Reconnaissance

The attacker researches the target, including their hardware, software, and who has access