This technique has been deprecated. Please see ATT&CK's Initial Access and Execution tactics for replacement techniques.