
130
DIGITAL FORENSICS EXPLAINED
asked for it. In some situations, the social engineer will create an environment for
this to occur. For example, a social engineer impersonating a support technician
may move a file for which a target requires access. e target then requests assis-
tance from the social engineer and provides access and personal information to help
resolve the problem. Once this access and personal information has been captured,
the social engineer simply replaces the file and the target has no idea that they have
just been hacked. Similarly, when social engineers masquerade as law enforcement
or military personnel, they are often very ...