From the course: CompTIA PenTest (PT0-002) Cert Prep

Unlock this course with a free trial

Join today to access over 23,200 courses taught by industry experts.

In-person social engineering

In-person social engineering

- The social engineering attacks that we've discussed so far all depend on technical aspects. In other words, we've looked at ways that we can send messages to and contact people using technical means, but there's another whole aspect to social engineering in which you're actually closer to the person and sometimes actually in person with the potential victim. So let's talk about some of the different types of social engineering attacks that you can carry out when you're in closer proximity. Elicitation is one type of an attack or one type of a pre-attack, in a way. And it's basically asking for information about a system or an environment or about people from authorized users. Now, you can conduct elicitation remotely using email or messages, or you could just talk to someone in person. And the things you might want to get from an authorized user may be something simple like, what is the format of your internal email addresses? Do you use firstname.lastname, or do you use last name…

Contents