Contents
Social Engineering
Collect Information
This is the first stage in which the person learns as much as possible about the alleged victim. Information is collected from company websites, other publications, and sometimes through conversations with users of the target system.
Attack Plan
The attackers outline how he/she intends to carry out the attack.
Acquire Tools
This includes computer programs that an attacker would use when launching an attack.
Attack
Exploit the weaknesses of the target system.
Use The Acquired Knowledge
Information collected during social engineering tactics, such as pet names, dates of birth of the organization’s sponsors, etc., is used in attacks such as guessing passwords.