A great deal of information can be gathered from publicly available sources. As penetration testers, we should take advantage of any methods to gather valuable information about our targets anonymously.