Hacking ético para la identificación de vulnerabilidades en dispositivos PLC conectados a una red local utilizando Raspberry Pi
dc.contributor.advisor | Giraldo Ramos, Frank Nixon | |
dc.contributor.author | Sánchez García, Jhon Freddy | |
dc.contributor.author | Palma Sosa, Ingrid Lorena | |
dc.contributor.orcid | Giraldo Ramos, Frank Nixon [0000-0001-8407-1831] | |
dc.date.accessioned | 2025-05-13T22:18:24Z | |
dc.date.available | 2025-05-13T22:18:24Z | |
dc.date.created | 2025-04-29 | |
dc.description | Los dispositivos de control lógico programable (PLC) desempeñan un papel crucial en la operación de infraestructuras críticas, como plantas de tratamiento de agua, sistemas de energía y procesos industriales. in embargo, su integración creciente en redes corporativas e Internet ha incrementado notablemente su exposición a ciberamenazas. Originalmente diseñados para priorizar la disponibilidad y el control de procesos, muchos PLC carecen de protecciones robustas frente a ataques cibernéticos. Esta vulnerabilidad se agrava debido a configuraciones predeterminadas inseguras y la limitada capacitación en ciberseguridad del personal técnico encargado de su mantenimiento. Como resultado, los atacantes pueden explotar brechas de seguridad para interrumpir operaciones, obtener acceso no autorizado, robar información confidencial o incluso causar daños físicos a la infraestructura. Para abordar estos riesgos, se propuso una metodología basada en hacking ético orientada a evaluar y fortalecer la seguridad de los PLC. Este enfoque incluyó la configuración de una red local segura con una Raspberry Pi, utilizada como administrador del sistema, y la ejecución de pruebas de penetración mediante herramientas especializadas en ciberseguridad, como Kali Linux. Estas pruebas se realizaron en un entorno controlado y simulado, lo que permitió identificar vulnerabilidades críticas sin comprometer sistemas reales. A partir de los resultados obtenidos, se implementaron medidas correctivas específicas, tales como el refuerzo de las configuraciones de seguridad y la eliminación de accesos no autorizados. Adicionalmente, se elaboraron recomendaciones prácticas alineadas con estándares internacionales de ciberseguridad, como la norma IEC 62443, para garantizar la protección a largo plazo de los sistemas de control industrial. En última instancia, asegurar los PLC no solo salvaguarda operaciones industriales, sino que también preserva la estabilidad y seguridad de las comunidades que dependen de estas infraestructuras críticas. | |
dc.description.abstract | Programmable logic controllers (PLCs) play a crucial role in the operation of critical infrastructure, such as water treatment plants, energy systems, and industrial processes. However, their increasing integration into corporate networks and the internet has significantly increased their exposure to cyberthreats. Originally designed to prioritize process availability and control, many PLCs lack robust protections against cyberattacks. This vulnerability is exacerbated by insecure default configurations and limited cybersecurity training for the technical personnel responsible for their maintenance. As a result, attackers can exploit security gaps to disrupt operations, gain unauthorized access, steal confidential information, or even cause physical damage to the infrastructure. To address these risks, an ethical hacking-based methodology was proposed to assess and strengthen PLC security. This approach included setting up a secure local network with a Raspberry Pi, used as the system administrator, and running