Richard, an attacker, targets an MNC. In this process, he uses a footprinting technique to gather as much information as possible. Using this technique, he gathers domain information such as the target domain name, contact details of its owner, expiry date, and creation date. With this information, he creates a map of the organization's network and misleads domain owners with social engineering to obtain internal details of its network.
What type of footprinting technique is employed by Richard?
blacksheep6r
Highly Voted 1 year, 6 months agoDaniel8660
Highly Voted 6 months, 3 weeks agoANDRESCB1988
Most Recent 1 year, 9 months agoKamal_SriLanka
1 year, 9 months ago