Answer:
The hacker tries to identify the domain names and the network blocks of the target network.
Previous Question | Next Question |
Define Open Source Footprinting? | What is Brute Force Hack? |
Previous Question | Next Question |
Define Open Source Footprinting? | What is Brute Force Hack? |