¨Names (administrative, technical, billing contacts)
–Used for social engineering attack
¨Telephone numbers
–Used in war-dialing attacks
¨Email addresses
–Format of email addresses eg. First.last@abc.com
¨Postal address
–Used in dumpster diving
¨Name servers
–DNS servers
–