Description: Information gathering is the initial phase of penetration testing, where information about the target is collected to identify potential vulnerabilities. This process involves gathering relevant data that may include IP addresses, domain names, network configurations, operating systems in use, running applications, and any other data that may be useful to an attacker. Information gathering can be divided into two main categories: passive and active. Passive gathering involves obtaining information without directly interacting with the target, using public sources such as social media, domain registries, and vulnerability databases. On the other hand, active gathering involves interacting with the target, such as performing network scans or using reconnaissance tools to obtain more detailed information. This phase is crucial, as effective information gathering can provide a clear view of system weaknesses and help security professionals design more effective penetration tests. Furthermore, information gathering is not only used by penetration testers but also by malicious attackers, highlighting the importance of conducting it ethically and responsibly in the context of cybersecurity.