Tesis Tecnologías de la Información
Permanent URI for this collectionhttp://repositorio.uta.edu.ec/handle/123456789/34849
Browse
2 results
Search Results
Item Evaluación de riesgos y vulnerabilidades aplicando técnicas de pentesting en los dispositivos smart tv del barrio Pucará en la parroquia Ambatillo.(Universidad Técnica de Ambato. Facultad de Ingeniería en Sistemas, Electrónica e Industrial. Carrera de Tecnologías de la Información, 2024-02) Matza Masabalin, Jonathan Israel; Torres Valverde, Leonardo DavidCurrently, smart devices, especially Smart TVs, have seen a significant increase in homes. These devices offer a wide range of functions that go beyond simple television viewing, including Internet access, streaming content, games and interactive applications, however, the lack of security standards and users' lack of awareness of attacks , have created an open door for possible cyber threats since these devices not only serve to display content, but are also interconnected with home networks and store personal data. The objective of this work is to carry out Pentesting tests through the OWASP methodology, using specialized tools such as Wireshark, Nmap, Nessus, Metasploit, Ettercap and ADB, thus evaluating security by performing penetration tests on smart home devices. The ultimate goal is to provide concrete recommendations and security measures to establish practices and policies that protect the integrity of users, raising awareness about the risks and providing them with tools to improve security in the digital home environment.Item Aplicación del proceso threat hunting para la detección de vulnerabilidades y contramedidas en la infraestructura de red del Cuerpo de Bomberos de Ambato.(Universidad Técnica de Ambato. Facultad de Ingeniería en Sistemas, Electrónica e Industrial. Carrera de Tecnologías de la Información, 2023-09) Avilés Vasco, Bryan Jardiel; Sánchez Zumba, Andrea PatriciaThe security of the network infrastructure of Ambato Fire Department takes on a vital role, as it houses sensitive and strategic data for the functioning of its operations. Given the constant increase in cyberattacks and the ongoing evolution of tactics employed by malicious actors, it is essential to have an effective strategy that enables the identification and mitigation of threats in real time. In this context, this work proposes the development of a comprehensive manual to implement the Threat Hunting process in the network of Ambato Fire Department. Utilizing a variety of specialized cybersecurity tools such as Wireshark, Nessus, and Advanced IP Scanner. Additionally, a manual analysis of log files was conducted, delving into the understanding of their handling and their relevance in the realm of cybersecurity. As a complement, a Python code was developed to enhance the analysis, with the purpose of identifying and addressing vulnerabilities that could jeopardize the solidity of the network infrastructure. This approach not only allowed for the detection of security weaknesses but also paved the way for the planning of various countermeasures aimed at strengthening the identified susceptible points in the network. Finally, the process was documented to ensure the traceability and replicability of the undertaken actions.