6.2. Passive Information Gathering
6.2.1. Whois Enumeration
6.2.2. Google Hacking
6.2.3. Netcraft
6.2.4. Open-Source Code
6.2.5. Shodan
6.2.6. Security Headers and SSL/TLS
search.censys.io