Which of the following describes what the hacker is attempting?