Watch this video on YouTube
An attacker injects malicious code into a company's network to capture data packets and extract sensitive information. Which phase of a network-based attack does this describe?