John, a professional hacker, performs a network attack on a renowned organization and gains unauthorized access to the target network. He remains in the network without being detected for a long time and obtains sensitive information without sabotaging the organization.
Which of the following attack techniques is used by John?
eli117
Highly Voted 2 years, 4 months agoaboru
Most Recent 1 week, 2 days agoAdminmaeli
7 months, 2 weeks agoMann098
7 months, 3 weeks agoSatyam2816
8 months, 2 weeks agoinsaniunt
1 year, 8 months agojeremy13
2 years, 3 months ago