penetration tests using specialized cybersecurity tools, such as Kali Linux. These tests were conducted in a controlled and simulated environment, allowing critical vulnerabilities to be identified without compromising real systems. Based on the results obtained, specific corrective measures were implemented, such as strengthening security configurations and eliminating unauthorized access. Additionally, practical recommendations aligned with international cybersecurity standards, such as IEC 62443, were developed to ensure the long-term protection of industrial control systems. Ultimately, securing PLCs not only safeguards industrial operations but also preserves the stability and security of the communities that rely on these critical infrastructures. | |
dc.format.mimetype | ||
dc.identifier.uri | http://hdl.handle.net/11349/95465 | |
dc.language.iso | spa | |
dc.publisher | Universidad Distrital Francisco José de Caldas | |
dc.relation.references | G. Austin, “Cyber Security Education; Principles and Policies; First Edition.” [Online]. Available: https://www.routledge.com/ | |
dc.relation.references | F. Bautista García, L. Mesa Guzmán, y L. F. Blanco, Estudio Anual de Ciberseguridad, TicTac, 2023. | |
dc.relation.references | "Fortinet Threat Research Finds Cybercriminals Are Exploiting New Industry Vulnerabilities 43% Faster than 1H 2023 | Fortinet.” Accessed: May 19, 2024. [Online]. Available: https://www.fortinet.com/corporate/about-us/newsroom/press- releases/2024/fortinet-threat-research-finds-cybercriminals-are-exploiting-new- industry-vulnerabilities-faster | |
dc.relation.references | Luis Vicente Vite Constante and I. Víctor Santiago Manzano Villafuerte, “HACKING ÉTICO EN DISPOSITIVOS PLC DE CONTROL INDUSTRIAL CONECTADOS A RED.” | |
dc.relation.references | Pastor Antonio and Puyosa Hector, “Desarrollo de un sistema demo de hacking ético para Autómatas Programables industriales y SCADA TRABAJO FIN DE GRADO.” | |
dc.relation.references | S. Quiroz Tascón, J. Zapata Jiménez, and H. F. Vargas Montoya, “Predicción de ciberataques en sistemas industriales SCADA a través de la implementación del filtro Kalman,” TecnoLógicas, vol. 23, no. 48, pp. 249–267, May 2020, doi: 10.22430/22565337.1586. | |
dc.relation.references | H. E. Socarrás and I. Santana, “Ciberseguridad del Sistema de Control Industrial de la Planta Cloro-Sosa ELQUIM,” RISTI - Revista Ibérica de Sistemas e Tecnologias de Informação, no. 32, pp. 83–96, Jun. 2019, doi: 10.17013/risti.32.83-96. | |
dc.relation.references | J. Andrés et al., “Revisión sobre hacking ético y su relación con la inteligencia artificial Review on Ethical Hacking and its Relationship with Artificial Intelligence.”, https://es.scribd.com/document/647208691/inteligencia-artificial | |
dc.relation.references | Book, “Cyber Security of Industrial Control Systems,” 2015, doi: 10.13140/RG.2.1.3797.4566,https://www.researchgate.net/publication/274635658_C yber_Security_of_Industrial_Control_Systems | |
dc.relation.references | Isidro Gonzalez Gallego, “Estudio de la ciberseguridad industrial pentesting y laboratorio de pruebas de concepto”, https://es.scribd.com/document/453396110/ESTUDIO-DE-LA- CIBERSEGURIDAD-INDUSTRIAL-PENTESTING-Y-LABORATORIO-DE- PRUEBAS-DE-CONCEPTO | |
dc.relation.references | M. Annor-Asante and B. Pranggono, “Development of Smart Grid Testbed with Low- Cost Hardware and Software for Cybersecurity Research and Education,” Wirel Pers Commun, vol. 101, no. 3, pp. 1357–1377, Aug. 2018, doi: 10.1007/s11277-018-5766- 6, https://link.springer.com/article/10.1007/s11277-018-5766-6 | |
