An adversary discovers connections between systems by exploiting the target system's standard practice of revealing them in searchable, common areas. Through the identification of shared folders/drives between systems, the adversary may further their goals of locating and collecting sensitive information/files, or map potential routes for lateral movement within the network.
Description
Mitigations
1
Consequences
Relationships
Related ATT&CK Techniques
1
Resources Required
1