CAPEC 643 Identify Shared Files/Directories on System

Draft Detailed Medium Risk
Severity Medium

Description

An adversary discovers connections between systems by exploiting the target system's standard practice of revealing them in searchable, common areas. Through the identification of shared folders/drives between systems, the adversary may further their goals of locating and collecting sensitive information/files, or map potential routes for lateral movement within the network.

Mitigations

1

Consequences

Relationships

Related ATT&CK Techniques

1

Resources Required

1