Hacking ético para la identificación de vulnerabilidades en dispositivos PLC conectados a una red local utilizando Raspberry Pi

dc.contributor.advisorGiraldo Ramos, Frank Nixon
dc.contributor.authorSánchez García, Jhon Freddy
dc.contributor.authorPalma Sosa, Ingrid Lorena
dc.contributor.orcidGiraldo Ramos, Frank Nixon [0000-0001-8407-1831]
dc.date.accessioned2025-05-13T22:18:24Z
dc.date.available2025-05-13T22:18:24Z
dc.date.created2025-04-29
dc.descriptionLos dispositivos de control lógico programable (PLC) desempeñan un papel crucial en la operación de infraestructuras críticas, como plantas de tratamiento de agua, sistemas de energía y procesos industriales. in embargo, su integración creciente en redes corporativas e Internet ha incrementado notablemente su exposición a ciberamenazas. Originalmente diseñados para priorizar la disponibilidad y el control de procesos, muchos PLC carecen de protecciones robustas frente a ataques cibernéticos. Esta vulnerabilidad se agrava debido a configuraciones predeterminadas inseguras y la limitada capacitación en ciberseguridad del personal técnico encargado de su mantenimiento. Como resultado, los atacantes pueden explotar brechas de seguridad para interrumpir operaciones, obtener acceso no autorizado, robar información confidencial o incluso causar daños físicos a la infraestructura. Para abordar estos riesgos, se propuso una metodología basada en hacking ético orientada a evaluar y fortalecer la seguridad de los PLC. Este enfoque incluyó la configuración de una red local segura con una Raspberry Pi, utilizada como administrador del sistema, y la ejecución de pruebas de penetración mediante herramientas especializadas en ciberseguridad, como Kali Linux. Estas pruebas se realizaron en un entorno controlado y simulado, lo que permitió identificar vulnerabilidades críticas sin comprometer sistemas reales. A partir de los resultados obtenidos, se implementaron medidas correctivas específicas, tales como el refuerzo de las configuraciones de seguridad y la eliminación de accesos no autorizados. Adicionalmente, se elaboraron recomendaciones prácticas alineadas con estándares internacionales de ciberseguridad, como la norma IEC 62443, para garantizar la protección a largo plazo de los sistemas de control industrial. En última instancia, asegurar los PLC no solo salvaguarda operaciones industriales, sino que también preserva la estabilidad y seguridad de las comunidades que dependen de estas infraestructuras críticas.
dc.description.abstractProgrammable logic controllers (PLCs) play a crucial role in the operation of critical infrastructure, such as water treatment plants, energy systems, and industrial processes. However, their increasing integration into corporate networks and the internet has significantly increased their exposure to cyberthreats. Originally designed to prioritize process availability and control, many PLCs lack robust protections against cyberattacks. This vulnerability is exacerbated by insecure default configurations and limited cybersecurity training for the technical personnel responsible for their maintenance. As a result, attackers can exploit security gaps to disrupt operations, gain unauthorized access, steal confidential information, or even cause physical damage to the infrastructure. To address these risks, an ethical hacking-based methodology was proposed to assess and strengthen PLC security. This approach included setting up a secure local network with a Raspberry Pi, used as the system administrator, and running penetration tests using specialized cybersecurity tools, such as Kali Linux. These tests were conducted in a controlled and simulated environment, allowing critical vulnerabilities to be identified without compromising real systems. Based on the results obtained, specific corrective measures were implemented, such as strengthening security configurations and eliminating unauthorized access. Additionally, practical recommendations aligned with international cybersecurity standards, such as IEC 62443, were developed to ensure the long-term protection of industrial control systems. Ultimately, securing PLCs not only safeguards industrial operations but also preserves the stability and security of the communities that rely on these critical infrastructures.
dc.format.mimetypepdf
dc.identifier.urihttp://hdl.handle.net/11349/95465
dc.language.isospa
dc.publisherUniversidad Distrital Francisco José de Caldas
dc.relation.referencesG. Austin, “Cyber Security Education; Principles and Policies; First Edition.” [Online]. Available: https://www.routledge.com/
