Description
Adversary develops tools to exploit vulnerabilities in NFV/SDN components of modern telecom networks.
Parent Technique
This sub-technique is part of a broader technique
Related Software
Software tools associated with this technique
Network Generations
Mobile network generations this technique applies to
2G
Not Applicable
3G
Not Applicable
4G
Used
5G-SA
Demonstrated
5G-NSA
Not Applicable