77 - Other Attack Vectors
Posing as someone to gain unauthorized access
Mutual exchange of favors to gain trust or favorability and attack
Offering compensation or a service in exchange for access
Manipulation of data so that it appears as if it's coming from a legitimate source
Types of spoofing: