Social Engineering Attacks
AuthorDiscord
  • Hacking Humans
  • 🐟Phishing
    • 🟢Spear Phishing
    • 🟢Vishing
    • 🟢Smishing
    • 🟢Clone Phishing
    • 🟢Link Manipulation
    • 🟢Watering Hole Attack
    • 🟢Business Email Compromise
  • 🎩Pretexting
    • 🟢Tech Support Scam
    • CEO Fraud Scam
    • 🟢Trust Scam
    • Job Scam
    • 🟢Relationship Scam
    • 🟢Charity Scam
    • 🟢Lottery Scam
  • 🛠️Baiting
    • USB Drop
    • Fake Wi-Fi Hotspot
    • Evil Twin Attack
    • QR Code Scam
    • Social Media Scam
    • Free Gift Scam
    • Black Hat SEO
  • 🥨Quid Pro Quo
    • Conference Scam
    • Customer Service Scam
    • Fake Software Scam
    • Social Networking Scam
    • Website Community Scam
    • Alarm System Scam
    • IT Support Scam
  • Tailgating
    • Piggybacking
    • Keylogging
    • Dumpster Diving
    • Shoulder Surfing
    • Eavesdropping
    • Credit Card Skimming
    • Bluetooth Hacking
  • Group 1
    • Presentations
Powered by GitBook
On this page

Was this helpful?

  1. Tailgating

Piggybacking

Social Engineering Piggybacking

Social Engineering Piggybacking is a tactic where an unauthorized person gains access to a restricted area by following closely behind someone who is authorized.

This is achieved through either coercion, deception, or simply exploiting the trust of the person being followed. It is a common security risk and can lead to significant breaches if not properly managed.

PreviousIT Support ScamNextKeylogging

Last updated 11 months ago

Was this helpful?