There's a article which runs though a good example of social engineering here . The methods used give examples of how easy it is to gain access to information or goods without authorisation. It does require a talent for thinking on your feet though....


raesene

Security Geek, Penetration Testing, Docker, Ruby, Hillwalking