ELI5: What is Social Engineering?

Instead of picking a lock, what if a burglar just tricked you into handing over the key? That’s social engineering. Bad guys use lies, fake stories, and pressure to get people to give up passwords, open dangerous files, or let strangers into secure places. They play on feelings like trust, fear, and helpfulness. It works because even the strongest computer security can be beaten when a person gets fooled.

Overview

Social engineering is the art of manipulating people into performing actions or divulging confidential information. Rather than exploiting technical vulnerabilities, these attacks target human psychology — trust, fear, urgency, and curiosity. Social engineering is consistently one of the most effective attack methods and is heavily tested on the SY0-701 exam.

Key Concepts

  • Phishing — fraudulent emails impersonating legitimate entities to steal credentials or deliver malware
    • Spear phishing — targeted at specific individuals or organizations
    • Whaling — targets high-level executives (C-suite)
    • Business Email Compromise (BEC) — impersonating or compromising business email accounts
  • Vishing — voice-based phishing via phone calls
  • Smishing — SMS-based phishing via text messages
  • Pretexting — creating a fabricated scenario to gain trust and extract information
  • Baiting — offering something enticing (USB drive, free download) to lure victims
  • Piggybacking — following an authorized person through a secured door
    • Tailgating = without their knowledge; Piggybacking = with their consent
  • Watering hole attack — compromising a website frequently visited by the target group
  • Typosquatting — also known as URL hijacking; registering domains similar to legitimate ones to capture mistyped URLs; relies on common typing errors
  • Brand impersonation — creating fake websites, emails, or social media profiles mimicking trusted brands
  • Influence campaigns — large-scale disinformation operations to manipulate public opinion; may include hybrid warfare combining cyber operations with disinformation
  • Credential harvesting — collecting usernames and passwords via fake login pages or forms, often delivered through phishing campaigns
  • Psychological principles exploited:
    • Authority, urgency, scarcity, social proof, likability, fear, intimidation, consensus

Exam Tips

Remember

Phishing family: Email = Phishing, Phone = Vishing, SMS = Smishing, Targeted = Spear phishing, Executive = Whaling. The exam will describe a scenario and expect you to identify the specific type.

Tailgating vs. Piggybacking

Tailgating = victim is unaware someone followed them through the door. Piggybacking = victim knowingly allows it (e.g., holds door open out of politeness).

Connections

Practice Questions

Scenario

See case-social-engineering for a practical DevOps scenario applying these concepts.