Then, targets can be manipulated by the trusted social engineer to let slip information such as passwords, email credentials, banking information, and so on. This action could be the end of the attack or the beginning of the next stage.
Social Engineering: A Means To Violate A Computer System, p. 6 available at https://www.sans.org/reading-room/whitepapers/engineering/social-engineering-means-violate-computer-system-529, by Sans Institute (2007).