Figure 4: Device registering to attacker’s server

Figure 4: Device registering to attacker’s server

Figure 4: Device registering to attacker’s server