✅ The verified answer to this question is available below. Our community-reviewed solutions help you understand the material better.
In which stage of an ethical hack would the attacker actively apply tools and techniques to gather more in-depth information on the targets?