More time and effort is required for an external versus an internal penetration test. For the latter, we have already gained access to the internal network. Thus, the most helpful information we may gather externally is the list of staff, exposed data breaches, and a list of internal they may be using.
This is mainly passive reconnaissance (OSINT) using publicly available information (without interacting with them), including target websites and news articles, social media pages, search engines, public records, breach data, etc.
After completing the
Search Engines (Google, Shodan, Censys, VirusTotal, IntelX, PhoneBook, Security Trails)
IP/Domain Lookups:
Internet Archives (Wayback Machine)
Data Breaches (Dehashed, Have I been Pwned)