-Picked an organization and executed a bit of passive reconnaissance on the target. Provided as much data on the organization that is possible from publicly available sources. -Provided an explanation of the reconnaissance techniques that consist of ping sweeping, packet sniffing, port scanning, phishing, social engineering, and provide an example for each. Also, provide recommended defense tactics for each scenario