Information in regard to whois gathering and how attackers use the information that is displayed in whois records against unsuspecting organizational members, leaders and employees. This documentation *LIGHTLY* touches the windows side of whois information gathering. This documentation is intended more for Linux / Unix users than for Windows.
When google is combined with an ethical hack or penetration test, you may utilize the service to track back users, social media accounts, old posts, and other information. This information is not only limited to users but may also glean information on the technologies that they are utilizing and may also provide a successful reverse engineering point in order to gain access to the company. For example: If company X system administrator posted in a forum asking for information configuring a sonic wall firewall you can utilize that information and the details they posted to gather their sense of security and some of the technologies they are utilizing! And, of course the user who posted information can also be targeted!