Adversaries Infrastructure-Ransomware Groups, APTs, and Red Teams
What you can learn from scanning adversaries' infra?
In this short blog, I will get straight to the point. I have been scanning the internet on a daily/weekly basis over the past few months/weeks using Shodan, Censys, Nmap, and my Python scripts, and would like to share my information/research. I will very briefly explain how the different Threat Actors work, what kind of infra and tools are used to launch attacks, and how bad they are at opsec.