From time to time I’m asked to perform social engineering attacks as part of a vulnerability assessment or penetration test. So, I’ve been thinking about the types of social engineering attacks that could succeed on modern well protected networks. Have products evolved so much that these types of attacks can no longer work?