https://www.tarlogic.com/blog/practical-guide-to-understanding-social-engineering-attacks/#9_The_phases_of_social_engineering_attacks