As a penetration tester, you are tasked with gathering intelligence about a target company's technology stack without alerting them to your activities. Which of the following methods would provide insight into the technology stack without directly engaging with the target's systems or networks?
Establishing a connection to the target's network to monitor outgoing traffic
Reviewing the target company's job listings for technology skill requirements
Conducting a scan of the target's IP address space to detect running services
Performing DNS lookups to identify all the subdomains of the company