{"id":59167,"date":"2023-07-28T20:00:00","date_gmt":"2023-07-29T01:00:00","guid":{"rendered":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/?p=59167"},"modified":"2023-07-25T10:41:13","modified_gmt":"2023-07-25T15:41:13","slug":"riesgos-de-ciberseguridad-en-los-softwares-de-plc-y-hdmi","status":"publish","type":"post","link":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/riesgos-de-ciberseguridad-en-los-softwares-de-plc-y-hdmi\/","title":{"rendered":"Riesgos de Ciberseguridad en los Softwares de Recuperaci\u00f3n de Contrase\u00f1as de PLC y HMI #Uninter #ESCAT #Internet #Redes"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/www.facebook.com\/EscatUninter\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/wp-content\/uploads\/2023\/06\/image-41.png\" alt=\"\" class=\"wp-image-59162\" width=\"163\" height=\"185\"\/><\/a><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-justify\">Dragos ha investigado y analizado una serie de softwares que descifran las contrase\u00f1as de PLC y HMI y las consecuencias que puede tener a nivel de seguridad de las m\u00e1quinas e instalaciones.<\/p>\n\n\n\n<!--more-->\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/wp-content\/uploads\/2023\/06\/a59df75002d5f03b82807bcbe80925df_XL-2.jpg\" alt=\"\" class=\"wp-image-59170\" width=\"607\" height=\"370\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-justify\">Internet ofrece infinitas posibilidades para que los estafadores y ciberdelincuentes ganen dinero de forma ileg\u00edtima. Los sospechosos habituales: ransomware, compromiso de correo electr\u00f3nico comercial, fraude en Internet y <em>phishing<\/em> son bien conocidos por la comunidad de seguridad de la informaci\u00f3n.<\/p>\n\n\n\n<p class=\"has-text-align-justify\">Sin embargo, durante una evaluaci\u00f3n de vulnerabilidad de rutina, los investigadores de Dragos descubrieron una t\u00e9cnica de menor escala dirigida a ingenieros y operadores industriales.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/wp-content\/uploads\/2023\/06\/image-43.png\" alt=\"\" class=\"wp-image-59171\" width=\"627\" height=\"256\"\/><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\">Recuperaci\u00f3n de contrase\u00f1a y una infecci\u00f3n de malware Sality.<\/h2>\n\n\n\n<p class=\"has-text-align-justify\">En la ingenier\u00eda inversa, dentro del software de &#8220;descifrado&#8221; de contrase\u00f1as, se determin\u00f3 que no descifr\u00f3 la contrase\u00f1a en absoluto, sino que explot\u00f3 una vulnerabilidad en el firmware que le permiti\u00f3 recuperar la contrase\u00f1a cuando se le orden\u00f3. Adem\u00e1s, el software era un lanzador de malware, infectaba la m\u00e1quina con el malware Sality y convert\u00eda al host en un par en la red de bots peer-to-peer de Sality.<\/p>\n\n\n\n<p class=\"has-text-align-justify\">Las investigaciones anteriores dirigidas a los PLC DirectLogic dieron como resultado t\u00e9cnicas de craqueo exitosas. Sin embargo, Dragos descubri\u00f3 que este exploit no descifra una versi\u00f3n codificada de la contrase\u00f1a como se ha visto hist\u00f3ricamente en los marcos de explotaci\u00f3n populares.<\/p>\n\n\n\n<p class=\"has-text-align-justify\">La captura del tr\u00e1fico SERIE enviado por el exploit permiti\u00f3 a los investigadores de Dragos recrearlo fuera del&nbsp;malware. El malware contiene una versi\u00f3n solo en serie del exploit, lo que requiere que el usuario tenga una conexi\u00f3n en serie directa desde una estaci\u00f3n de trabajo de ingenier\u00eda (EWS) al PLC.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/wp-content\/uploads\/2023\/06\/image-44.png\" alt=\"\" class=\"wp-image-59172\" width=\"659\" height=\"280\"\/><figcaption class=\"wp-element-caption\">PLC y HMI<\/figcaption><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\">El malware Sality<\/h2>\n\n\n\n<p class=\"has-text-align-justify\">Sality emplea la inyecci\u00f3n de procesos y la infecci\u00f3n de archivos para mantener la persistencia en el host. Abusa de la funcionalidad de ejecuci\u00f3n autom\u00e1tica de Windows para distribuir copias de s\u00ed mismo a trav\u00e9s de Universal Serial Bus (USB), recursos compartidos de red y unidades de almacenamiento externas.<\/p>\n\n\n\n<p class=\"has-text-align-justify\">Esto podr\u00eda tener implicaciones regulatorias: dado que Sality bloquea cualquier conexi\u00f3n saliente, los sistemas antivirus no podr\u00e1n recibir actualizaciones que violen el est\u00e1ndar de confiabilidad CIP-007-6.