Scanning and enumeration involve *actively* probing the target and its associated assets, systems, and networks. This stage helps identify potential weaknesses that can be exploited.
These activities will generate noise, leave traces, and may be detected by a target's security defenses. Caution is advised when scanning targets to prevent triggering unexpected responses, slowing, or shutting systems down.