Joel, a professional hacker, targeted a company and identified the types of websites frequently visited by its employees. Using this information, he searched for possible loopholes in these websites and injected a malicious script that can redirect users from the web page and download malware onto a victim's machine. Joel waits for the victim to access the infected web application so as to compromise the victim's machine.
Which of the following techniques is used by Joel in the above scenario?
jeremy13
Highly Voted 1 year, 7 months agoNicknp
Most Recent 6 months, 2 weeks agoAA_Ron
1 year agoeli117
1 year, 7 months ago