In this phase, hackers use either static or dynamic testing solutions to study and understand how the network responds to simulated attacks.