-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

The Art of Social Engineering
By :

The tailgating attack, also known as piggybacking, consists of gaining unauthorized access to a secure or restricted area. Normally, the attack is achieved by following an authorized person and leveraging that person’s access to illegally enter the restricted area. Like the rest of the attacks, this is normally done to gather private or sensitive data, steal devices or goods, cause some physical damage, harm employees, or execute some physical cybersecurity attacks (for example, connecting a physical keystroke device).
As illustrated in Figure 4.6, attackers will use a range of social engineering techniques to execute this attack, including authority, liking, and reciprocity.
There are many ways in which the attacker executes this attack. The most common are as follows:
Change the font size
Change margin width
Change background colour