Jane, an ethical hacker, is testing a target organization's web server and website to identify security loopholes. In this process, she copied the entire website and its content on a local drive to view the complete profile of the site's directory structure, file structure, external links, images, web pages, and so on. This information helps Jane map the website's directories and gain valuable information.
What is the attack technique employed by Jane in the above scenario?
blacksheep6r
Highly Voted 1 year, 6 months agoDaniel8660
Most Recent 6 months, 3 weeks agoSrinimakeshram_Hacker
1 year, 4 months agoNovmejst
1 year, 4 months agoANDRESCB1988
1 year, 9 months ago