Web property scanning
Automated and semi-automated reconnaissance against a target's web properties — typically triggered by Certificate Transparency log monitoring within minutes of a new domain's first TLS certificate — looking for exposed credentials, configuration files, secret tokens, and backup archives before the operator has finished hardening. Includes both Nuclei-class burst scans from bulletproof-hosting clusters and slower curated curl/LLM-assisted recon passes.
Tactic entry to be written. Sections to fill in: definition + mechanism (CT-log monitoring + Nuclei templates + bulletproof-hosting reseller infrastructure), what it produces (credential scrapes monetized via wallet drains or spam infrastructure), the legitimate-scanning overlays (LeakIX, Censys, Shodan, bug-bounty programs) that provide cover and complicate detection, why fresh domains specifically are hit (no hardening window), what good ops practice looks like (no .env in webroot, no /backup.sql, no /config/ exposed, immediate hardening before first TLS issuance), and the bounty-system response David proposes in the inaugural entry.*
Where this appeared in the storm