When initially gathering information on a network, which reconnaissance tool or method do you believe would produce the best results include what information could you learn using this tool or method and how could this information be used in an attack? Provide examples and/or details to support your ideas.