Certificate Abuse
| ID: | TEQ-025 |
| Phase(s): | Defence Bypass |
| Tactic(s): | Mitigation Bypass |
The adversary abuses certificates and certificate services, for example by pinning certificates to applications or browsers with the intention of impersonating a legitimate user.