When you start an IT security investigation, the first phase is the data reconnaissance and intel gathering about your target. Today, we'll take a look at the best tools to do this.
Thierry Dufour