Jane, an ethical hacker, is testing a target organization’s web server and website to identify security loopholes. In this process, she copied the entire website and its content on a local drive to view the complete profile of the site’s directory structure, file structure, external links, images, web pages, and so on. This information helps Jane map the website’s directories and gain valuable information.
What is the attack technique employed by Jane in the above scenario?
eli117
Highly Voted 2 years, 1 month agoMann098
Most Recent 4 months, 3 weeks agocybershortie
10 months agoinsaniunt
1 year, 5 months agosudowhoami
1 year, 6 months agovargasamson
1 year, 7 months agoHamlemdr
1 year, 10 months agoVincent_Lu
1 year, 11 months agoHarrysphills
1 year, 11 months agojeremy13
2 years agoteenwolf18
2 years ago