&nbsp;<\/p>\n\n\n\n<h6 class=\"wp-block-heading\">Fuente :&nbsp;<a href=\"https:\/\/www.infoplc.net\/actualidad-industrial\/item\/111577-ciberseguridad-softwares-recuperacion-contrasenas-plcs-hmi\">infoPLC<\/a><\/h6>\n\n\n\n<p class=\"has-text-align-right\"><a href=\"https:\/\/universidad.uninter.edu.mx\/carreras\/IME\">Ingenier\u00eda en Mecatr\u00f3nica<\/a><\/p>\n\n\n\n<p class=\"has-text-align-right\"><a href=\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/category\/ingenieria-mecatronica\/\">M\u00e1s noticias sobre Ingenier\u00eda en Mecatr\u00f3nica<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/uninter.edu.mx\/\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"154\" src=\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/wp-content\/uploads\/2023\/03\/image-55.png\" alt=\"\" class=\"wp-image-57487\"\/><\/a><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Dragos ha investigado y analizado una serie de softwares que descifran las contrase\u00f1as de PLC y HMI y las consecuencias que puede tener a nivel de seguridad de las m\u00e1quinas e instalaciones.<\/p>\n","protected":false},"author":37,"featured_media":59169,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[20,22],"tags":[2057,2642,61,32,104,306,400,845,62,31,37],"class_list":["post-59167","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ingenieria-mecatronica","category-ingenierias","tag-malware","tag-ciberseguridad","tag-diseno","tag-escat","tag-ingenierias","tag-maquinas-2","tag-plc","tag-software","tag-tecnologia","tag-uninter","tag-universidad-internacional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\r\n<title>Riesgos de Ciberseguridad en los softwares de PLC y HMI.<\/title>\r\n<meta name=\"description\" content=\"Dragos ha investigado y analizado una serie de softwares que descifran las contrase\u00f1as de PLCs y HMI y las consecuencias que puede tener.\" \/>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/riesgos-de-ciberseguridad-en-los-softwares-de-plc-y-hdmi\/\" \/>\r\n<meta property=\"og:locale\" content=\"es_MX\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Riesgos de Ciberseguridad en los softwares de PLC y HMI.\" \/>\r\n<meta property=\"og:description\" content=\"Dragos ha investigado y analizado una serie de softwares que descifran las contrase\u00f1as de PLCs y HMI y las consecuencias que puede tener.\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/riesgos-de-ciberseguridad-en-los-softwares-de-plc-y-hdmi\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Escuela de Ciencias, Artes y Tecnolog\u00eda\" \/>\r\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EscatUninter\/\" \/>\r\n<meta property=\"article:published_time\" content=\"2023-07-29T01:00:00+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/wp-content\/uploads\/2023\/06\/a59df75002d5f03b82807bcbe80925df_XL-1.jpg\" \/>\r\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\r\n\t<meta property=\"og:image:height\" content=\"800\" \/>\r\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\r\n<meta name=\"author\" content=\"Mariana Martinez Silva\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:image\" content=\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/wp-content\/uploads\/2023\/06\/a59df75002d5f03b82807bcbe80925df_XL-1.jpg\" \/>\r\n<meta name=\"twitter:creator\" content=\"@EscatUninter\" \/>\r\n<meta name=\"twitter:site\" content=\"@EscatUninter\" \/>\r\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mariana Martinez Silva\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/riesgos-de-ciberseguridad-en-los-softwares-de-plc-y-hdmi\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/riesgos-de-ciberseguridad-en-los-softwares-de-plc-y-hdmi\/\"},\"author\":{\"name\":\"Mariana Martinez Silva\",\"@id\":\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/#\/schema\/person\/17e41a456392d6e28254b88a1f3a4555\"},\"headline\":\"Riesgos de Ciberseguridad en los Softwares de Recuperaci\u00f3n de Contrase\u00f1as de PLC y HMI #Uninter #ESCAT #Internet #Redes\",\"datePublished\":\"2023-07-29T01:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/riesgos-de-ciberseguridad-en-los-softwares-de-plc-y-hdmi\/\"},\"wordCount\":424,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/riesgos-de-ciberseguridad-en-los-softwares-de-plc-y-hdmi\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/wp-content\/uploads\/2023\/06\/a59df75002d5f03b82807bcbe80925df_XL-1.jpg\",\"keywords\":[\"#Malware\",\"ciberseguridad\",\"Dise\u00f1o\",\"ESCAT\",\"Ingenier\u00edas\",\"maquinas\",\"PLC\",\"Software\",\"Tecnolog\u00eda\",\"Uninter\",\"Universidad Internacional\"],\"articleSection\":[\"Ingenier\u00eda Mecatr\u00f3nica\",\"Ingenier\u00edas\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/riesgos-de-ciberseguridad-en-los-softwares-de-plc-y-hdmi\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/riesgos-de-ciberseguridad-en-los-softwares-de-plc-y-hdmi\/\",\"url\":\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/riesgos-de-ciberseguridad-en-los-softwares-de-plc-y-hdmi\/\",\"name\":\"Riesgos de Ciberseguridad en los softwares de PLC y HMI.