During a penetration-testing engagement, a consultant performs reconnaissance of a client to identify potential targets for a phishing campaign. Which of the following would allow the consultant to retrieve email addresses for technical and billing contacts quickly, without triggering any of the client's cybersecurity tools?
(Choose two.)
Neolot
Highly Voted 2 years, 9 months agoryanzou
Highly Voted 2 years, 10 months agoStillFiguringItOut
Most Recent 11 months, 3 weeks agoMarty35
1 year, 2 months agoHedwig74
1 year, 4 months agoyeti87
1 year, 4 months agoSleezyglizzy
1 year, 5 months agoBig_Dre
1 year, 5 months agoYokota
1 year, 5 months agoLiveLaughToasterBath
1 year, 6 months agomehewas855
1 year, 7 months agoDRVision
1 year, 8 months agoUseChatGPT
1 year, 10 months agorsjacks
1 year, 4 months agorsjacks
1 year, 4 months agosolutionz
1 year, 12 months agoMartinRB
1 year, 8 months agobieecop
2 years agonooooo
2 years agolifehacker0777
2 years, 3 months ago