Footprinting

Your team has asked for information on what tools and sites are used to perform the footprinting phase of

an attack.

Describe at least 5 different tools or sites used during footprinting.
What information can be found by each tool or site?
How can the company protect itself from this information being readily available?

This question has been answered.

Get Answer