Richard, an attacker, targets an MNC. In this process, he uses a footprinting technique to gather as much information as possible. Using this technique, he gathers domain information such as the target domain name, contact details of its owner, expiry date, and creation date. With this information, he creates a map of the organization's network and misleads domain owners with social engineering to obtain internal details of its network.
What type of footprinting technique is employed by Richard?
A. VoIP footprinting
B. Email footprinting
C. Whois footprinting
D. VPN footprinting
What type of footprinting technique is employed by Richard?
A. VoIP footprinting
B. Email footprinting
C. Whois footprinting
D. VPN footprinting