TelcoSec
Home
5G Security4G Security3G Security2G Security
SS7DiameterSIGTRANSIPVoIP
SIM CardsMobile DevicesBaseband
MoTIF
Tools
Diagrams
Home
5G Security4G Security3G Security2G Security
SS7DiameterSIGTRANSIPVoIP
SIM CardsMobile DevicesBaseband
MoTIF
Tools
Diagrams
  • Home
  • MoTIF
  • Tactics
  • Initial Access
  • Initial Access
    MOTA3003

    The adversary is trying to get into your network

    Phase: Initial Access
    6 Techniques
    18 Sub-techniques
    Previous: Resource Development
    Next: Execution
    Exploit Interconnection Link
    MOT3002
    The adversary may get access to the target network via the interconnection interface.
    2G
    3G
    4G
    Public
    3 sub-techniques
    Exploit via Core Signalling Interface
    MOT3003
    The adversary may access the target network by exploiting signalling (i.e. control plane) protocols.
    2G
    3G
    4G
    Public
    4 sub-techniques
    Exploit via Radio Interface
    MOT3006
    Adversaries may use the radio access network to initiate attacks towards the UE or the mobile network.
    2G
    3G
    4G
    Public
    4 sub-techniques
    Trusted Relationship
    MOT1199
    Adversaries may breach or otherwise leverage organizations who have access to intended victims.
    2G
    3G
    4G
    Public
    2 sub-techniques
    Supply Chain Compromise
    MOT1195
    Adversaries may manipulate products or product delivery mechanisms prior to receipt by a final consumer for the purpose of data or system compromise.
    2G
    3G
    4G
    Public
    2 sub-techniques
    Exploit Management Interface
    MOT3022
    Adversaries may exploit vulnerabilities in management interfaces of telecom equipment to gain initial access.
    2G
    3G
    4G
    Public
    3 sub-techniques
    TelcoSec LogoTelcoSec

    Expert resources on telecommunications security, vulnerabilities, and attack vectors in mobile networks and unified communications.

    GitHubLinkedInEmail

    Mobile Networks

    • 5G Security
    • 4G Security
    • 3G Security
    • 2G Security

    Signaling Protocols

    • SS7 Security
    • Diameter Security
    • SIGTRAN Security
    • SIP Security
    • VoIP Security

    Resources

    • MoTIF Framework
    • Security Tools
    • Sitemap
    • About Author
    • Contact
    Privacy PolicyTerms of ServiceAdvertisePartners

    © 2025 TelcoSec. All rights reserved.