A penetration tester is in the initial phase of an assessment and wants to gather information about a target company without directly interacting with its systems. Which of the following approaches is most appropriate?
-
A
Running a port scan with Nmap against the company's web server.
-
B
Using a vulnerability scanner to probe for weaknesses in their external network.
-
C
Querying public WHOIS records and analyzing DNS information.
-
D
Attempting a zone transfer to enumerate all hosts in their domain.