When conducting active reconnaissance, which technique is MOST likely to uncover the type of security controls protecting a web application discreetly?
Engage in meticulously crafting network packets to interact with the server and observe any anomalies in responses.
Implement DNS zone transfers to map out the network infrastructure and isolate security devices from actual servers.
Utilize social engineering to covertly gather information on technology stacks from potential internal sources.
Employ a tool designed to parse HTTP responses for identifying protective patterns and distinct signatures.