All of the following are examples of active reconnaissance techniques, except?
a. WHOIS lookup
b. Port scanning
c. Vulnerability scans
d. Footprinting