Skip links

  • Skip to primary navigation
  • Skip to content
  • Skip to footer
BLADE: Business Logic Attack Definition Framework BLADE
  • Matrix
  • Phases
  • Tactics
  • Techniques
  • Kill Chains
  • Resources
  • Contribute
    1. Home
    2. >
    3. Tactics
    4. >
    5. Invoice Abuse

    Invoice Abuse

    ID: TAC-22
    Phase: Post-Attack

    The adversary will use PO Boxes, fake addresses, and/or fake identities to bypass restrictions that limit services or purchases to a limited number per individual or address.

    Techniques

    • PO Box Obfuscation
    • Jigging
    • Fake Identity

    Related Kill Chains

    • Arbitrage Betting Bot
    • Scalper Bot
    • Sniper Bot

    Updated: July 11, 2022

    BLADE: Business Logic Attack Definition Framework
    © 2022 BLADE: Business Logic Attack Definition Framework.
    • GitHub