Problem
Preparation and research are essential for planning and executing effective social engineering attacks. The same research methods that attackers use can also be leveraged by organizations building a defensive strategy, to understand their attack surface. This assignment will explore a few of the basic tools for recon/research. Perform a detailed discovery about information accessible about you and your home network using: Google Shodan Maltego (refer to the "Setup Guide for Maltego.")