Reconnaissance
MOT1597.301
Sub-technique

Mobile Network Operator Sources

Public
2G
3G
4G
5G-SA
Description

The adversary may gather information about the mobile network operator to be used in initial access or for preparation of the attack.

Related Software
Software tools associated with this technique

No related software found

Network Generations
Mobile network generations this technique applies to
2G
Used
3G
Used
4G
Used
5G-SA
Used
5G-NSA
Not Applicable