During a penetration-testing engagement, a consultant performs reconnaissance of a client to identify potential targets for a phishing campaign. Which of the following would allow the consultant to retrieve email addresses for technical and billing contacts quickly, without triggering any of the client's cybersecurity tools?
(Choose two.)
Neolot
Highly Voted 2 years, 7 months agoryanzou
Highly Voted 2 years, 7 months agoStillFiguringItOut
Most Recent 8 months, 3 weeks agoMarty35
11 months, 2 weeks agoHedwig74
1 year, 1 month agoyeti87
1 year, 2 months agoSleezyglizzy
1 year, 2 months agoBig_Dre
1 year, 2 months agoYokota
1 year, 3 months agoLiveLaughToasterBath
1 year, 3 months agomehewas855
1 year, 5 months agoDRVision
1 year, 5 months agoUseChatGPT
1 year, 7 months agorsjacks
1 year, 1 month agorsjacks
1 year, 1 month agosolutionz
1 year, 9 months agoMartinRB
1 year, 5 months agobieecop
1 year, 9 months agonooooo
1 year, 10 months agolifehacker0777
2 years, 1 month ago