Bob decides to use social engineering during part of his pen test. He sends an unsolicited e-mail to several users on the network advising them of potential network problems and provides a phone number to call. Later that day, Bob performs a DoS on a network segment and then receives phone calls from users asking for assistance. Which social engineering practice is in play?
A
Reverse social engineering
explanation
When the attacker uses marketing, sabotage, and support to gain access credentials and other information, reverse social engineering takes place.
Comments