{"id":1027,"date":"2020-04-06T07:23:14","date_gmt":"2020-04-06T07:23:14","guid":{"rendered":"https:\/\/rndpedia.com\/blog\/?p=421"},"modified":"2024-06-19T09:58:42","modified_gmt":"2024-06-19T09:58:42","slug":"what-is-social-engineering-phase","status":"publish","type":"post","link":"https:\/\/www.nesark.com\/blog\/what-is-social-engineering-phase\/","title":{"rendered":"What is Social Engineering | Phase ?"},"content":{"rendered":"\n<p>Social engineering comes from two words, social and engineering, where social refers to our day-to-day lives\u2014which includes both personal and professional lives\u2014while engineering means a defined way of performing a task by following certain steps to achieving the target.<\/p>\n\n\n\n<p><strong>Phases in a social engineering attack<\/strong> <\/p>\n\n\n\n<p>A social engineering attack is a continuous process that starts with initial research, which is the starting phase, until its completion, when the social engineer ends the conversation. The conversation is a brief coverage of the four phases that the social engineer follows to perform an attack.<\/p>\n\n\n\n<p><strong>Research<\/strong>:- <\/p>\n\n\n\n<p>In the research phase, the attacker tries to gather information about the target company. The information about the target can be collected from various resources and means, such as dumpster diving, the company&#8217;s website, public documents, physical interactions, and so on. Research is necessary when targeting a single user.<\/p>\n\n\n\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-1910841001912053\"\n     crossorigin=\"anonymous\"><\/script>\n<!-- horizintal -->\n<ins class=\"adsbygoogle\"\n     style=\"display:block\"\n     data-ad-client=\"ca-pub-1910841001912053\"\n     data-ad-slot=\"8832200140\"\n     data-ad-format=\"auto\"\n     data-full-width-responsive=\"true\"><\/ins>\n<script>\n     (adsbygoogle = window.adsbygoogle || []).push({});\n<\/script>\n\n\n\n<p><strong>Hook:-<\/strong>  <\/p>\n\n\n\n<p>In this phase the attacker makes the initial move by trying to start a conversation with the selected target after the completion of the research phase.<\/p>\n\n\n\n<p><strong>Play<\/strong>:- <\/p>\n\n\n\n<p>The main purpose of this step is to make the relationship stronger and continue the dialog to exploit the relationship and get the desired information for which the communication was initiated.<\/p>\n\n\n\n<p><strong>Exit:-<\/strong> <\/p>\n\n\n\n<p>This is the last phase of the social engineering attack, in which the social engineer walks out of the attack scene or stops the communication with the target without creating a scene or doing anything that will make the target suspicious.<\/p>\n\n\n\n<p>Next tutorials, I will discuss about &#8220;<a href=\"https:\/\/rndpedia.com\/blog\/2020\/04\/07\/what-is-human-based-social-engineering\/\">Human-based social engineering<\/a>&#8220;<\/p>\n\n\n\n<p>Thanks&#8230;<\/p>\n\n\n\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-1910841001912053\"\n     crossorigin=\"anonymous\"><\/script>\n<ins class=\"adsbygoogle\"\n     style=\"display:block\"\n     data-ad-format=\"autorelaxed\"\n     data-ad-client=\"ca-pub-1910841001912053\"\n     data-ad-slot=\"6076785113\"><\/ins>\n<script>\n     (adsbygoogle = window.adsbygoogle || []).push({});\n<\/script>\n","protected":false},"excerpt":{"rendered":"<p>Social engineering comes from two words, social and engineering, where social refers to our day-to-day lives\u2014which includes both personal and professional lives\u2014while engineering means a defined way of performing a task by following certain steps to achieving the target. Phases in a social engineering attack A social engineering attack is a continuous process that starts [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":424,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[24],"tags":[68,70,221,236,255],"class_list":["post-1027","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ethical-hacking","tag-cybercriminals","tag-data","tag-social-engg","tag-techniques","tag-users"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is Social Engineering | Phase ? - Nesark | Tutorials<\/title>\n<meta name=\"description\" content=\"Social engineering is a form of techniques employed by cybercriminals designed to lure unsuspecting users into sending them their confidential data....\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.nesark.com\/blog\/what-is-social-engineering-phase\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Social Engineering | Phase ? - Nesark | Tutorials\" \/>\n<meta property=\"og:description\" content=\"Social engineering is a form of techniques employed by cybercriminals designed to lure unsuspecting users into sending them their confidential data....\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.nesark.com\/blog\/what-is-social-engineering-phase\/\" \/>\n<meta property=\"og:site_name\" content=\"Nesark | Tutorials\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/nesarktech\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-06T07:23:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-19T09:58:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2020\/04\/Untitled-design.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Ram Nath Das\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ram Nath Das\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.nesark.com\/blog\/what-is-social-engineering-phase\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.nesark.com\/blog\/what-is-social-engineering-phase\/\"},\"author\":{\"name\":\"Ram Nath Das\",\"@id\":\"https:\/\/www.nesark.com\/blog\/#\/schema\/person\/5282df381645953288b5502b89a86126\"},\"headline\":\"What is Social Engineering | Phase ?