Which attack method is being used when the attacker tries to compromise the system?