Description
Adversaries may search and gather information about victims from closed sources that can be used during targeting.
Sub-techniques
Specific variations of this technique
MOT1597.301Mobile Network Operator Sources
2G
3G
4G
5G-SA
The adversary may gather information about the mobile network operator to be used in initial access or for preparation of the attack.
MOT1597.302Telecom Equipment Vendor Documentation
2G
3G
4G
5G-SA
The adversary may gather information from telecom equipment vendor documentation, including default credentials, API specifications, and known vulnerabilities.
Related Software
Software tools associated with this technique
No related software found
Network Generations
Mobile network generations this technique applies to
2G
Used
3G
Used
4G
Used
5G-SA
Used
5G-NSA
Not Applicable