← All talks

Stop Attackers: Essential Share Enumeration Defense! #shorts

BSides Frankfurt0:20771 viewsPublished 2026-03Watch on YouTube ↗
About this talk
Attackers prioritize finding shares like 'secret' or 'helpdesk' post-exploitation. Silence these to fortify your environment. #CyberSecurity #InfoSec #Attackers #Shares #BSidesFrankfurt #BSides
Show transcript [en]

Once again, and I cannot stress this enough, any attacker post exploitation is going to try to enumerate shares in your environment. You name a share secret or help desk, IT admin, any of these, those are the first shares an attacker is going to go to.