Now, as we saw in the previous chapter how gathering information about the client will help us to launch attacks on victims, in this section, we are going to be using commands such as Whois, and tools such as Netcraft and Robtex to gather information from target systems.