header bg

Scan QR code or get instant email to install app


Which of the following techniques is described in the following scenario?
Louis, a professional hacker, had encrypted all of his browsing activity and traveled anonymously to collect sensitive/hidden information about official government or federal databases. He successfully carried out an attack on the target government organization after acquiring the information without being detected.

A VPN footprinting

Related Information


Leave a Reply

Your email address will not be published. Required fields are marked *