DiscoveryMOTA3009
The adversary is trying to figure out your environment
Phase: Impact
4 Techniques
10 Sub-techniques
Network Service Scanning
MOT1046
An adversary may discover operator network related information (identifiers).
2G
3G
4G
Public
2 sub-techniques
Identify Subscriber
MOT5019
An adversary may obtain a subscriber permanent or temporary identifier via various means.
2G
3G
4G
Public
4 sub-techniques
Network Function Service Discovery
MOT5003
An adversary may query the Network Repository Function (NRF) to discover restricted Network Function (NF) services to further target that NF.
Public
2 sub-techniques
Network Topology Discovery
MOT3031
Adversaries may discover the topology of telecom networks to identify targets for further attacks.
2G
3G
4G
Public
2 sub-techniques