A penetration tester recently performed a social-engineering attack in which the tester found an employee of the target company at a local coffee shop and over time built a relationship with the employee. On the employee's birthday, the tester gave the employee an external hard drive as a gift.
Which of the following social-engineering attacks was the tester utilizing?
bivvymumps
Highly Voted 1 year, 4 months agorodwave
1 year agovorozco
Most Recent 1 month, 2 weeks agoswiggharo
1 year, 3 months agodeeden
1 year, 3 months agocy_analyst
2 years, 3 months agoRRabbit_111
2 years, 5 months ago