcvenlik a\u00e7\u0131klar\u0131 ve g\u00fcvenlik a\u00e7\u0131klar\u0131ndan yararlanan yaz\u0131l\u0131mlar, sald\u0131rgan\u0131n do\u011frulama i\u015flemini atlatmas\u0131na veya not hacker\u2019lar\u0131n\u0131n arad\u0131\u011f\u0131 t\u00fcrde bilgilere eri\u015fim sa\u011flamak i\u00e7in kullan\u0131c\u0131 ayr\u0131cal\u0131klar\u0131n\u0131 art\u0131rmas\u0131na izin vermiyor. Bunun i\u00e7in daha kolay bir y\u00f6ntem var: hesap kimlik bilgilerini kullanmak.<\/p>\n<p>Di\u011fer bir\u00e7ok platform gibi PowerSchool\u2019un a\u011f ge\u00e7idi de yaln\u0131zca kullan\u0131c\u0131 adlar\u0131 ve parolalar ile korunuyor.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-6084\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2019\/06\/28110247\/school-hacking-screen-1.png\" alt=\"\" width=\"1460\" height=\"1460\"><\/p>\n<p>2019\u2019un <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/students-hack-school-system-to-change-grades-and-attendance\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Mart<\/a> ay\u0131nda, \u00f6\u011frencilerin notlar\u0131n\u0131 de\u011fi\u015ftirmek ve devams\u0131zl\u0131k g\u00fcnlerinin say\u0131s\u0131n\u0131 azaltmak i\u00e7in PowerSchool sistemini hackledikleri iddia edildi. \u0130nsanlar, \u00e7o\u011funlukla ayn\u0131 hesap bilgilerini birden \u00e7ok sitede kulland\u0131\u011f\u0131 i\u00e7in bu portal\u2019lar\u0131n \u00e7al\u0131nm\u0131\u015f veya yeniden kullan\u0131lan hesap bilgileriyle hacklenme ihtimali olduk\u00e7a y\u00fcksektir. Bu hesaplar farkl\u0131 y\u00f6ntemlerle \u00e7al\u0131nabilir: \u00d6\u011fretmenin klavyesine yap\u0131\u015ft\u0131rd\u0131\u011f\u0131 bilgileri kopyalamaktan tutun da okul veya \u00fcniversite a\u011f\u0131n\u0131 <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/student-hacks-high-school-changes-grades-and-sends-college-applications\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">ger\u00e7ekten hackleyip<\/a> <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/student-expelled-for-using-hardware-keylogger-to-hack-school-change-grades\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">kimlik bilgilerini toplamaya<\/a> kadar pek \u00e7ok de\u011fi\u015fik metot kullan\u0131l\u0131yor. \u00d6\u011frenciler, bunun i\u00e7in yeralt\u0131 piyasas\u0131ndan kiral\u0131k bir hacker tutmay\u0131 da tercih edebiliyor.<\/p>\n<h3>Kara borsadaki hackleme hizmetleri ve sahte diplomalar<\/h3>\n<p>12 Haziran\u2019da internet \u00fczerinden ger\u00e7ekle\u015ftirdi\u011fimiz bir ara\u015ft\u0131rma sonucunda hackleme hizmetlerine ve istedi\u011finiz kurumun istedi\u011finiz b\u00f6l\u00fcm\u00fcnden ger\u00e7ek gibi g\u00f6r\u00fcnen sahte sertifikalara, diplomalara ve derecelere rastlad\u0131k. \u00dcstelik, bunlar\u0131 sat\u0131n almak da \u00e7ok kolay. Bir sipari\u015f formunu doldurup ileti\u015fim bilgilerinizi vermeniz yeterli.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-6085\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2019\/06\/28111316\/school-hacking-screen-2.png\" alt=\"\" width=\"1447\" height=\"664\"><\/p>\n<h3>E\u011fitim sekt\u00f6r\u00fcnde g\u00fcvenli\u011fi iyile\u015ftirme<\/h3>\n<p>Peki okullar, y\u00fcksek okullar, \u00fcniversiteler ve i\u015fe al\u0131m i\u00e7in akademik dereceleri do\u011frulamak isteyen i\u015fverenler, kendilerine sunulan belgenin ger\u00e7ek oldu\u011fundan emin olmak i\u00e7in neler yapabilir?<\/p>\n<p>Sertifikalar ve diplomalar s\u00f6z konusu oldu\u011funda ba\u015fvurulan kurulu\u015flar, belgenin do\u011frulu\u011funu belgeyi d\u00fczenleyen kurumla g\u00f6r\u00fc\u015ferek teyit etmelidir. E\u011fer \u00f6\u011frencinin s\u00f6z konusu ba\u015far\u0131y\u0131 elde etti\u011fine dair herhangi bir kay\u0131t yoksa elinizdeki belge b\u00fcy\u00fck ihtimalle sahtedir.