Device Emulation
| ID: | TAC-33 |
| Phase: | Defence Bypass |
The adversary emulates device attributes, such as user agents or hardware fingerprints. They do this to simulate the behaviour of another device.
Related Kill Chains
- Account Takeover Bot
- Ad Click Bot (Own Ads)
- Ad Click Bot (Target Ads)
- Arbitrage Betting Bot
- Carding Bot
- Credential Stuffing Bot
- Fake Account Creation Bot
- Form Spam Bot
- Gift Card Cracking Bot
- Inventory Hoarding Bot
- Loyalty Points Bot
- Scalper Bot
- Scraper Bot
- Sniper Bot
- Social Media Bot
- Video Watch Bot