An attacker performs reconnaissance on a Chief Executive Officer (CEO) using publicity available resources to gain access to the CEO's office. The attacker was in the CEO's office for less than five minutes, and the attack left no traces in any logs, nor was there any readily identifiable cause for the exploit. The attacker in then able to use numerous credentials belonging to the CEO to conduct a variety of further attacks. Which of the following types of exploit is described?
Lashawnda
2 months agoRima
26 days agoDeonna
1 months agoClay
2 months agoAlease
2 months agoLenny
2 months agoAriel
2 months agoAnglea
1 months agoHayley
2 months agoMozell
2 months agoGracia
3 months agoCarin
23 days agoWava
24 days agoShanice
25 days agoBenton
26 days agoCherri
27 days agoShaquana
1 months agoDeonna
2 months agoLacey
3 months agoCorinne
3 months agoArmando
3 months agoSarah
3 months agoJarod
2 months agoDarrin
2 months agoCorinne
3 months ago