Watch this video on YouTube
Which tool is commonly used by attackers to map out connections and real-world associations between people, organizations, websites, internet infrastructure, and documents?