6.2. Passive Information Gathering

6.2.1. Whois Enumeration

6.2.2. Google Hacking

6.2.3. Netcraft

6.2.4. Open-Source Code

6.2.5. Shodan

6.2.6. Security Headers and SSL/TLS

search.censys.io