ethical-hacker video for the attacker wants to draw a map of the target organization's network infrastructure to know about the actual environment they will
The attacker wants to draw a map of the target organization's network infrastructure to know about the actual environment they will hack. Which of the following will allow him to do this?