ExecutionMOTA3004
The adversary is trying to run malicious code
Phase: Execution
2 Techniques
4 Sub-techniques
Command and Scripting Interpreter
MOT3023
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries on telecom network elements.
2G
3G
4G
Public
2 sub-techniques
Container-based Execution
MOT3024
Adversaries may abuse container technologies used in telecom cloud infrastructure to execute malicious code.
4G
Public
2 sub-techniques