Relier Pairs Social Engineering Version en ligne Social Engineering Techniques par Kathy San 1 Smishing 2 Vishing 3 Dumpster Diving 4 Phishing 5 SPIM 6 Spear Phishing 7 Shoulder Surfing 8 Eliciting information 9 Tailgating 10 Whaling 11 Spam 12 Pharming A phishing attack that targets high-ranking officials such as a CEO or other top-level executives. Attacker spying over your shoulder watching to steal personal information. Unwanted junk email sent out in bulk. An email attack targeting specific individual or group. Attacker who uses phone calls or leaving voice messages defrauding to gain sensitive information over the phone. An attack using text messages. A website attack technique that hackers use to redirect users from a legitimate site to a fake site. Spam messages sent through instant messages like WhatsApp, Skype, or other chatting platforms. Target emails. Usually spam with typo errors and requesting users to click on a malicious link. A technique that involves following someone into a secure area. A technique that is used to discreetly gather information. Usually, a casual conversation to extract information. Attackers who gain useful information searching through trash.