Social Engineering 3

social engineering can access via weak passwords