This is a dedicated watch page for a single video.
Jake, the malicious attacker, aimed to gather sensitive information about Sarah. He discovered that Sarah's company had recently acquired new hardware. Pretending to be a legitimate customer support representative, Jake called Sarah, informing her that the new systems required servicing to ensure proper functionality. He notified her that a technician would be sent for the job. Sarah agreed and scheduled a meeting with Jake. A few days later, Jake entered Sarah's company's premises without suspicion, where he proceeded to collect valuable information by scanning computer terminals for passwords, searching through important documents on desks, and rummaging through trash bins. What type of attack technique did Jake use on Sarah?