header bg

Scan QR code or get instant email to install app


Bob decides to use social engineering during part of his pen test. He sends an unsolicited e-mail to several users on the network advising them of potential network problems and provides a phone number to call. Later that day, Bob performs a DoS on a network segment and then receives phone calls from users asking for assistance. Which social engineering practice is in play?

A Reverse social engineering

When the attacker uses marketing, sabotage, and support to gain access credentials and other information, reverse social engineering takes place.

Related Information