### ETHICAL HACKING PRACTICAL: TUTORIAL SERIES FOR BEGINNERS ###
Ethical Hacking Step by Step.
01. Footprinting
02. Reconnaissance
03. Enumeration
04. Vulnerability Scan
05. Password Cracking
06. Privilege Escalation
07. Exploitation
08. Post Exploitation
09. Maintaining Access
10. Web Apps Hacking
Step 01: Footprinting
Footprinting (also known as reconnaissance) is the technique used for gathering information about computer systems and the entities they belong to. To get this information, a hacker might use various tools and technologies. This information is very useful to a hacker who is trying to crack a whole system.
Tools: whois, nslookup, dig, whatweb, theharvester, sublist3r, p0f
Your task: Explore the "recon-ng" tool for the Footprinting step.