Device Emulation

ID: TAC-33
Phase: Defence Bypass

The adversary emulates device attributes, such as user agents or hardware fingerprints. They do this to simulate the behaviour of another device.