Summary
In this chapter, we discussed what social engineering is and learned about social engineering tactics and techniques. We described how social engineering comes in many forms, including phishing, whaling, and impersonation. We also learned that it is not limited to email, with tailgating, dumpster diving, smishing, and vishing being other notable forms. We covered a few basic tools used for social engineering, including SET and BeEF. Lastly, we touched on the use of AI in social engineering to create deepfakes and voice cloning. As technology continues to improve in detecting and preventing social engineering, AI may be leaned on even more by attackers to gain footholds in an organization or exploit for money and quick gains. It is critical to understand the techniques and tools outlined here as awareness is the means to prevention. Use the information learned in this chapter to train and educate others and help them to not become victims either personally or in a corporate...