Module 2 – Footprinting and Recon You do not have access to this note. Post navigationPrevious post: DNS Record TypesNext post: Shrink Wrap Code Attacks