Information Gathering

Information gathering — also known as reconnaissance — is the very first stage of any penetration test, and arguably one of the most crucial. The aim is simple: collect as much relevant information as possible about your target, whether it’s an individual, a website, a company, or an entire system.
The specific details you collect will depend on the scope of the engagement, for example, on a website you would want to find which web technology is being used or the IP
Information Gathering
Passive
Passive information gathering means collecting data about the target without directly interacting with it. In other words, the target remains unaware of your reconnaissance activities. This typically involves exploring data that’s already publicly available online.
Typical Data Collected Passively:
IP addresses, DNS records, domain names, and WHOIS data
Email addresses and social media accounts
Technologies used, subdomains, and infrastructure hints
Active
Active information gathering involves direct interaction with the target to uncover more detailed insights. Because this method engages the target’s systems, explicit authorization is mandatory. The activity will often be detectable by the target.
Typical Data Collected Actively:
Open ports and running services
Details about internal infrastructure and network topology
Enumerated user accounts, shared resources, and other technical details
Last updated