Phase 1
· Phase 1: Information gathering before the actual attack starts
This includes technical as non-technical information gathering about the target.
Try to find people of the target writing something about there network/company in the internet.
Physical and social engineering
locate network range(s)