
Ayush Anand is a hardworking and innovative high school sophomore…
Coming across potentially dangerous scams online is possible. Such activity is known as Social Engineering Attacks. Let’s learn more about it in this article!
Hacking Humans? What do you mean? I am talking about concerning Cyber Security and more precisely, social engineering attack! In the last article, I mentioned different ways through which your data can be compromised, over your local network. In this article, I would talk specifically about Social Engineering.
What is Social Engineering?

As per Wikipedia, “Social engineering is the psychological manipulation of people into performing actions or divulging confidential information. This differs from social engineering within the social sciences which does not concern the divulging of confidential information.”
Social Engineering attacks are the most dreadful attacks it can compromise all your data – which can be the reason why companies spend millions of dollars and use custom email addresses to avoid spam emails. I won’t say social engineering is very hard, of course, it is not as hard as writing scripts to crack down a vulnerability found in a popular app. But it is also true that social engineering is not as easy as it looks on YouTube.
Types Of Social Engineering Attacks

There are mainly three different kinds of social engineering attacks.
These are listed below:
- Vishing:
Vishing stands for Voice Phishing. Voice Phishing is an act of performing a social engineering attack over the telephone system. All you need to do is to create a voiceprint similar to that person and, you need a software which could convert your live voice to a fake one. - Phishing
Phishing is a technique of obtaining private information. Usually, the phisher sends an email which appears to come from a legitimate organization. A question might have struck you that is: How one can change the domain name of an email if a person doesn’t own the domain? Well, the answer to the question is easy to understand! Emails are sent over a protocol termed as SMTP.
If you own any SMTP configuration, you can send email from almost any domain! There are certain websites which provide SMTP configuration for sending emails over Terminal (Linux Utility). Now the question is how to protect ourselves from phishing attacks? – You need to make sure that the email is coming from an authentic source. You can also email the organizations to know whether they have sent the email or not! - Smishing
Smishing is a technique of sending fake messages to lure victims. It is similar to Phishing. Those messages ask you to click on a malicious link. Now the question arises over here is how we can protect ourselves? You can verify it by just checking the sender id of the message. A little google search would help as well. These are a couple of conventional ways of performing social engineering!
In the upcoming articles, I will try to cover the advanced aspects of social engineering! These articles are only for educational purposes don’t try it in real life to disturb others. You can perform all of these attacks on your localhost. Launching any of these attacks on a live server without having proper rights will land you in trouble.
Social Engineering attacks are the most dreadful attacks it can compromise all of your data, which can be the reason why companies spend millions of dollars and use custom email addresses to avoid spam emails. I won’t say social engineering is very hard, of course, it is not as hard as writing scripts to crack down a vulnerability found in a popular app. But it is also true that social engineering is not as easy as it looks on youtube.
Social Engineering attacks are the most dreadful attacks it can compromise all of your data, which can be the reason why companies spend millions of dollars and use custom email addresses to avoid spam emails. I won’t say social engineering is very hard, of course, it is not as hard as writing scripts to crack down a vulnerability found in a popular app. But it is also true that social engineering is not as easy as it looks on youtube.
Social Engineering attacks are the most dreadful attacks it can compromise all of your data, which can be the reason why companies spend millions of dollars and use custom email addresses to avoid spam emails. I won’t say social engineering is very hard, of course, it is not as hard as writing scripts to crack down a vulnerability found in a popular app. But it is also true that social engineering is not as easy as it looks on youtube.
Social Engineering attacks are the most dreadful attacks it can compromise all of your data, which can be the reason why companies spend millions of dollars and use custom email addresses to avoid spam emails. I won’t say social engineering is very hard, of course, it is not as hard as writing scripts to crack down a vulnerability found in a popular app. But it is also true that social engineering is not as easy as it looks on youtube.
Social Engineering attacks are the most dreadful attacks it can compromise all of your data, which can be the reason why companies spend millions of dollars and use custom email addresses to avoid spam emails. I won’t say social engineering is very hard, of course, it is not as hard as writing scripts to crack down a vulnerability found in a popular app. But it is also true that social engineering is not as easy as it looks on youtube.
Social Engineering attacks are the most dreadful attacks it can compromise all of your data, which can be the reason why companies spend millions of dollars and use custom email addresses to avoid spam emails. I won’t say social engineering is very hard, of course, it is not as hard as writing scripts to crack down a vulnerability found in a popular app. But it is also true that social engineering is not as easy as it looks on youtube.
Social Engineering attacks are the most dreadful attacks it can compromise all of your data, which can be the reason why companies spend millions of dollars and use custom email addresses to avoid spam emails. I won’t say social engineering is very hard, of course, it is not as hard as writing scripts to crack down a vulnerability found in a popular app. But it is also true that social engineering is not as easy as it looks on youtube.
Social Engineering attacks are the most dreadful attacks it can compromise all of your data, which can be the reason why companies spend millions of dollars and use custom email addresses to avoid spam emails. I won’t say social engineering is very hard, of course, it is not as hard as writing scripts to crack down a vulnerability found in a popular app. But it is also true that social engineering is not as easy as it looks on youtube.
Social Engineering attacks are the most dreadful attacks it can compromise all of your data, which can be the reason why companies spend millions of dollars and use custom email addresses to avoid spam emails. I won’t say social engineering is very hard, of course, it is not as hard as writing scripts to crack down a vulnerability found in a popular app. But it is also true that social engineering is not as easy as it looks on youtube.
