Summary
During the course of this chapter, you learned how ethical hackers can use passive information-gathering techniques and OSINT to collect, gather, and analyze publicly available data from the internet to better understand their targets and security vulnerabilities. Additionally, you discovered how to hide your identity and anonymize your internet-based traffic as an ethical hacker using a VPN, Proxychains, and TOR.
I hope this chapter has been informative for you and is helpful in your journey in the cybersecurity industry. In the next chapter, Chapter 4, Domain and DNS Intelligence, you will gain the practical skills that are needed in the industry to efficiently perform OSINT operations on a target as an ethical hacker.