Discover how social engineering can be used to gain trust and collect elicit information from targets by using emotional responses and other tactics.
Certified Ethical Hacker - CEHv10: Social Engineering
- describe how social engineers can use tactics like shoulder surfing and tailgating to gain access or information from their targets
- describe how phishing, spear phishing, whaling, and other social engineering techniques can be used to gain information from a target
- describe the use of malicious mobile apps, elicitation, BEC, Interrogation, and impersonation to gather information from a target