Social Engineering Fundamentals, Part I: Hacker Tactics

by Sarah Granger
Sept. 24, 2017 0 comments Symantec Encryption & Authentication

One morning a few years back, a group of strangers walked into a large shipping firm and walked out with access to the firm’s entire corporate network. How did they do it? By obtaining small amounts of access, bit by bit, from a number of different employees in that firm. First, they did research about the company for two days before even attempting to set foot on the premises. For example, they learned key employees’ names by calling HR. Next, they pretended to lose their key to the front door, and a man let them in. Then they "lost" their identity badges when entering the third floor secured area, smiled, and a friendly employee opened the door for them.

https://www.symantec.com/connect/articles/social-engineering-fundamentals-part-i-hacker-tactics