2.2.4. Technical approaches
Technical attacks are mainly carried out over the Internet.
Granger (2001)
notes that the Internet is especially interesting
forsocialengineerstoharvestpasswords, asusersoftenusethe
same (simple) passwords for different accounts. Most people
are also not aware that they are freely providing attackers (or
anyone who will search for it) with plenty of personal infor-
mation. Attackers often use search engines to gather personal
information about future victims. There are also tools that can
gather and aggregate information from different Web re-
sources. One of the most popular tools of this kind is Maltego.
1
Social networking sites are becoming valuable sources of in-
formation as well (see Section
4
for more details)..