ReconnaissanceMOTA3001
The adversary is trying to gather information they can use to plan future operations
Phase: Preparation
5 Techniques
11 Sub-techniques
Monitor Radio Interface
MOT3001
The adversaries may monitor radio interface traffic to passively collect information about the radio network configuration or about subscribers in close vicinity of the adversary.
2G
3G
4G
Public
2 sub-techniques
Gather Victim Identity Information
MOT1589
Adversaries may gather information about the victim's identity that can be used during targeting.
2G
3G
4G
5G-SA
Public
2 sub-techniques
Search Closed Sources
MOT1597
Adversaries may search and gather information about victims from closed sources that can be used during targeting.
2G
3G
4G
5G-SA
Public
2 sub-techniques
Search Open Websites/Domains
MOT1593
Adversaries may search freely available websites and/or domains for information about victims that can be used during targeting.
2G
3G
4G
5G-SA
Public
2 sub-techniques
Network Protocol Analysis
MOT3020
Adversaries may analyze telecom network protocols to identify vulnerabilities, misconfigurations, or opportunities for exploitation.
2G
3G
4G
Public
3 sub-techniques