← All talks

Cybersecurity: Web Shells vs. Session Hijacking Explained #shorts

BSides Frankfurt0:2263 viewsPublished 2026-02Watch on YouTube ↗
About this talk
Explore two critical cyber attack vectors: web shells for persistent command execution and session keys for hijacking existing machine access within Citrix environments. Understand the post-exploitation implications. #CyberSecurity #WebShells #SessionHijacking #PostExploitation #Citrix
Show transcript [en]

On the left side, it's always web shells. You just drop a web shell. You have the persistence and execute commands even after patching or something like that if does not remove the web shell. On the right side, we get session keys. So, we use them to overtake existing sessions. Basically, we can then use those machines which are deployed in Citrix and we are already mostly in the active directory. Now post exploitation.