
192 Chapter 5 • Hacking Techniques and Tools
the party he’s contacting.The attacker may even use a voice changer to
impersonate an older adult or even someone of the opposite sex.
Curiously enough, women commit some of the most successful
social engineering attacks. It seems that most people are inclined to
regard an unrecognized male caller with more suspicion than they
would accord a female caller. Sexist as it may sound, societal expectations
are that women are more innocent; they are also presumed to under-
stand technology less, even to the point of handing information to them
on the canonical silver platter. Even supposedly hack-savvy giants like ...