An attacker performs reconnaissance on a Chief Executive Officer (CEO) using publicity available resources to gain access to the CEO's office. The attacker was in the CEO's office for less than five minutes, and the attack left no traces in any logs, nor was there any readily identifiable cause for the exploit. The attacker in then able to use numerous credentials belonging to the CEO to conduct a variety of further attacks. Which of the following types of exploit is described?
Lashawnda
1 months agoDeonna
3 days agoClay
16 days agoAlease
17 days agoLenny
1 months agoAriel
1 months agoAnglea
14 days agoHayley
16 days agoMozell
19 days agoGracia
2 months agoShaquana
6 days agoDeonna
1 months agoLacey
2 months agoCorinne
2 months agoArmando
2 months agoSarah
2 months agoJarod
1 months agoDarrin
1 months agoCorinne
2 months ago