Kali Linux Network Scanning Cookbook(Second Edition)
上QQ阅读APP看书,第一时间看更新

Finding e-mail addresses using theHarvester

Using publicly available information, we can also gather information on individuals belonging to our target organization. This type of passive information gathering could become very valuable for social engineering or deploying an attack.