Watch this video on YouTube
Which of the following techniques is used by an attacker to enumerate usernames from a target web application?