This document provides an overview of footprinting and information gathering techniques used during the reconnaissance phase of an ethical hacking engagement. It defines footprinting as gathering a security profile of an organization through open source intelligence prior to an attack. The document outlines various methodologies for passively gathering initial information, locating networks and systems, identifying services and technologies in use, and collecting competitive intelligence. It provides examples of tools and resources that can be used to uncover personnel details, technical infrastructure information, business plans and strategies from competitors through open sources.