Ethical Hacking (part 1.0/20): Footprinting and Reconnaissance with examples and tools
Note: The main purpose of this series of articles is to introduce how cyber criminals work from the inside. Being aware of their tools and methods may help you to prevent cyber attacks of your personal or business resources.
Note 2: This article is being updated regularly. The latest update is as of 29/05/2021.