Intrusion and impersonation

This is a much riskier way of obtaining information where a social engineer gains access into a building of a target with the aim of collecting information while pretending to be someone else. Social engineers will impersonate employees, outside contractors, delivery people, or repair personnel. Using tactics such as those discussed in the Chapter 3Influence and Persuasion about framing, they will be able to make their way past guards and get into a building. While inside the building, the social engineer will blend in and behave like the people they are impersonating would typically do. Information may be gathered by eavesdropping, having conversations with the personnel inside, or leaving malware-loaded USB drives in conspicuous places that will be picked up and inserted into computers. Social engineers may even make their way to offices of high-ranking people by convincing secretaries or receptionists to let them in. Impersonation is dangerous as it may leave the social engineer defenseless when they are discovered.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.15.144.170