Command methodology and TTPs
As an attack route supporting the cyber kill chain methodology, social engineering focuses on the different aspects of an attack that take advantage of a person’s trust and innate helpfulness, to deceive and manipulate them into compromising a network and its resources.
Figure 5.1 depicts the different types of attack methods that attackers can engage in to harvest information and/or gain access.
Figure 5.1: Different types of social engineering tactics
From the previous editions of this book, we have now reclassified social engineering tactics into two main categories: one that involves technology, and another that includes people-specific techniques. The following sections will provide a briefing on the two categories; later on, we will explore computer-based attacks, especially physical attacks and email phishing using Kali Linux.
Technology
As technology has evolved from traditional PCs to laptops and mobile phones,...