← All talks

Exploiting Edge Devices: Initial Access via Vulnerable Appliances #shorts

BSides Frankfurt0:49361 viewsPublished 2026-02Watch on YouTube ↗
About this talk
Discover how threat actors exploit vulnerable appliances like Ivanti, Fortinet, and Cisco for initial access. Learn about common entry vectors beyond phishing and brute force. #Cybersecurity #Hacking #NetworkSecurity #InfoSec #Vulnerabilities
Show transcript [en]

And to put it all a bit more into perspective, um what we want to talk today about is edge devices, exploits, and initial access. So basically what you can see here is a slide from Florian R. You maybe know him. And he summarized all the common entry vectors. So on the top you can see fishing. I think you all know what fishing is. At the bottom you can see brute force like passwords, guessing, credential stuffing, all stuff like that. But we are targeting now the middle box the exploitation and to be precise we're targeting this middle box of vulnerable appliances like Ivanti Fortnet Cisco and stuff like that there are some other names we're going to talk

about them in a second but this is the focus of our talk today so how can you get as a threat actor initial access via a vulnerable appliance hands.