Token Bypass
| ID: | TEQ-020 | 
| Phase(s): | Defence Bypass | 
| Tactic(s): | Mitigation Bypass | 
The adversary abuses token based mitigation mechanisms, for example, by reusing cross site request forgery tokens to successfully authenticate.
| ID: | TEQ-020 | 
| Phase(s): | Defence Bypass | 
| Tactic(s): | Mitigation Bypass | 
The adversary abuses token based mitigation mechanisms, for example, by reusing cross site request forgery tokens to successfully authenticate.