In which stage of the Cyber-Attack Lifecycle would the attacker inject a PDF file within an email?
Weaponization
Reconnaissance
Installation
Command and Control
Exploitation
Submit