An attacker has used a malformed UDP packet to elicit a response from a system and leave
behind a root shell. To which of the following stages of the hacker process does this activity
belong?
A.
Penetration
B.
Discovery
C.
Control
D.
Attack
Explanation: