Human-based social engineering involves manipulating people directly—through conversation, deception, or impersonation—to gain unauthorized access to information, systems, or physical locations.
Unlike technical attacks, it relies entirely on exploiting human trust, curiosity, or fear rather than exploiting software or hardware.
Human-based Social Engineering
1: Eavesdropping.
2: Vishing.
3: Shoulder surfing.
4: Piggybacking. 5: Dumpster diving
4: Piggybacking.
5: Dumpster diving.