When initially collecting the information on a network, that reconnaissance tool or method do you believe would generate the best results include what information could you learn utilizing this tool or method and how could this information be used within an attack? Give some examples and/or details in order to support your ideas.