As a security analyst conducting penetration testing for client ABC, you've gathered email addresses for two employees from publicly available sources. Now, you're in the process of crafting a client-side backdoor to deliver it to the employees through email. In terms of the cyber kill chain, at which phase are you currently engaged?