In this chapter you will learn about
• Defining footprinting
• Describing the information-gathering methodology
• Understanding the use of whois, ARIN, and nslookup
• Describing DNS record types
• Defining and describing Google hacking
• Using Google hacking
Have you ever read The Art of War by Sun Tzu? If you haven’t, let me warn you: It’s not something you’re liable to snuggle up on the bed with and read breathlessly, wondering how it’s going to end. It is, though, a masterpiece ...