A wide variety of attack methods are used in social engineering to access access data or personal identifications of third parties. The better-known methods include phishing and pretexting. In addition, there is baiting, tailgating and quid pro quo, which translates as quid pro quo or equivalent.
Quid pro quo attacks are about advantages that a victim gains by exchanging information. It is primarily about the benefit of services, whereas baiting is about the use of music or video downloads. In quid pro quo attacks, the attackers imitate service personnel, for example, and offer the victim extensive information material about the company and provide appropriate assistance in processing.