\",\"datePublished\":\"2020-04-06T07:23:14+00:00\",\"dateModified\":\"2024-06-19T09:58:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.nesark.com\/blog\/what-is-social-engineering-phase\/\"},\"wordCount\":265,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.nesark.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.nesark.com\/blog\/what-is-social-engineering-phase\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2020\/04\/Untitled-design.png\",\"keywords\":[\"cybercriminals\",\"data\",\"social engg\",\"techniques\",\"users\"],\"articleSection\":[\"Ethical Hacking\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.nesark.com\/blog\/what-is-social-engineering-phase\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.nesark.com\/blog\/what-is-social-engineering-phase\/\",\"url\":\"https:\/\/www.nesark.com\/blog\/what-is-social-engineering-phase\/\",\"name\":\"What is Social Engineering | Phase ? - Nesark | Tutorials\",\"isPartOf\":{\"@id\":\"https:\/\/www.nesark.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.nesark.com\/blog\/what-is-social-engineering-phase\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.nesark.com\/blog\/what-is-social-engineering-phase\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2020\/04\/Untitled-design.png\",\"datePublished\":\"2020-04-06T07:23:14+00:00\",\"dateModified\":\"2024-06-19T09:58:42+00:00\",\"description\":\"Social engineering is a form of techniques employed by cybercriminals designed to lure unsuspecting users into sending them their confidential data....\",\"breadcrumb\":{\"@id\":\"https:\/\/www.nesark.com\/blog\/what-is-social-engineering-phase\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.nesark.com\/blog\/what-is-social-engineering-phase\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nesark.com\/blog\/what-is-social-engineering-phase\/#primaryimage\",\"url\":\"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2020\/04\/Untitled-design.png\",\"contentUrl\":\"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2020\/04\/Untitled-design.png\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.nesark.com\/blog\/what-is-social-engineering-phase\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.nesark.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Social Engineering | Phase ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.nesark.com\/blog\/#website\",\"url\":\"https:\/\/www.nesark.com\/blog\/\",\"name\":\"Nesark | Tutorials\",\"description\":\"Blog\",\"publisher\":{\"@id\":\"https:\/\/www.nesark.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.nesark.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.nesark.com\/blog\/#organization\",\"name\":\"Nesark Worldservices Pvt. Ltd.\",\"url\":\"https:\/\/www.nesark.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nesark.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2021\/10\/Mask-Group-7.png\",\"contentUrl\":\"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2021\/10\/Mask-Group-7.png\",\"width\":200,\"height\":59,\"caption\":\"Nesark Worldservices Pvt. Ltd.\"},\"image\":{\"@id\":\"https:\/\/www.nesark.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/nesarktech\",\"https:\/\/www.linkedin.com\/company\/nesarktech\",\"https:\/\/www.youtube.com\/nesarktech\",\"https:\/\/www.instagram.com\/nesarktech\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.nesark.com\/blog\/#\/schema\/person\/5282df381645953288b5502b89a86126\",\"name\":\"Ram Nath Das\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nesark.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/059938dcfb66a295197ca697bf38c5947e4b3fae2e51dfbbbdb1d44f2c3a893f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/059938dcfb66a295197ca697bf38c5947e4b3fae2e51dfbbbdb1d44f2c3a893f?s=96&d=mm&r=g\",\"caption\":\"Ram Nath Das\"},\"description\":\"I'm a results-driven professional with a passion for leveraging digital strategies to drive business growth. With 6 years of experience in the dynamic fields of marketing, social media, Google - Facebook Ads and SMS marketing, I specialize in creating impactful campaigns that resonate with audiences and deliver measurable results. Let's Connect: I believe in the power of networking and collaboration. Feel free to reach out, connect, or send me a message. Together, we can uncover new possibilities and chart a course for success in the ever-evolving digital landscape. Thank you.\",\"sameAs\":[\"https:\/\/www.nesark.com\/blog\"],\"url\":\"https:\/\/www.nesark.com\/blog\/author\/ramnathdas6\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Social Engineering | Phase ? - Nesark | Tutorials","description":"Social engineering is a form of techniques employed by cybercriminals designed to lure unsuspecting users into sending them their confidential data....","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.nesark.com\/blog\/what-is-social-engineering-phase\/","og_locale":"en_US","og_type":"article","og_title":"What is Social Engineering | Phase ? - Nesark | Tutorials","og_description":"Social engineering is a form of techniques employed by cybercriminals designed to lure unsuspecting users into sending them their confidential data....","og_url":"https:\/\/www.nesark.com\/blog\/what-is-social-engineering-phase\/","og_site_name":"Nesark | Tutorials","article_publisher":"https:\/\/www.facebook.com\/nesarktech","article_published_time":"2020-04-06T07:23:14+00:00","article_modified_time":"2024-06-19T09:58:42+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2020\/04\/Untitled-design.png","type":"image\/png"}],"author":"Ram Nath Das","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Ram Nath Das","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.nesark.com\/blog\/what-is-social-engineering-phase\/#article","isPartOf":{"@id":"https:\/\/www.nesark.com\/blog\/what-is-social-engineering-phase\/"},"author":{"name":"Ram Nath Das","@id":"https:\/\/www.nesark.com\/blog\/#\/schema\/person\/5282df381645953288b5502b89a86126"},"headline":"What is Social Engineering | Phase ?","datePublished":"2020-04-06T07:23:14+00:00","dateModified":"2024-06-19T09:58:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.nesark.com\/blog\/what-is-social-engineering-phase\/"},"wordCount":265,"commentCount":0,"publisher":{"@id":"https:\/\/www.nesark.