Your team has asked for information on what tools and sites are used to perform the footprinting phase of an attack.
- Describe at least 5 different tools or sites used during footprinting.
- What information can be found by each tool or site?
- How can the company protect itself from this information being available?