Description
Adversaries may build capabilities that can be used during targeting.
Sub-techniques
Specific variations of this technique
MOT1587.301Mobile Network Tool
2G
3G
4G
5G-SA
Adversary develops special tools for mobile networks that carry out and deliver mobile network targeted exploits.
MOT1587.302Protocol Fuzzing Tool
2G
3G
4G
5G-SA
Adversary develops protocol fuzzing tools to identify vulnerabilities in telecom protocols and interfaces.
MOT1587.303NFV/SDN Exploitation Tool
4G
5G-SA: Demonstrated
Adversary develops tools to exploit vulnerabilities in NFV/SDN components of modern telecom networks.
Related Software
Software tools associated with this technique
No related software found
Network Generations
Mobile network generations this technique applies to
2G
Used
3G
Used
4G
Used
5G-SA
Used
5G-NSA
Not Applicable