Which technique is NOT used by hackers to gain credential access?

(Select The Best Answer)