Open Source Intelligence Gathering – Public organizational (organization-wide or targeted components) attack surface presented for social engineering attackers
Spear Phishing – Targeted emails to designated personnel utilizing various levels of sophistication based on the threat emulated (click counting, credential gathering, up to full payload delivery depending on the objective)
Pretexting/Cold-calling – Phone based social engineering to gather critical information
Physical – Onsite activities including attempts to gain access to specific locations, unauthorized physical network access, baiting, tailgating, dumpster diving, USB drops, etc.