TelcoSec
Home
5G Security4G Security3G Security2G Security
SS7DiameterSIGTRANSIPVoIP
SIM CardsMobile DevicesBaseband
MoTIF
Tools
Diagrams
Home
5G Security4G Security3G Security2G Security
SS7DiameterSIGTRANSIPVoIP
SIM CardsMobile DevicesBaseband
MoTIF
Tools
Diagrams
  • Home
  • MoTIF
  • Tactics
  • Reconnaissance
  • Reconnaissance
    MOTA3001

    The adversary is trying to gather information they can use to plan future operations

    Phase: Preparation
    5 Techniques
    11 Sub-techniques
    Next: Resource Development
    Monitor Radio Interface
    MOT3001
    The adversaries may monitor radio interface traffic to passively collect information about the radio network configuration or about subscribers in close vicinity of the adversary.
    2G
    3G
    4G
    Public
    2 sub-techniques
    Gather Victim Identity Information
    MOT1589
    Adversaries may gather information about the victim's identity that can be used during targeting.
    2G
    3G
    4G
    5G-SA
    Public
    2 sub-techniques
    Search Closed Sources
    MOT1597
    Adversaries may search and gather information about victims from closed sources that can be used during targeting.
    2G
    3G
    4G
    5G-SA
    Public
    2 sub-techniques
    Search Open Websites/Domains
    MOT1593
    Adversaries may search freely available websites and/or domains for information about victims that can be used during targeting.
    2G
    3G
    4G
    5G-SA
    Public
    2 sub-techniques
    Network Protocol Analysis
    MOT3020
    Adversaries may analyze telecom network protocols to identify vulnerabilities, misconfigurations, or opportunities for exploitation.
    2G
    3G
    4G
    Public
    3 sub-techniques
    TelcoSec LogoTelcoSec

    Expert resources on telecommunications security, vulnerabilities, and attack vectors in mobile networks and unified communications.

    GitHubLinkedInEmail

    Mobile Networks

    • 5G Security
    • 4G Security
    • 3G Security
    • 2G Security

    Signaling Protocols

    • SS7 Security
    • Diameter Security
    • SIGTRAN Security
    • SIP Security
    • VoIP Security

    Resources

    • MoTIF Framework
    • Security Tools
    • Sitemap
    • About Author
    • Contact
    Privacy PolicyTerms of ServiceAdvertisePartners

    © 2025 TelcoSec. All rights reserved.