Warning: Do not execute these on a network or system that you do not own. Execute only on your own network or system for learning purposes. Do not execute these on any production network or system, unless Rules of engagement have been agreed on, and you have a Get out of jail free card.
Social engineering targets the weakest link in the security chain: people. It takes advantage of human weakness and trust (which can be strengths in other contexts, like being helpful) and uses several non-technical methods to gather information or circumvent security controls. Social engineering:
Goals are to gather information, gain a foothold in an organisation, and infiltrate security
Laugh uncontrollably for about 3 minutes & then suddenly stop and look suspiciously at everyone who looks at you.
Ask the person next to you if they know how to tap into top-secret Pentagon files.