Introduction to Footprinting and Reconnaissance in Ethical Hacking