Jane, an ethical hacker, is testing a target organization’s web server and website to identify security loopholes. In this process, she copied the entire website and its content on a local drive to view the complete profile of the site’s directory structure, file structure, external links, images, web pages, and so on. This information helps Jane map the website’s directories and gain valuable information.
What is the attack technique employed by Jane in the above scenario?
eli117
Highly Voted 1 year, 7 months agocybershortie
Most Recent 4 months, 1 week agoinsaniunt
12 months agosudowhoami
1 year, 1 month agovargasamson
1 year, 1 month agoHamlemdr
1 year, 4 months agoVincent_Lu
1 year, 5 months agoHarrysphills
1 year, 5 months agojeremy13
1 year, 6 months agoteenwolf18
1 year, 6 months ago