<\/p>\n<p>Web tabanl\u0131 bilgi sistemlerindeyse personelin, \u00f6\u011frencilerin ve bilgilerin g\u00fcvenli\u011fini sa\u011flamak i\u00e7in baz\u0131 temel \u00f6nlemlerin al\u0131nmas\u0131 \u00e7ok yararl\u0131 olacakt\u0131r:<\/p>\n<ul>\n<li>\u00d6\u011frenci kay\u0131tlar\u0131na, notlar\u0131na ve de\u011ferlendirmelerine eri\u015fim i\u00e7in kullan\u0131lan alanlar ba\u015fta olmak \u00fczere m\u00fcmk\u00fcn olan her yerde <a href=\"https:\/\/www.kaspersky.com\/blog\/2fa-practical-guide\/24219\/\" target=\"_blank\" rel=\"noopener nofollow\">iki fakt\u00f6rl\u00fc do\u011frulama y\u00f6ntemlerini<\/a> kullan\u0131n. G\u00fc\u00e7l\u00fc ve kullan\u0131\u015fl\u0131 eri\u015fim kontrolleri belirleyerek hacker\u2019\u0131n sisteminizde yatay \u015fekilde hareket etmesini zorla\u015ft\u0131r\u0131n.<\/li>\n<li>Kamp\u00fcste biri personele, di\u011feri \u00f6\u011frencilere y\u00f6nelik olmak \u00fczere iki ayr\u0131 ve g\u00fcvenli kablosuz a\u011f sistemi kurun. Ziyaret\u00e7iler i\u00e7in izole edilmi\u015f \u00fc\u00e7\u00fcnc\u00fc bir a\u011f kurma fikri de mant\u0131kl\u0131d\u0131r.<\/li>\n<li>Personeller i\u00e7in g\u00fc\u00e7l\u00fc bir parola politikas\u0131 olu\u015fturun ve uygulay\u0131n ve herkesi kimlik bilgilerinin gizlili\u011fini her zaman korumalar\u0131 konusunda te\u015fvik edin.<\/li>\n<li>Geni\u015f bir yelpazedeki \u00e7e\u015fitli tehditlere kar\u015f\u0131 kapsaml\u0131 koruma i\u00e7in <a href=\"https:\/\/kas.pr\/kdkesbtr\" target=\"_blank\" rel=\"noopener\">g\u00fcvenilir bir g\u00fcvenlik \u00e7\u00f6z\u00fcm\u00fc<\/a> kullan\u0131n.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-b2b\">\n","protected":false},"excerpt":{"rendered":"<p>Baz\u0131 \u00f6\u011frenciler, dark web&#8217;den ald\u0131klar\u0131 diplomalar ve hacklenmi\u015f notlarla s\u0131navlarda ba\u015far\u0131l\u0131 olmak i\u00e7in nas\u0131l hile yap\u0131yor?<\/p>\n","protected":false},"author":336,"featured_media":6083,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1351],"tags":[847,1270,1945,1947,1946,638,537],"class_list":{"0":"post-6082","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-dark-web","9":"tag-egitim","10":"tag-hackleme","11":"tag-kara-borsa","12":"tag-kimlik-bilgileri","13":"tag-okul","14":"tag-tehditler"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/school-hacking\/6082\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/school-hacking\/15986\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/school-hacking\/13492\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/school-hacking\/17879\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/school-hacking\/16018\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/school-hacking\/14812\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/school-hacking\/18736\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/school-hacking\/17521\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/school-hacking\/27302\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/school-hacking\/11900\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/school-hacking\/12037\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/school-hacking\/10888\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/school-hacking\/19524\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/school-hacking\/23453\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/school-hacking\/22802\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/school-hacking\/22747\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/egitim\/","name":"e\u011fitim"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/6082","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/336"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=6082"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/6082\/revisions"}],"predecessor-version":[{"id":6770,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/6082\/revisions\/6770"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/6083"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=6082"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=6082"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=6082"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}