How does an attacker use a zero-day vulnerability during the Incursion phase?
To perform a SQL injection on an internal server
To extract sensitive information from the target
To perform network discovery on the target
To deliver malicious code that breaches the target
Submit