If you wanna be real these are also commonly in the hacker repository:
>Pretend to be someone on the phone. Pretend to be pissed off and say you don't remember the password or the security question and refuse to stop complaining. It actually works more often than you expect.
>Bribing and blackmailing employees. Just hack their browser history seriously, or hijack their browser and do a bunch of illicit things if they're clean.
>Physically takeover a cell signal tower.
>Clip a transfer cable since most "secure" wifi used wired connections. Just pretend to be city workers digging ditches, or actual ISP providers doing their usual checks.
>Dumpster driving. Most people have passwords close to their lives, or information that help hackers gain trust to enable further hacking.
>Steal someone's phone and SIM-swap... Actually I think someone started doing sim-takeovers without even touching someone's phone early last year.
>
Use drones as remote relays. (The idea was old. Kinda surprises me they only started doing this now.)
AFAIK actual hackers are both more physical and do more typing than you'd think. v=w=v