Abstract
At larger customer sites, I am frequently asked to see if I can get into a computer facility or asked to gain access to corporate assets. One of the more successful manners in which to do this is via social engineering.