Image by Soumil Kumar from Pexels

Ethical Hacking (part 1.0/20): Footprinting and Reconnaissance with examples and tools

Note: The main purpose of this series of articles is to introduce how cyber criminals work from the inside. Being aware of their tools and methods may help you to prevent cyber attacks of your personal or business resources.