What is the attack technique employed by Jane in the following situation: Jane is an ethical hacker. She was charged of testing an organization's web server and website to identify security flaws. During this procedure, she copied the whole website and its content to a local drive in order to see the full profile of the site's directory structure, file structure, external links, images, web pages, and so on.