John, a professional hacker, performs a network attack on a renowned organization and gains unauthorized access to the target network. He remains in the network without being detected for a long time and obtains sensitive information without sabotaging the organization.
Which of the following attack techniques is used by John?
eli117
Highly Voted 2 years, 2 months agoAdminmaeli
Most Recent 5 months agoMann098
5 months, 1 week agoSatyam2816
6 months, 1 week agoinsaniunt
1 year, 6 months agojeremy13
2 years, 1 month ago