← All talks

Hack Any System: Your Ultimate Toolkit Revealed! #shorts

BSides Frankfurt1:22118 viewsPublished 2026-03Watch on YouTube ↗
About this talk
Discovering open ports, enumerating services, and checking capabilities to compromise a system. We've containerized essential tools with wikis for Shodan, attack techniques, and vulnerabilities. Remember: don't run containers on Windows with Defender enabled! #Cybersecurity #PenetrationTesting #BugBounty #InfoSec #TechTips
Show transcript [en]

What we do is a bit find open ports, then enumerate the services, look what we can find, and then check what we can do. And just to show you a bit of the tools and capabilities what we have, for sure we will compromise the system. It's staged, of course. Um So, what we do, and that's one thing also for the attack surface discovery. So, we spoke about all those tools up front. Hey, install all those on your machine, please. Um and maybe you're in an engagement where you only get like a Citrix desktop. That's bad. So, you can also not do not really your scans. And then you have dependencies, and that's all the problem. So, we started creating just a

container. You have one environment with all the tools we describe in our wiki. So, we also have for each service started up writing a wiki where you have like how you can find it in Shodan, where how you What does the service do? What is the problem with that? Which attack techniques or known vulnerabilities and stuff exist. Because all of that is sometimes a bit confusing, and you need to read 500 articles. We have a container. You have a full-fledged environment to play with. There are all other tools in the container. One hint I noticed, don't run a container on a Windows machine with enabled Defender. Except you want to have like a tris- Christmas tree light up because

some stuff Defender doesn't like, and it seems like Defender can look into containers.