dc.relation.referencesF. Bautista García, L. Mesa Guzmán, y L. F. Blanco, Estudio Anual de Ciberseguridad, TicTac, 2023.
dc.relation.references"Fortinet Threat Research Finds Cybercriminals Are Exploiting New Industry Vulnerabilities 43% Faster than 1H 2023 | Fortinet.” Accessed: May 19, 2024. [Online]. Available: https://www.fortinet.com/corporate/about-us/newsroom/press- releases/2024/fortinet-threat-research-finds-cybercriminals-are-exploiting-new- industry-vulnerabilities-faster
dc.relation.referencesLuis Vicente Vite Constante and I. Víctor Santiago Manzano Villafuerte, “HACKING ÉTICO EN DISPOSITIVOS PLC DE CONTROL INDUSTRIAL CONECTADOS A RED.”
dc.relation.referencesPastor Antonio and Puyosa Hector, “Desarrollo de un sistema demo de hacking ético para Autómatas Programables industriales y SCADA TRABAJO FIN DE GRADO.”
dc.relation.referencesS. Quiroz Tascón, J. Zapata Jiménez, and H. F. Vargas Montoya, “Predicción de ciberataques en sistemas industriales SCADA a través de la implementación del filtro Kalman,” TecnoLógicas, vol. 23, no. 48, pp. 249–267, May 2020, doi: 10.22430/22565337.1586.
dc.relation.referencesH. E. Socarrás and I. Santana, “Ciberseguridad del Sistema de Control Industrial de la Planta Cloro-Sosa ELQUIM,” RISTI - Revista Ibérica de Sistemas e Tecnologias de Informação, no. 32, pp. 83–96, Jun. 2019, doi: 10.17013/risti.32.83-96.
dc.relation.referencesJ. Andrés et al., “Revisión sobre hacking ético y su relación con la inteligencia artificial Review on Ethical Hacking and its Relationship with Artificial Intelligence.”, https://es.scribd.com/document/647208691/inteligencia-artificial
dc.relation.referencesBook, “Cyber Security of Industrial Control Systems,” 2015, doi: 10.13140/RG.2.1.3797.4566,https://www.researchgate.net/publication/274635658_C yber_Security_of_Industrial_Control_Systems
dc.relation.referencesIsidro Gonzalez Gallego, “Estudio de la ciberseguridad industrial pentesting y laboratorio de pruebas de concepto”, https://es.scribd.com/document/453396110/ESTUDIO-DE-LA- CIBERSEGURIDAD-INDUSTRIAL-PENTESTING-Y-LABORATORIO-DE- PRUEBAS-DE-CONCEPTO
dc.relation.referencesM. Annor-Asante and B. Pranggono, “Development of Smart Grid Testbed with Low- Cost Hardware and Software for Cybersecurity Research and Education,” Wirel Pers Commun, vol. 101, no. 3, pp. 1357–1377, Aug. 2018, doi: 10.1007/s11277-018-5766- 6, https://link.springer.com/article/10.1007/s11277-018-5766-6
dc.relation.referencesE. Juan Sáenz Idoate Pedro Julián Becerril Rodrigo Pamplona, “Ciberseguridad del PLC Siemens Simatic S7-300.”, https://academica- e.unavarra.es/bitstream/handle/2454/38441/Memoria_Eduardo_S%C3%A1enz.pdf
dc.relation.referencesPalo Alto Networks, “Reference Architecture for OT and Iot device security in industrial control systems”, https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/c ontent/pan/en_US/resources/whitepapers/ot-and-Iot-device-security-in-industrial- control-systems
dc.relation.referencesD. Bhamare Ω, M. Zolanvari φ, A. Erbad Ұ, R. Jain φ, K. Khan Ұ, and N. Meskin, “Cybersecurity for Industrial Control Systems: A Survey.”, https://arxiv.org/ftp/arxiv/papers/2002/2002.04124.pdf
dc.relation.referencesI. A. Adeyanju et al., “Digital industrial control systems: Vulnerabilities and security technologies,” Current Applied Science and Technology, vol. 21, no. 1. King Mongkut’s Institute of Technology Ladkrabang, pp. 188–207, Jan. 01, 2021. doi: 10.14456/cast.2021.18, https://www.thaiscience.info/Journals/Article/CSAT/10993753.pdf
dc.relation.referencesK. Stouffer, J. Falco, and K. Scarfone, “Guide to Industrial Control Systems (ICS) Security : Supervisory Control and Data Acquisition (SCADA) Systems, Distributed Control Systems (DCS), and Other Control System Configurations such as Programmable Logic Controllers (PLC),” Gaithersburg, MD, May 2013. doi: 10.6028/NIST.SP.800-82r1, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-82.pdf
dc.relation.referencesE. C. Blumsztein and L. Vidal, “SISTEMAS SCADA, ALGUNAS RECOMENDACIONES DESEGURIDAD-PARTE II.”, https://revista.seguridad.unam.mx/numero-19/sistemas-scada-algunas- recomendaciones-de-seguridad-parte-ii
dc.relation.referencesD.J.Kalbfleisch, “SCADA Technologies and Vulnerabilities,”2013, https://www.cs.tufts.edu/comp/116/archive/fall2013/dkalbfleisch.pdf
dc.relation.referencesH. Aydin and A. Sertbaş, “CYBER SECURITY IN INDUSTRIAL CONTROL SYSTEMS (ICS): A SURVEY OF ROWHAMMER VULNERABILITY,” Applied Computer Science, vol. 18, no. 2, pp. 86–100, 2022, doi: 10.35784/acs-2022-15.
dc.relation.references“Hacking Ético: Guía Completa Para Hackers Éticos | Empresa De Informática.” Accessed: May 20, 2024. [Online]. Available: https://salesystems.es/hacking-etico- que-es/
