This is a dedicated watch page for a single video.
Jim, a black-hat, targeted a company and identified the types of websites frequently visited by its employees. Using this information, he searched for possible loopholes in these websites and injected a malicious script that can redirect users from the web page and download malware onto a victim's machine. Jim waits for the victim to access the infected web application so as to compromise the victim's machine. Which of the following techniques is used by Jim in the above scenario?