This document provides an overview of footprinting and reconnaissance techniques used by hackers to gather sensitive information about target organizations. It discusses various footprinting methods like using search engines, social media, websites, email headers, WHOIS lookups and more to find out details on employees, network infrastructure, systems and technologies used. The document also outlines tools that can be used for footprinting and recommends steps organizations can take to prevent information leakage and footprinting attacks like limiting employee access, filtering website content, encoding sensitive data and conducting regular security assessments.