Footprinting and Reconnaissance You do not have access to this note. Post navigationPrevious post: Module 1: Security Threats and Attack VectorsNext post: Footprinting and Reconnaissance