Nice Try, But..
A technique used to physically damage computer hardware is incorrect.
Explanation :
Injection attacks are vulnerabilities that allow attackers to exploit applications for unauthorized access to sensitive data.