Video upload date:  · Duration: PT1H46M27S  · Language: EN

Jim, a black-hat, targeted a company and eccouncil video

ethical-hacker video for jim, a black-hat, targeted a company and identified the types of websites frequently visited by its employees. Using this information,

This is a dedicated watch page for a single video.

Full Certification Question

Jim, a black-hat, targeted a company and identified the types of websites frequently visited by its employees. Using this information, he searched for possible loopholes in these websites and injected a malicious script that can redirect users from the web page and download malware onto a victim's machine. Jim waits for the victim to access the infected web application so as to compromise the victim's machine. Which of the following techniques is used by Jim in the above scenario?