This is a dedicated watch page for a single video.
As a black hat hacker, Danny was assigned to extract some sensitive information from HDA Inc. After some research John found that HDA has recently purchased new equipment from ABC Inc. John pretended as support staff at ABC Inc. and went to HDA Inc.in the pretext of servicing the equipment. John began collecting sensitive data by searching through bins, checking unattended drawers and documents and attempted brute force to login unattended computers. What type of attack did John use?