Visit MITRE ATT&CK® to choose a reconnaissance tactic and discuss a specific technique of that type of recon. For example, if you choose active scanning, you might discuss scanning IP blocks. Describe what information the technique gathers and how it can be used by hackers and pen testers. What are ways that the technique can be detected and mitigated against?