Answer:
The answer is "computer network exploitation"
Explanation:
It is a malware code, which is gains from a safety or application vulnerability. It also enables an attacker to gain entry of an infrastructure sufficiently and gain high rights and benefits and to move wider through the system.