During a penetration-testing engagement, a consultant performs reconnaissance of a client to identify potential targets for a phishing campaign. Which of the following would allow the consultant to retrieve email addresses for technical and billing contacts quickly, without triggering any of the client's cybersecurity tools?
(Choose two.)
EZ1656
Highly Voted 3 years, 3 months agoBinarySoldier
Highly Voted 3 years, 5 months agoDavar39
3 years, 4 months agoGargomel
2 years, 6 months ago[Removed]
2 years, 5 months agoCCSXorabove
Most Recent 10 months, 1 week agolifehacker0777
2 years, 1 month agoAnarckii
2 years, 4 months agoNithish_s
3 years, 7 months agoIsuzu
3 years, 7 months agoIsuzu
3 years, 8 months ago