dc.relation.references | E. Juan Sáenz Idoate Pedro Julián Becerril Rodrigo Pamplona, “Ciberseguridad del PLC Siemens Simatic S7-300.”, https://academica- e.unavarra.es/bitstream/handle/2454/38441/Memoria_Eduardo_S%C3%A1enz.pdf | |
dc.relation.references | Palo Alto Networks, “Reference Architecture for OT and Iot device security in industrial control systems”, https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/c ontent/pan/en_US/resources/whitepapers/ot-and-Iot-device-security-in-industrial- control-systems | |
dc.relation.references | D. Bhamare Ω, M. Zolanvari φ, A. Erbad Ұ, R. Jain φ, K. Khan Ұ, and N. Meskin, “Cybersecurity for Industrial Control Systems: A Survey.”, https://arxiv.org/ftp/arxiv/papers/2002/2002.04124.pdf | |
dc.relation.references | I. A. Adeyanju et al., “Digital industrial control systems: Vulnerabilities and security technologies,” Current Applied Science and Technology, vol. 21, no. 1. King Mongkut’s Institute of Technology Ladkrabang, pp. 188–207, Jan. 01, 2021. doi: 10.14456/cast.2021.18, https://www.thaiscience.info/Journals/Article/CSAT/10993753.pdf | |
dc.relation.references | K. Stouffer, J. Falco, and K. Scarfone, “Guide to Industrial Control Systems (ICS) Security : Supervisory Control and Data Acquisition (SCADA) Systems, Distributed Control Systems (DCS), and Other Control System Configurations such as Programmable Logic Controllers (PLC),” Gaithersburg, MD, May 2013. doi: 10.6028/NIST.SP.800-82r1, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-82.pdf | |
dc.relation.references | E. C. Blumsztein and L. Vidal, “SISTEMAS SCADA, ALGUNAS RECOMENDACIONES DESEGURIDAD-PARTE II.”, https://revista.seguridad.unam.mx/numero-19/sistemas-scada-algunas- recomendaciones-de-seguridad-parte-ii | |
dc.relation.references | D.J.Kalbfleisch, “SCADA Technologies and Vulnerabilities,”2013, https://www.cs.tufts.edu/comp/116/archive/fall2013/dkalbfleisch.pdf | |
dc.relation.references | H. Aydin and A. Sertbaş, “CYBER SECURITY IN INDUSTRIAL CONTROL SYSTEMS (ICS): A SURVEY OF ROWHAMMER VULNERABILITY,” Applied Computer Science, vol. 18, no. 2, pp. 86–100, 2022, doi: 10.35784/acs-2022-15. | |
dc.relation.references | “Hacking Ético: Guía Completa Para Hackers Éticos | Empresa De Informática.” Accessed: May 20, 2024. [Online]. Available: https://salesystems.es/hacking-etico- que-es/ | |
dc.relation.references | “Estas son las 10 herramientas de hacking ético que debes conocer.” Accessed: May 20, 2024. [Online]. Available: https://www.tokioschool.com/noticias/herramientas- hacking-etico/ | |
dc.relation.references | “Ethical hacking automatizado con Pentera: validación continua y poderosa.” Accessed: May 20, 2024. [Online]. Available: https://cibernex.cl/blog/ethical-hacking- automatizado-pentera/ | |
dc.relation.references | “Ridgebot, una nueva herramienta para el hackeo ético automatizado. | Ridge Security.” Accessed: May 20, 2024. [Online]. Available: https://ridgesecurity.ai/es/blog/ridgebot-una-nueva-herramienta-para-el-hackeo-etico- automatizado/ | |
dc.relation.references | “Kali Linux | Penetration Testing and Ethical Hacking Linux Distribution.” Accessed: May 20, 2024. [Online]. Available: https://www.kali.org/ | |
dc.relation.references | “¿Qué es un controlador lógico programable y dónde se utiliza? | Escuela de postgrado Industrial.”Accessed: May20,2024.[Online].Available: https://postgradoindustrial.com/que-es-un-controlador-logico-programable-y-donde- se-utiliza/ | |
dc.relation.references | “Teach, learn, and make with the Raspberry Pi Foundation.” Accessed: May 20, 2024. [Online]. Available: https://www.raspberrypi.org/ | |
