Footprinting: involves profiling an organizations security posture. This means attackers will go thru great lengths to to obtain valuable information about a company's weak spots. Dumpster diving social-engineering viewing social media accounts and even obtaining source code with tools such as wget and teleport pro. This is one of the three steps of the Attack Phase: Reconnaissance. || My notes have to match how my mind is organized.. colorful hard to read and structured.