Device Configuration Emulation

ID: TEQ-028
Phase(s): Defence Bypass
Tactic(s): Device Emulation

The adversary mimics the hardware and software configuration of a device hoping bypass detection mechanisms. For example, an attacker may emulate an operating system version, or hardware fingerprint.