Chris, a student studying cybersecurity science, faces a challenge while trying to input information into a secured PDF job application received from a potential employer. The form fields are blocked, and rather than requesting a new document, he opts to create a script. This script attempts to extract passwords from a list of commonly used passwords, systematically trying them against the secured PDF until the correct password is found or the entire list is exhausted. What type of attack is Chris attempting?