Problem
In your own words, describe Wget,NetCraft, Nmap and Zenmap tool and how it can be used in a ethical situation and how it can be used by hackers. Explain, in detail how can it be used in the reconnaissance phase of an attack? Give an example. What is the difference between active and passive recon? (What are some of the dangers with each type of recon?) Is the tool selected used for active or passive reconnaissance? Why do security professionals need to be aware of how these 4 tools are used?