1. 1

This still works.

  1.  

  2. 1

    The site:linkedin.com is a common trick in pentesting. You can get the company’s email address format (firstname.lastname@, flastname@, lastnamef@, etc) by looking at the address of whoever is emailing you to arrange the test. Then given a list of employees from LinkedIn, you can make a big list of addresses for social engineering attacks.