dc.relation.references“Estas son las 10 herramientas de hacking ético que debes conocer.” Accessed: May 20, 2024. [Online]. Available: https://www.tokioschool.com/noticias/herramientas- hacking-etico/
dc.relation.references“Ethical hacking automatizado con Pentera: validación continua y poderosa.” Accessed: May 20, 2024. [Online]. Available: https://cibernex.cl/blog/ethical-hacking- automatizado-pentera/
dc.relation.references“Ridgebot, una nueva herramienta para el hackeo ético automatizado. | Ridge Security.” Accessed: May 20, 2024. [Online]. Available: https://ridgesecurity.ai/es/blog/ridgebot-una-nueva-herramienta-para-el-hackeo-etico- automatizado/
dc.relation.references“Kali Linux | Penetration Testing and Ethical Hacking Linux Distribution.” Accessed: May 20, 2024. [Online]. Available: https://www.kali.org/
dc.relation.references“¿Qué es un controlador lógico programable y dónde se utiliza? | Escuela de postgrado Industrial.”Accessed: May20,2024.[Online].Available: https://postgradoindustrial.com/que-es-un-controlador-logico-programable-y-donde- se-utiliza/
dc.relation.references“Teach, learn, and make with the Raspberry Pi Foundation.” Accessed: May 20, 2024. [Online]. Available: https://www.raspberrypi.org/
dc.relation.references“Local area network (LAN) | Britannica.” Accessed: May 20, 2024. [Online]. Available: https://www.britannica.com/technology/local-area-network
dc.relation.references“SCADA Security: What It Is, and Why It Matters | Radiflow.” Accessed: May 20, 2024. [Online]. Available: https://www.radiflow.com/blog/scada-security-what-it-is- and-why-it-matters/
dc.relation.referencesCongreso de la República de Colombia, “Ley_1273_2009”.
dc.relation.referencesCongreso de la República de Colombia, “Ley_1273_2009”.
dc.relation.references“IEC 61347-1:2007+AMD1:2010+AMD2:2012 CSV | IEC Webstore | rural electrification, lighting, smart city, LVDC.” Accessed: May 20, 2024. [Online]. Available: https://webstore.iec.ch/publication/5354
dc.relation.references“IEC 61499-1:2012 | IEC Webstore.” Accessed: May 20, 2024. [Online]. Available: https://webstore.iec.ch/publication/5506
dc.relation.references“ISO/IEC 27001:2022 - Information security, cybersecurity and privacy protection — Information security management systems — Requirements.” Accessed: May 20, 2024. [Online]. Available: https://www.iso.org/standard/27001
dc.relation.referencesK. Stouffer et al., “Guide to Industrial Control Systems (ICS) Security,” Jun. 2015, doi: 10.6028/NIST.SP.800-82R2.
dc.relation.references“ISO 9001:2015 - Quality management systems — Requirements.” Accessed: May 20, 2024. [Online]. Available: https://www.iso.org/standard/62085.html
dc.relation.referencesINCONTEC, “NORMA ISO 9001 2015”.
dc.relation.referencesOracle Corporation, "Downloads," VirtualBox, 2025. [En línea]. Disponible: https://www.virtualbox.org/wiki/Downloads. [Accedido: 13-feb-2025].
dc.relation.referencesOffensive Security, "Get Kali Linux," Kali Linux, 2025. [En línea]. Disponible: https://www.kali.org/get-kali/#kali-platforms. [Accedido: 13-feb-2025].
dc.rights.accesoAbierto (Texto Completo)
dc.rights.accessrightsOpenAccess
dc.subjectCiberseguridad
dc.subjectDispositivos lógicos programables
dc.subjectHacking ético
dc.subjectRedes de control
dc.subjectVulnerabilidades
dc.subjectRiesgos cibernéticos
dc.subject.keywordCybersecurity
dc.subject.keywordProgrammable logic devices
dc.subject.keywordEthical hacking
dc.subject.keywordControl networks
dc.subject.keywordVulnerabilities
dc.subject.keywordCyber risks
dc.subject.lembIngeniería en Control y Automatización -- Tesis y disertaciones académicas
dc.titleHacking ético para la identificación de vulnerabilidades en dispositivos PLC conectados a una red local utilizando Raspberry Pi
dc.title.titleenglishEthical hacking for the identification of vulnerabilities in PLC devices connected to a local network using Raspberry Pi
dc.typebachelorThesis
dc.type.coarhttp://purl.org/coar/resource_type/c_7a1f
dc.type.degreeMonografía
dc.type.driverinfo:eu-repo/semantics/bachelorThesis

Archivos

Bloque original

Mostrando 1 - 2 de 2
Cargando...
Miniatura
Nombre:
SánchezGarcíaJhonFreddy2024.pdf
Tamaño:
1.67 MB
Formato:
Adobe Portable Document Format
Descripción:
Trabajo de Grado
No hay miniatura disponible
Nombre:
Licencia de uso y publicación.pdf
Tamaño:
205.62 KB
Formato:
Adobe Portable Document Format
Descripción:
Licencia de uso y autorización

Bloque de licencias

Mostrando 1 - 1 de 1
No hay miniatura disponible
Nombre:
license.txt
Tamaño:
7 KB
Formato:
Item-specific license agreed upon to submission
Descripción: