Michael is an attacker who aims to hack Bob's system. He started collecting data without any active interaction with Bob's system. Using this technique. Michael can extract sensitive information from unencrypted data.
Identify the class of attack Michael has launched in the above scenario.
Albina
2 days agoBlair
5 days agoMike
13 days agoPaola
19 days agoArlene
21 days ago