How does an attacker use a zero-day vulnerability during the Incursion phase?
A. To perform a SQL injection on an internal server
B. To extract sensitive information from the target
C. To perform network discovery on the target
D. To deliver malicious code that breaches the target