Bob is a hacker who intends to use social engineering strategies to infiltrate a former employer. After doing thorough research, he begins calling the customer service line to find the weakest representatives to attack. He calls over and over again trying to talk to many different representatives. What phase of this social engineering attack is Bob involved in?
A.
Dumpster diving
B.
Target selection
C.
Intelligence gathering
D.
Attack mode
Explanation:
Bob has already completed the intelligence gathering phase and is now executing the
target selection phase. By surfing through all the different customer service
representatives, he is deciding which one will provide the easiest avenue for his
exploit.