Reconnaissance
MOT1597.302
Sub-technique

Telecom Equipment Vendor Documentation

Public
2G
3G
4G
5G-SA
Description

The adversary may gather information from telecom equipment vendor documentation, including default credentials, API specifications, and known vulnerabilities.

Related Software
Software tools associated with this technique

No related software found

Network Generations
Mobile network generations this technique applies to
2G
Used
3G
Used
4G
Used
5G-SA
Used
5G-NSA
Not Applicable