Description
Adversaries may exploit software vulnerabilities in an attempt to collect credentials.
Sub-techniques
Specific variations of this technique
MOT1212.301Exploit Authentication Function
4G
5G-SA: Theoretical
Adversaries may exploit vulnerabilities in authentication functions to collect credentials.
MOT1212.302Exploit Management Interface
2G
3G
4G
5G-SA: Demonstrated
Adversaries may exploit vulnerabilities in management interfaces to collect administrative credentials.
Related Software
Software tools associated with this technique
No related software found
Network Generations
Mobile network generations this technique applies to
2G
Not Applicable
3G
Not Applicable
4G
Not Applicable
5G-SA
Used
5G-NSA
Not Applicable