CAPEC-643: Identify Shared Files/Directories on System
An adversary discovers connections between systems by exploiting the target system's standard practice of revealing them in searchable, common areas. Through the identification of shared folders/drives between systems, the adversary may further their goals of locating and collecting sensitive information/files, or map potential routes for lateral movement within the network.
Severity
Medium
Likelihood
Medium
14
/ 100
low-risk
Active Threat
12/50 · Low
Exploit Availability
2/50 · Minimal