ethical-hacker video for which of the following techniques is used to gather information about the target without direct interaction with the target?
Which of the following techniques is used to gather information about the target without direct interaction with the target?