
And to put it all a bit more into perspective, um what we want to talk today about is edge devices, exploits, and initial access. So basically what you can see here is a slide from Florian R. You maybe know him. And he summarized all the common entry vectors. So on the top you can see fishing. I think you all know what fishing is. At the bottom you can see brute force like passwords, guessing, credential stuffing, all stuff like that. But we are targeting now the middle box the exploitation and to be precise we're targeting this middle box of vulnerable appliances like Ivanti Fortnet Cisco and stuff like that there are some other names we're going to talk
about them in a second but this is the focus of our talk today so how can you get as a threat actor initial access via a vulnerable appliance hands.