Vulnerability analysis of a Raspberry Pi in a simulated environment (#868)
Read ArticleDate of Conference
July 19-21, 2023
Published In
"Leadership in Education and Innovation in Engineering in the Framework of Global Transformations: Integration and Alliances for Integral Development"
Location of Conference
Buenos Aires
Authors
Enriquez, Genessis M.
Arreaga, Nestor X.
Abstract
IoT devices are currently part of our environment, collecting data and information that must be confidential. For this reason, you must know what vulnerabilities the devices being used have. This article demonstrates that Raspberry Pi devices do not have a defense system that detects malicious or virus-infected files. This is one of the reasons why they are vulnerable to various attacks. To verify this, three different attacks, Man in the Middle (MITM), Backdoor, and Denial of Service (DoS), were carried out on the Raspberry Pi device using a virtual machine with the Kali Linux operating system. It is shown that the Raspberry Pi with the Raspbian operating system is vulnerable to some of the test attacks. The time it takes for the attacker to execute the Man in the Middle and backdoor attacks is 1 second. In the case of the Denial of Service (DoS) attack, it takes 60 seconds to execute. It was shown that a MITM attack takes much longer to prepare, approximately 15 minutes, compared to a DoS attack, which takes 8 minutes.