58 - Cyber Kill Chain - Weaponization
The attacker gathers information on the target, vulnerabilities, structure and entry points using active or passive techniques.