Proxying

parent /tactics/03-defence-bypass

The adversary seeks to obfuscate the origin of their activity and bypass IP and geo-blocking by using a server application or appliance that acts as an intermediary for requests from clients to the web app.

Subtechniques