You are tasked to perform a penetration test. While you are performing information gathering, you find an employee list in Google. You find the receptionists email, and you send her an email changing the source email to her bosss email (boss@company). In this email, you ask for a pdf with information. She reads your email and sends back a pdf with links. You exchange the pdf links with your malicious links (these links contain malware) and send back the modified pdf, saying that the links dont work. She reads your email, opens the links, and her machine gets infected. You now have access to the company network. What testing method did you use?
A. Social engineering
B. Piggybacking
C. Tailgating
D. Eavesdropping
A. Social engineering
B. Piggybacking
C. Tailgating
D. Eavesdropping