This document discusses passive reconnaissance techniques. Passive reconnaissance involves gathering open source information about a target without directly interacting with it. Tools discussed for passive reconnaissance include search engines, social media, domain registrars, network scanners used passively, and open source intelligence tools. The goal is to identify assets, vulnerabilities, network topology, and sensitive information through non-intrusive means to guide further security testing activities. Examples are provided for how tools like Google, Shodan, LinkedIn, WHOIS, Nmap, and OSINT frameworks can be leveraged in a passive reconnaissance approach.