Session Spoofing
| ID: | TEQ-088 | |
| Phase(s): | Defence Bypass | |
| Tactic(s): | Queue Bypass | Session Manipulation |
The adversary clones, hijacks, or fabricates valid session identifiers or tokens to impersonate legitimate users.
| ID: | TEQ-088 | |
| Phase(s): | Defence Bypass | |
| Tactic(s): | Queue Bypass | Session Manipulation |
The adversary clones, hijacks, or fabricates valid session identifiers or tokens to impersonate legitimate users.