Your team has asked for information on what tools and sites are used to perform the footprinting phase of
an attack.
Describe at least 5 different tools or sites used during footprinting.
What information can be found by each tool or site?
How can the company protect itself from this information being readily available?