1) Research what is meant by the Etheral and one other sniffing exploits, explain how these exploits work, specify if they are active or passive, what information may be learned, and how damaging are these exploits are to a network and information.
2) Enlist some of the popular reconnaissance tools, comparing three of the reconnaissance tools describing the advantages and limitations of each of the reconnaissance tools, also specify what you would recommend using, and explain why?