Steve, an attacker, created a fake profile on a social media website and sent a request to Stella. Stella was enthralled by Steve's profile picture and the description given for his profile, and she initiated a conversation with him soon after accepting the request. After a few days, Steve started asking about her company details and eventually gathered all the essential information regarding her company.
What is the social engineering technique Steve employed in the above scenario?
blacksheep6r
Highly Voted 2 years, 7 months agoblacksheep6r
2 years, 7 months agoOleMadhatter
Highly Voted 3 years, 1 month agoQuidProQuoo
3 years agokali7867
Most Recent 11 months, 1 week agovictorfs
1 year agoBob_234
1 year, 2 months agoSpake
1 year, 6 months agotomorrow9151
1 year, 7 months agoDaniel8660
1 year, 7 months agoBenoit_G
1 year, 9 months agoflinux
1 year, 9 months agoFedrehopsu
1 year, 9 months agoCHANh1990mar
1 year, 11 months agoScene116
2 years agojosek19
2 years, 2 months agoAmios1
2 years, 2 months agopawel_ceh
2 years, 2 months agoUrltenm
2 years, 3 months agoUrltenm
2 years, 3 months ago