Identifying Our Target

Discovering/Verifying Email Addresses

Gathering Breached Credentials (Tools)

Subdomain Enumeration

Identifying Website Technologies