Imagine you are a programmer who deliberately left an opening in a piece of code during the build phase that allows you an unknown entry into the application. Using this opening in the code, which of the following types of attack could hackers use to gain unauthorized access to the application ?