What is the social engineering technique Steve employed in the following scenario? An attacker, Steve, constructed a fake profile on a social networking platform and issued a friend request to Stella. Stella was captivated by Steve's profile picture and description, and she began a chat with him shortly after accepting the request. After a few of days. Steve began by inquiring about her company's specifics and finally got all pertinent information on her company.