Description
Adversaries may sniff network traffic to capture information about an environment, including authentication material, base station configuration and user plane traffic passed over the network.
Sub-techniques
Specific variations of this technique
Related Software
Software tools associated with this technique
No related software found
Network Generations
Mobile network generations this technique applies to
2G
Used
3G
Used
4G
Demonstrated
5G-SA
Not Applicable
5G-NSA
Not Applicable