This attack uses social engineering techniques to trick users into accessing a fake Web site and divulging personal information…
Why do you think this could be a bad idea if there is an Intrusion Detection System deployed to monitor the traffic between point A and B?
How would you describe an attack where an attacker attempts to deliver the payload over multiple packets ?