dc.relation.references | “Local area network (LAN) | Britannica.” Accessed: May 20, 2024. [Online]. Available: https://www.britannica.com/technology/local-area-network | |
dc.relation.references | “SCADA Security: What It Is, and Why It Matters | Radiflow.” Accessed: May 20, 2024. [Online]. Available: https://www.radiflow.com/blog/scada-security-what-it-is- and-why-it-matters/ | |
dc.relation.references | Congreso de la República de Colombia, “Ley_1273_2009”. | |
dc.relation.references | Congreso de la República de Colombia, “Ley_1273_2009”. | |
dc.relation.references | “IEC 61347-1:2007+AMD1:2010+AMD2:2012 CSV | IEC Webstore | rural electrification, lighting, smart city, LVDC.” Accessed: May 20, 2024. [Online]. Available: https://webstore.iec.ch/publication/5354 | |
dc.relation.references | “IEC 61499-1:2012 | IEC Webstore.” Accessed: May 20, 2024. [Online]. Available: https://webstore.iec.ch/publication/5506 | |
dc.relation.references | “ISO/IEC 27001:2022 - Information security, cybersecurity and privacy protection — Information security management systems — Requirements.” Accessed: May 20, 2024. [Online]. Available: https://www.iso.org/standard/27001 | |
dc.relation.references | K. Stouffer et al., “Guide to Industrial Control Systems (ICS) Security,” Jun. 2015, doi: 10.6028/NIST.SP.800-82R2. | |
dc.relation.references | “ISO 9001:2015 - Quality management systems — Requirements.” Accessed: May 20, 2024. [Online]. Available: https://www.iso.org/standard/62085.html | |
dc.relation.references | INCONTEC, “NORMA ISO 9001 2015”. | |
dc.relation.references | Oracle Corporation, "Downloads," VirtualBox, 2025. [En línea]. Disponible: https://www.virtualbox.org/wiki/Downloads. [Accedido: 13-feb-2025]. | |
dc.relation.references | Offensive Security, "Get Kali Linux," Kali Linux, 2025. [En línea]. Disponible: https://www.kali.org/get-kali/#kali-platforms. [Accedido: 13-feb-2025]. | |
dc.rights.acceso | Abierto (Texto Completo) | |
dc.rights.accessrights | OpenAccess | |
dc.subject | Ciberseguridad | |
dc.subject | Dispositivos lógicos programables | |
dc.subject | Hacking ético | |
dc.subject | Redes de control | |
dc.subject | Vulnerabilidades | |
dc.subject | Riesgos cibernéticos | |
dc.subject.keyword | Cybersecurity | |
dc.subject.keyword | Programmable logic devices | |
dc.subject.keyword | Ethical hacking | |
dc.subject.keyword | Control networks | |
dc.subject.keyword | Vulnerabilities | |
dc.subject.keyword | Cyber risks | |
dc.subject.lemb | Ingeniería en Control y Automatización -- Tesis y disertaciones académicas | |
dc.title | Hacking ético para la identificación de vulnerabilidades en dispositivos PLC conectados a una red local utilizando Raspberry Pi | |
dc.title.titleenglish | Ethical hacking for the identification of vulnerabilities in PLC devices connected to a local network using Raspberry Pi | |
dc.type | bachelorThesis | |
dc.type.coar | http://purl.org/coar/resource_type/c_7a1f | |
dc.type.degree | Monografía | |
dc.type.driver | info:eu-repo/semantics/bachelorThesis |
Archivos
Bloque original
1 - 2 de 2
Cargando...
- Nombre:
- SánchezGarcíaJhonFreddy2024.pdf
- Tamaño:
- 1.67 MB
- Formato:
- Adobe Portable Document Format
- Descripción:
- Trabajo de Grado
No hay miniatura disponible
- Nombre:
- Licencia de uso y publicación.pdf
- Tamaño:
- 205.62 KB
- Formato:
- Adobe Portable Document Format
- Descripción:
- Licencia de uso y autorización
Bloque de licencias
1 - 1 de 1
No hay miniatura disponible
- Nombre:
- license.txt
- Tamaño:
- 7 KB
- Formato:
- Item-specific license agreed upon to submission
- Descripción: