Skip links

  • Skip to primary navigation
  • Skip to content
  • Skip to footer
OWASP OWASP BLADE: Business Logic Attack Definition Framework BLADE
  • Matrix
  • Phases
  • Tactics
  • Techniques
  • Kill Chains
  • Resources
  • Contribute
    1. Home
    2. >
    3. Techniques
    4. >
    5. Fake Identity

    Fake Identity

    ID: TEQ-073
    Phase(s): Post-Attack
    Tactic(s): Invoice Abuse

    The adversary will hide their true identity by providing fake details to the invoice process, such as name, phone number, etc.

    Related Kill Chains

    • Arbitrage Betting Bot
    • Scalper Bot
    • Sniper Bot

    Updated: May 16, 2025

    OWASP BLADE: Business Logic Attack Definition Framework
    © 2025 OWASP BLADE: Business Logic Attack Definition Framework.
    • GitHub

    Cookie Policy

    This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media. To find out more about the cookies we use, see our Privacy Policy.

    If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.