James, a professional hacker, successfully penetrated the target's network and now wants to gather as much information as possible. To achieve this, he uses a technique that can collect and combine as much information as possible, including business tactics of the organization, financial information, and network infrastructure information.
Which of the following techniques was used by James in the above scenario?
A. HTTP user agent
B. use of web shell
C. use of powershell
D. data staging