Telecom Equipment Vendor Documentation
Sub-technique of:MOT1597: Search Closed Sources
Public
2G
3G
4G
5G-SA
Description
The adversary may gather information from telecom equipment vendor documentation, including default credentials, API specifications, and known vulnerabilities.
Parent Technique
This sub-technique is part of a broader technique
Related Software
Software tools associated with this technique
No related software found
Network Generations
Mobile network generations this technique applies to
2G
Used
3G
Used
4G
Used
5G-SA
Used
5G-NSA
Not Applicable