Device Configuration Emulation
| ID: | TEQ-028 |
| Phase(s): | Defence Bypass |
| Tactic(s): | Device Emulation |
The adversary mimics the hardware and software configuration of a device hoping bypass detection mechanisms. For example, an attacker may emulate an operating system version, or hardware fingerprint.
Related Kill Chains
- Account Takeover Bot
- Ad Click Bot (Own Ads)
- Ad Click Bot (Target Ads)
- Arbitrage Betting Bot
- Carding Bot
- Credential Stuffing Bot
- Fake Account Creation Bot
- Form Spam Bot
- Gift Card Cracking Bot
- Inventory Hoarding Bot
- Loyalty Points Bot
- Scalper Bot
- Scraper Bot
- Sniper Bot
- Social Media Bot
- Video Watch Bot