header bg


Which social engineering practice is in play in the case:
Bob decides to use social engineering during part of his pen test. He sends an unsolicited e-mail to several users on the network advising them of potential network problems and provides a phone number to call. Later that day, Bob performs a DoS on a network segment and then receives phone calls from users asking for assistance.

A Reverse social engineering

When the attacker uses marketing, sabotage, and support to gain access credentials and other information, reverse social engineering takes place.