Bill is attempting a series of SQL queries in order to map out the tables within the database that he is trying to exploit.Choose the attack type from the choices given below.
Which of the following is the best way an attacker can passively learn about technologies used in an organization?