Social Engineering attacks are the most dreadful attacks it can compromise all of your data, which can be the reason why companies spend millions of dollars and use custom email addresses to avoid spam emails. I won’t say social engineering is very hard, of course, it is not as hard as writing scripts to crack down a vulnerability found in a popular app. But it is also true that social engineering is not as easy as it looks on youtube.
Social Engineering attacks are the most dreadful attacks it can compromise all of your data, which can be the reason why companies spend millions of dollars and use custom email addresses to avoid spam emails. I won’t say social engineering is very hard, of course, it is not as hard as writing scripts to crack down a vulnerability found in a popular app. But it is also true that social engineering is not as easy as it looks on youtube.
Social Engineering attacks are the most dreadful attacks it can compromise all of your data, which can be the reason why companies spend millions of dollars and use custom email addresses to avoid spam emails. I won’t say social engineering is very hard, of course, it is not as hard as writing scripts to crack down a vulnerability found in a popular app. But it is also true that social engineering is not as easy as it looks on youtube.
Social Engineering attacks are the most dreadful attacks it can compromise all of your data, which can be the reason why companies spend millions of dollars and use custom email addresses to avoid spam emails. I won’t say social engineering is very hard, of course, it is not as hard as writing scripts to crack down a vulnerability found in a popular app. But it is also true that social engineering is not as easy as it looks on youtube.
Social Engineering attacks are the most dreadful attacks it can compromise all of your data, which can be the reason why companies spend millions of dollars and use custom email addresses to avoid spam emails. I won’t say social engineering is very hard, of course, it is not as hard as writing scripts to crack down a vulnerability found in a popular app. But it is also true that social engineering is not as easy as it looks on youtube.
Social Engineering attacks are the most dreadful attacks it can compromise all of your data, which can be the reason why companies spend millions of dollars and use custom email addresses to avoid spam emails. I won’t say social engineering is very hard, of course, it is not as hard as writing scripts to crack down a vulnerability found in a popular app. But it is also true that social engineering is not as easy as it looks on youtube.
Social Engineering attacks are the most dreadful attacks it can compromise all of your data, which can be the reason why companies spend millions of dollars and use custom email addresses to avoid spam emails. I won’t say social engineering is very hard, of course, it is not as hard as writing scripts to crack down a vulnerability found in a popular app. But it is also true that social engineering is not as easy as it looks on youtube.
Social Engineering attacks are the most dreadful attacks it can compromise all of your data, which can be the reason why companies spend millions of dollars and use custom email addresses to avoid spam emails. I won’t say social engineering is very hard, of course, it is not as hard as writing scripts to crack down a vulnerability found in a popular app. But it is also true that social engineering is not as easy as it looks on youtube.
Social Engineering attacks are the most dreadful attacks it can compromise all of your data, which can be the reason why companies spend millions of dollars and use custom email addresses to avoid spam emails. I won’t say social engineering is very hard, of course, it is not as hard as writing scripts to crack down a vulnerability found in a popular app. But it is also true that social engineering is not as easy as it looks on youtube.
Social Engineering attacks are the most dreadful attacks it can compromise all of your data, which can be the reason why companies spend millions of dollars and use custom email addresses to avoid spam emails. I won’t say social engineering is very hard, of course, it is not as hard as writing scripts to crack down a vulnerability found in a popular app. But it is also true that social engineering is not as easy as it looks on youtube.
Social Engineering attacks are the most dreadful attacks it can compromise all of your data, which can be the reason why companies spend millions of dollars and use custom email addresses to avoid spam emails. I won’t say social engineering is very hard, of course, it is not as hard as writing scripts to crack down a vulnerability found in a popular app. But it is also true that social engineering is not as easy as it looks on youtube.
Social Engineering attacks are the most dreadful attacks it can compromise all of your data, which can be the reason why companies spend millions of dollars and use custom email addresses to avoid spam emails. I won’t say social engineering is very hard, of course, it is not as hard as writing scripts to crack down a vulnerability found in a popular app. But it is also true that social engineering is not as easy as it looks on youtube.
Social Engineering attacks are the most dreadful attacks it can compromise all of your data, which can be the reason why companies spend millions of dollars and use custom email addresses to avoid spam emails. I won’t say social engineering is very hard, of course, it is not as hard as writing scripts to crack down a vulnerability found in a popular app. But it is also true that social engineering is not as easy as it looks on youtube.
Social Engineering attacks are the most dreadful attacks it can compromise all of your data, which can be the reason why companies spend millions of dollars and use custom email addresses to avoid spam emails. I won’t say social engineering is very hard, of course, it is not as hard as writing scripts to crack down a vulnerability found in a popular app. But it is also true that social engineering is not as easy as it looks on youtube.
Social Engineering attacks are the most dreadful attacks it can compromise all of your data, which can be the reason why companies spend millions of dollars and use custom email addresses to avoid spam emails. I won’t say social engineering is very hard, of course, it is not as hard as writing scripts to crack down a vulnerability found in a popular app. But it is also true that social engineering is not as easy as it looks on youtube.
Social Engineering attacks are the most dreadful attacks it can compromise all of your data, which can be the reason why companies spend millions of dollars and use custom email addresses to avoid spam emails. I won’t say social engineering is very hard, of course, it is not as hard as writing scripts to crack down a vulnerability found in a popular app. But it is also true that social engineering is not as easy as it looks on youtube.
What's Your Reaction?

Ayush Anand is a hardworking and innovative high school sophomore and the founder of The Teen Pop Magazine, who excels at coding and website development. He is assertive and confident with his work and always thinks twice before making any decision, be it big or small. Ayush is a relaxed person but knows when to be serious and diligent.