Image by Soumil Kumar from Pexels

Ethical Hacking (part 1.0/20): Footprinting and Reconnaissance with examples and tools

Maciej Zalwert

--

Note: The main purpose of this series of articles is to introduce how cyber criminals work from the inside. Being aware of their tools and methods may help you to prevent cyber attacks of your personal or business resources.

Note 2: This article is being updated regularly. The latest update is as of 29/05/2021.

--

--

Maciej Zalwert

Data Scientist with 5+ years of broad-based experience in building data-intensive solutions for diverse industries