Bob has been hired to perform a penetration test on Certkiller. He begins by looking at IP address ranges owned by the company and details of domain name registration. He then goes to News Groups and financial web sites to see if they are leaking and sensitive information or have any technical details online. Within the context of penetration testing methodology, what phase is Bob involved with