TelcoSec
Home
5G Security4G Security3G Security2G Security
SS7DiameterSIGTRANSIPVoIP
SIM CardsMobile DevicesBaseband
MoTIF
Tools
Diagrams
Home
5G Security4G Security3G Security2G Security
SS7DiameterSIGTRANSIPVoIP
SIM CardsMobile DevicesBaseband
MoTIF
Tools
Diagrams
  • Home
  • MoTIF
  • Tactics
  • Persistence
  • Persistence
    MOTA3005

    The adversary is trying to maintain their foothold

    Phase: Impact
    3 Techniques
    6 Sub-techniques
    Previous: Execution
    Next: Privilege Escalation
    Adversary-in-the-Middle
    MOT1557
    Adversaries may attempt to position themselves between two or more networked devices using an adversary-in-the-middle (AiTM) technique to support follow-on behaviors such as Network Sniffing.
    2G
    3G
    4G
    Public
    2 sub-techniques
    Account Manipulation
    MOT3025
    Adversaries may manipulate accounts to maintain access to telecom network elements.
    2G
    3G
    4G
    Public
    2 sub-techniques
    Modify Network Configuration
    MOT3026
    Adversaries may modify network configurations to maintain access to telecom networks.
    2G
    3G
    4G
    Public
    2 sub-techniques
    TelcoSec LogoTelcoSec

    Expert resources on telecommunications security, vulnerabilities, and attack vectors in mobile networks and unified communications.

    GitHubLinkedInEmail

    Mobile Networks

    • 5G Security
    • 4G Security
    • 3G Security
    • 2G Security

    Signaling Protocols

    • SS7 Security
    • Diameter Security
    • SIGTRAN Security
    • SIP Security
    • VoIP Security

    Resources

    • MoTIF Framework
    • Security Tools
    • Sitemap
    • About Author
    • Contact
    Privacy PolicyTerms of ServiceAdvertisePartners

    © 2025 TelcoSec. All rights reserved.