John, a professional hacker, performs a network attack on a renowned organization and gains unauthorized access to the target network. He remains in the network without being detected for a long time and obtains sensitive information without sabotaging the organization.
Which of the following attack techniques is used by John?
Jasper_Ng
4 days, 3 hours agon19htf4ll
2 weeks agomulekule
3 weeks, 6 days agoOsanyindoro
3 months, 2 weeks ago