In the previous section we learned what social engineering is and the process used by a social engineer to perform a social engineering attack.
In this section we will discuss the ways in which we can perform a social engineering attack. Basically, social engineering is broken down into two types: human based and computer based.
In human-based social engineering attacks, the social engineer interacts directly with the target to get information.
An example of this type of attack would be where the attacker calls the database administrator asking to reset the password for the targets account from a remote location by gathering the user information from any remote social networking site of the ...