Answer:
Scanning and enumeration.
Explanation:
In the scanning and enumeration phase of the ethical hacking methodology, a hacker would be expected to discover available targets on a network.
The scanning and enumeration phase of the ethical hacking follows the reconnaissance phase and it typically involves discovering available targets on a network for informations such as username, password, IP address etc.