Social engineering attack techniques
There are several different methods of orchestrating social engineering attacks. These techniques can be categorized into physical-based social engineering and electronic-based social engineering. We’ll look at these types in detail in the following sections.
Physical-based social engineering
In this category, all the interactions are in person where one-on-one interactions with the target take place. A social engineer deceives the target by establishing a level of confidence or level of authority as part of the deception. They may attempt to exploit habits, goodwill, or customary behaviors to exploit and collect sensitive information. To carry out their activities, they may try several techniques to deceive the victim. Let’s take a look at some of them.
Pretexting
Pretexting is when someone adopts a false identity or abuses a legitimate position. It is what occurs most frequently when data is compromised from the inside...