58 - Cyber Kill Chain - Weaponization

The attacker gathers information on the target, vulnerabilities, structure and entry points using active or passive techniques.