During a passive reconnaissance phase, a penetration tester is gathering information on a target organization. They want to determine the technology stack used by the company as well as potential vulnerabilities associated with it. Which of the following techniques would BEST aid in achieving this objective?
Performing DNS lookups to determine the company's domain name system structure.
Reviewing job listings from the company to discover the technology stack mentioned within them.
Identifying cryptographic flaws in the organization's SSL certificates to deduce the technology stack.
Analyzing website archives and cached content for historical changes to the company's web presence.