Explanation & Hints:
Place the options in the following order:
Credential Harvesting |
Act of gathering and stealing valid usernames, passwords, tokens, PINs, and any other types of credentials through infrastructure breaches |
Privilege Escalation |
Act of exploiting a bug or design flaw in a software or firmware application to gain access to resources that normally would have been protected from an application or a user |
Account Takeover |
When a threat actor gains access to a user or application account and uses it to then gain access to more accounts and information |
|