多项选择题

A.footprint analysis attack
B.privilege escalation attack
C.buffer Unicode attack
D.social engineering attack
E.front door attacks
F.Trojan horse attack