Joe a malicious hacker targeted a company and identified the types of websites frequently visited by its employees. Using this information, he searched for possible loopholes in these websites and injected malicious script that can redirect users from the page and download malware onto the victim's machine. Joe waits for the victim to access the infected web app so as to compromise the victim's machine. Which of the following techniques is used by Joe in the above scenario?