ethical-hacker video for in which of the following attack techniques does the attacker use a SOCKS proxy to harvest email addresses from web pages or other
In which of the following attack techniques does the attacker use a SOCKS proxy to harvest email addresses from web pages or other sources?