\",\"isPartOf\":{\"@id\":\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/riesgos-de-ciberseguridad-en-los-softwares-de-plc-y-hdmi\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/riesgos-de-ciberseguridad-en-los-softwares-de-plc-y-hdmi\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/wp-content\/uploads\/2023\/06\/a59df75002d5f03b82807bcbe80925df_XL-1.jpg\",\"datePublished\":\"2023-07-29T01:00:00+00:00\",\"author\":{\"@id\":\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/#\/schema\/person\/17e41a456392d6e28254b88a1f3a4555\"},\"description\":\"Dragos ha investigado y analizado una serie de softwares que descifran las contrase\u00f1as de PLCs y HMI y las consecuencias que puede tener.\",\"breadcrumb\":{\"@id\":\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/riesgos-de-ciberseguridad-en-los-softwares-de-plc-y-hdmi\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/riesgos-de-ciberseguridad-en-los-softwares-de-plc-y-hdmi\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/riesgos-de-ciberseguridad-en-los-softwares-de-plc-y-hdmi\/#primaryimage\",\"url\":\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/wp-content\/uploads\/2023\/06\/a59df75002d5f03b82807bcbe80925df_XL-1.jpg\",\"contentUrl\":\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/wp-content\/uploads\/2023\/06\/a59df75002d5f03b82807bcbe80925df_XL-1.jpg\",\"width\":1200,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/riesgos-de-ciberseguridad-en-los-softwares-de-plc-y-hdmi\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Riesgos de Ciberseguridad en los Softwares de Recuperaci\u00f3n de Contrase\u00f1as de PLC y HMI #Uninter #ESCAT #Internet #Redes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/#website\",\"url\":\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/\",\"name\":\"Escuela de Ciencias, Artes y Tecnolog\u00eda UNINTER\",\"description\":\"ESCAT\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/#\/schema\/person\/17e41a456392d6e28254b88a1f3a4555\",\"name\":\"Mariana Martinez Silva\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0b220cb19d8531cc74ec72ea747109d2a4adc63cb79703bb1943dad9672936d4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0b220cb19d8531cc74ec72ea747109d2a4adc63cb79703bb1943dad9672936d4?s=96&d=mm&r=g\",\"caption\":\"Mariana Martinez Silva\"},\"url\":\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/author\/masilva\/\"}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Riesgos de Ciberseguridad en los softwares de PLC y HMI.","description":"Dragos ha investigado y analizado una serie de softwares que descifran las contrase\u00f1as de PLCs y HMI y las consecuencias que puede tener.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/riesgos-de-ciberseguridad-en-los-softwares-de-plc-y-hdmi\/","og_locale":"es_MX","og_type":"article","og_title":"Riesgos de Ciberseguridad en los softwares de PLC y HMI.","og_description":"Dragos ha investigado y analizado una serie de softwares que descifran las contrase\u00f1as de PLCs y HMI y las consecuencias que puede tener.","og_url":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/riesgos-de-ciberseguridad-en-los-softwares-de-plc-y-hdmi\/","og_site_name":"Escuela de Ciencias, Artes y Tecnolog\u00eda","article_publisher":"https:\/\/www.facebook.com\/EscatUninter\/","article_published_time":"2023-07-29T01:00:00+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/wp-content\/uploads\/2023\/06\/a59df75002d5f03b82807bcbe80925df_XL-1.jpg","type":"image\/jpeg"}],"author":"Mariana Martinez Silva","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/wp-content\/uploads\/2023\/06\/a59df75002d5f03b82807bcbe80925df_XL-1.jpg","twitter_creator":"@EscatUninter","twitter_site":"@EscatUninter","twitter_misc":{"Escrito por":"Mariana Martinez Silva","Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/riesgos-de-ciberseguridad-en-los-softwares-de-plc-y-hdmi\/#article","isPartOf":{"@id":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/riesgos-de-ciberseguridad-en-los-softwares-de-plc-y-hdmi\/"},"author":{"name":"Mariana Martinez Silva","@id":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/#\/schema\/person\/17e41a456392d6e28254b88a1f3a4555"},"headline":"Riesgos de Ciberseguridad en los Softwares de Recuperaci\u00f3n de Contrase\u00f1as de PLC y HMI #Uninter #ESCAT #Internet #Redes","datePublished":"2023-07-29T01:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/riesgos-de-ciberseguridad-en-los-softwares-de-plc-y-hdmi\/"},"wordCount":424,"commentCount":0,"image":{"@id":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/riesgos-de-ciberseguridad-en-los-softwares-de-plc-y-hdmi\/#primaryimage"},"thumbnailUrl":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/wp-content\/uploads\/2023\/06\/a59df75002d5f03b82807bcbe80925df_XL-1.jpg","keywords":["#Malware","ciberseguridad","Dise\u00f1o","ESCAT","Ingenier\u00edas","maquinas","PLC","Software","Tecnolog\u00eda","Uninter","Universidad Internacional"],"articleSection":["Ingenier\u00eda Mecatr\u00f3nica","Ingenier\u00edas"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/riesgos-de-ciberseguridad-en-los-softwares-de-plc-y-hdmi\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/riesgos-de-ciberseguridad-en-los-softwares-de-plc-y-hdmi\/","url":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/riesgos-de-ciberseguridad-en-los-softwares-de-plc-y-hdmi\/","name":"Riesgos de Ciberseguridad en los softwares de PLC y HMI.","isPartOf":{"@id":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/riesgos-de-ciberseguridad-en-los-softwares-de-plc-y-hdmi\/#primaryimage"},"image":{"@id":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/riesgos-de-ciberseguridad-en-los-softwares-de-plc-y-hdmi\/#primaryimage"},"thumbnailUrl":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/wp-content\/uploads\/2023\/06\/a59df75002d5f03b82807bcbe80925df_XL-1.jpg","datePublished":"2023-07-29T01:00:00+00:00","author":{"@id":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/#\/schema\/person\/17e41a456392d6e28254b88a1f3a4555"},"description":"Dragos ha investigado y analizado una serie de softwares que descifran las contrase\u00f1as de PLCs y HMI y las consecuencias que puede tener.","breadcrumb":{"@id":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/riesgos-de-ciberseguridad-en-los-softwares-de-plc-y-hdmi\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/riesgos-de-ciberseguridad-en-los-softwares-de-plc-y-hdmi\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/riesgos-de-ciberseguridad-en-los-softwares-de-plc-y-hdmi\/#primaryimage","url":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/wp-content\/uploads\/2023\/06\/a59df75002d5f03b82807bcbe80925df_XL-1.jpg","contentUrl":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/wp-content\/uploads\/2023\/06\/a59df75002d5f03b82807bcbe80925df_XL-1.jpg","width":1200,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/riesgos-de-ciberseguridad-en-los-softwares-de-plc-y-hdmi\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/"},{"@type":"ListItem","position":2,"name":"Riesgos de Ciberseguridad en los Softwares de Recuperaci\u00f3n de Contrase\u00f1as de PLC y HMI #Uninter #ESCAT #Internet #Redes"}]},{"@type":"WebSite","@id":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/#website","url":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/","name":"Escuela de Ciencias, Artes y Tecnolog\u00eda UNINTER","description":"ESCAT","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Person","@id":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/#\/schema\/person\/17e41a456392d6e28254b88a1f3a4555","name":"Mariana Martinez Silva","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0b220cb19d8531cc74ec72ea747109d2a4adc63cb79703bb1943dad9672936d4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0b220cb19d8531cc74ec72ea747109d2a4adc63cb79703bb1943dad9672936d4?s=96&d=mm&r=g","caption":"Mariana Martinez Silva"},"url":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/author\/masilva\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/wp-content\/uploads\/2023\/06\/a59df75002d5f03b82807bcbe80925df_XL-1.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/wp-json\/wp\/v2\/posts\/59167","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/wp-json\/wp\/v2\/users\/37"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/wp-json\/wp\/v2\/comments?post=59167"}],"version-history":[{"count":5,"href":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/wp-json\/wp\/v2\/posts\/59167\/revisions"}],"predecessor-version":[{"id":60311,"href":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/wp-json\/wp\/v2\/posts\/59167\/revisions\/60311"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/wp-json\/wp\/v2\/media\/59169"}],"wp:attachment":[{"href":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/wp-json\/wp\/v2\/media?parent=59167"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/wp-json\/wp\/v2\/categories?post=59167"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/wp-json\/wp\/v2\/tags?post=59167"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}