Techniques and methodologies used by adversaries to collect information about targets, infrastructure, and attack surfaces prior to exploitation.