Determining your hacking targets with recon and automation