Reconnaissance
Passive and active information gathering about the target. We map the complete attack surface: subdomains, exposed technologies, DNS records, open-source intelligence, and any data that could facilitate an entry vector. This phase establishes the real scope of the audit and reveals assets that often go unnoticed.