Active information gathering is the processes of gathering information about a system or network to better understand the attack surface (opportunities for exploitation) before a penetration test. It's usually more prone to detection because it involves port scanning, service enumeration and OS fingerprinting. Enumeration should be as comprehensive as possible, for example don't forget to scan TCP, UDP and higher port ranges. Many services can reside on higher ports, including common ones like ssh.