Which technique obtains information about how the system works without knowing it's design details?
DDOS attack
reverse engineering
DNS spoofing
malware analysis
Submit