Skip links

  • Skip to primary navigation
  • Skip to content
  • Skip to footer
OWASP OWASP BLADE: Business Logic Abuse Definition Framework BLADE
  • Matrix
  • Phases
  • Tactics
  • Techniques
  • Kill Chains
  • Resources
  • Contribute
    1. Home
    2. >
    3. Techniques
    4. >
    5. Mobile Network Spoofing

    Mobile Network Spoofing

    ID: TEQ-096
    Phase(s): Defence Bypass
    Tactic(s): Geolocation Spoofing

    The adversary uses characteristics of a mobile network (e.g., country code) to make it look like they are based in a specific geolocation.

    Related Kill Chains

    • Carding Bot
    • Fake Account Creation Bot

    Updated: March 2, 2026

    OWASP BLADE: Business Logic Abuse Definition Framework
    © 2026 OWASP BLADE: Business Logic Abuse Definition Framework.
    • GitHub

    Cookie Policy

    This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media. To find out more about the cookies we use, see our Privacy Policy.

    If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.