Which of the following attacks could be the most common and most successful when network security is properly implemented and configured?