CAPEC-643: Identify Shared Files/Directories on System

An adversary discovers connections between systems by exploiting the target system's standard practice of revealing them in searchable, common areas. Through the identification of shared folders/drives between systems, the adversary may further their goals of locating and collecting sensitive information/files, or map potential routes for lateral movement within the network.

Severity
Medium
Likelihood
Medium
14
/ 100
low-risk
Active Threat 12/50 · Low
Exploit Availability 2/50 · Minimal