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.nesark.com\/blog\/what-is-social-engineering-phase\/#primaryimage"},"thumbnailUrl":"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2020\/04\/Untitled-design.png","keywords":["cybercriminals","data","social engg","techniques","users"],"articleSection":["Ethical Hacking"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.nesark.com\/blog\/what-is-social-engineering-phase\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.nesark.com\/blog\/what-is-social-engineering-phase\/","url":"https:\/\/www.nesark.com\/blog\/what-is-social-engineering-phase\/","name":"What is Social Engineering | Phase ? - Nesark | Tutorials","isPartOf":{"@id":"https:\/\/www.nesark.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.nesark.com\/blog\/what-is-social-engineering-phase\/#primaryimage"},"image":{"@id":"https:\/\/www.nesark.com\/blog\/what-is-social-engineering-phase\/#primaryimage"},"thumbnailUrl":"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2020\/04\/Untitled-design.png","datePublished":"2020-04-06T07:23:14+00:00","dateModified":"2024-06-19T09:58:42+00:00","description":"Social engineering is a form of techniques employed by cybercriminals designed to lure unsuspecting users into sending them their confidential data....","breadcrumb":{"@id":"https:\/\/www.nesark.com\/blog\/what-is-social-engineering-phase\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nesark.com\/blog\/what-is-social-engineering-phase\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nesark.com\/blog\/what-is-social-engineering-phase\/#primaryimage","url":"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2020\/04\/Untitled-design.png","contentUrl":"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2020\/04\/Untitled-design.png","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.nesark.com\/blog\/what-is-social-engineering-phase\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.nesark.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What is Social Engineering | Phase ?"}]},{"@type":"WebSite","@id":"https:\/\/www.nesark.com\/blog\/#website","url":"https:\/\/www.nesark.com\/blog\/","name":"Nesark | Tutorials","description":"Blog","publisher":{"@id":"https:\/\/www.nesark.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nesark.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.nesark.com\/blog\/#organization","name":"Nesark Worldservices Pvt. Ltd.","url":"https:\/\/www.nesark.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nesark.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2021\/10\/Mask-Group-7.png","contentUrl":"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2021\/10\/Mask-Group-7.png","width":200,"height":59,"caption":"Nesark Worldservices Pvt. Ltd."},"image":{"@id":"https:\/\/www.nesark.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/nesarktech","https:\/\/www.linkedin.com\/company\/nesarktech","https:\/\/www.youtube.com\/nesarktech","https:\/\/www.instagram.com\/nesarktech"]},{"@type":"Person","@id":"https:\/\/www.nesark.com\/blog\/#\/schema\/person\/5282df381645953288b5502b89a86126","name":"Ram Nath Das","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nesark.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/059938dcfb66a295197ca697bf38c5947e4b3fae2e51dfbbbdb1d44f2c3a893f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/059938dcfb66a295197ca697bf38c5947e4b3fae2e51dfbbbdb1d44f2c3a893f?s=96&d=mm&r=g","caption":"Ram Nath Das"},"description":"I'm a results-driven professional with a passion for leveraging digital strategies to drive business growth. With 6 years of experience in the dynamic fields of marketing, social media, Google - Facebook Ads and SMS marketing, I specialize in creating impactful campaigns that resonate with audiences and deliver measurable results. Let's Connect: I believe in the power of networking and collaboration. Feel free to reach out, connect, or send me a message. Together, we can uncover new possibilities and chart a course for success in the ever-evolving digital landscape. Thank you.","sameAs":["https:\/\/www.nesark.com\/blog"],"url":"https:\/\/www.nesark.com\/blog\/author\/ramnathdas6\/"}]}},"_links":{"self":[{"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/posts\/1027","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/comments?post=1027"}],"version-history":[{"count":1,"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/posts\/1027\/revisions"}],"predecessor-version":[{"id":1242,"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/posts\/1027\/revisions\/1242"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/media\/424"}],"wp:attachment":[{"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/media?parent=1027"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/categories?post=1027"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/tags?post=1027"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}