In this post I’ll provide actionable intelligence on some of the currently active publicly accessible IPs which are known to have been hosting publicly accessible web shells for the purpose of empowering the cybercriminals behind the campaigns to establish a direct connection with the server in question potentially resulting in a direct compromise of the server which could further assist in the
Article Link: http://feedproxy.google.com/~r/DanchoDanchevOnSecurityAndNewMedia/~3/-JeehkLe4Q8/historical-osint-compilation-of.html