This is the first stage in which the person learns as much as possible about the alleged victim. Information is collected from company websites, other publications, and sometimes through conversations with users of the target system.
The attackers outline how he/she intends to carry out the attack.
This includes computer programs that an attacker would use when launching an attack.
Exploit the weaknesses of the target system.
Use The Acquired Knowledge
Information collected during social engineering tactics, such as pet names, dates of birth of the organization’s sponsors, etc., is used in attacks such as guessing passwords.