Which of the following would most likely be used by attackers to perform credential harvesting?
Social engineering
Supply chain compromise
Third-party software
Rainbow table
Submit