← All talks

Cyber Attack Simulation: Accessing Network Shares #shorts

BSides Frankfurt0:15983 viewsPublished 2026-03Watch on YouTube ↗
About this talk
See the step-by-step process of an attacker gaining access to a network share. Understanding the attack vector is key to defense. #Cybersecurity #EthicalHacking #NetworkSecurity #InfoSec
Show transcript [en]

There we go, Mr. Computer. Well done. Copy that. [snorts] All right. So, now we have our share running. So now what we're going to do is we're going to kind of go through the steps of an attacker trying to access that ship.