Relier Pairs Social Engineering Version en ligne Social Engineering Techniques par Kathy San 1 SPIM 2 Eliciting information 3 Shoulder Surfing 4 Tailgating 5 Phishing 6 Whaling 7 Spam 8 Dumpster Diving 9 Smishing 10 Spear Phishing 11 Pharming 12 Vishing An email attack targeting specific individual or group. Target emails. Usually spam with typo errors and requesting users to click on a malicious link. A website attack technique that hackers use to redirect users from a legitimate site to a fake site. A technique that is used to discreetly gather information. Usually, a casual conversation to extract information. Spam messages sent through instant messages like WhatsApp, Skype, or other chatting platforms. Unwanted junk email sent out in bulk. Attacker spying over your shoulder watching to steal personal information. A technique that involves following someone into a secure area. A phishing attack that targets high-ranking officials such as a CEO or other top-level executives. An attack using text messages. Attacker who uses phone calls or leaving voice messages defrauding to gain sensitive information over the phone. Attackers who gain useful information searching through trash.