Watch this video on YouTube
What is the first and most important step in the context of ethical hacking that initiates penetration testing?