Description
Adversaries may attempt to position themselves between two or more networked devices using an adversary-in-the-middle (AiTM) technique to support follow-on behaviors such as Network Sniffing.
Sub-techniques
Specific variations of this technique
MOT1557.301Radio Interface Authentication Relay
2G
3G
4G: Demonstrated
An adversary positions itself on the radio interface to capture information to and from the UE.
MOT1557.302Core Network Interface Relay
2G
3G
4G
5G-SA: Theoretical
An adversary positions itself between core network elements to intercept and relay signaling messages.
Related Software
Software tools associated with this technique
No related software found
Network Generations
Mobile network generations this technique applies to
2G
Used
3G
Used
4G
Used
5G-SA
Not Applicable
5G-NSA
Not Applicable