Watch this video on YouTube
Which of the following techniques enables attackers to create a map or diagram of the target organization's network infrastructure, providing insights into the actual environment they intend to exploit?