As an attack route supporting the kill chain methodology, social engineering focuses on the different aspects of an attack that take advantage of a person's trust and innate helpfulness to deceive and manipulate them into compromising a network and its resources. The following diagram depicts the different types of attack methods that attackers can engage in to harvest information:
Social engineering involves three main categories: computer-based, voice-based, and physical attacks. The following sections will provide a brief on every type, and we will explore the computer-based attacks in this chapter, especially physical attacks and email phishing, in particular using Kali Linux.