Reconnaissance
Active ScanningGather Victim Host InformationGather Victim Identity InformationGather Victim Network InformationGather Victim Org InformationPhishing for InformationSearch Closed SourcesSearch Open Technical DatabasesSearch Open Websites/DomainsSearch Victim-Owned Websites
Last updated