Frank
We will be using focused Google searches, common tools like nslookup and some interesting tools like Recon-NG to better understand our target and what type of vulnerabilities it may posses .