As a penetration tester, you are tasked with gathering intelligence about a target company's technology stack without alerting them to your activities. Which of the following methods would provide insight into the technology stack without directly engaging with the target's systems or networks?
Reviewing the target company's job listings for technology skill requirements
Establishing a connection to the target's network to monitor outgoing traffic
Performing DNS lookups to identify all the subdomains of the company
Conducting a scan of the target's IP address space to detect running services