Determine the attack according to the following scenario: Billy performs a cloud attack during the translation of the SOAP message in the TLS layer. He duplicates the body of the message and sends it to the server as a legitimate user. As a result of these actions, Billy managed to access the server resources to unauthorized access.