Description
The adversaries may monitor radio interface traffic to passively collect information about the radio network configuration or about subscribers in close vicinity of the adversary.
Sub-techniques
Specific variations of this technique
MOT3001.301Broadcast Channel
2G
3G
4G
In mobile networks the adversary needs to obtain information about the cell configuration parameters that will be used to prepare for the next phase of an attack that is utilizing the radio interface.
MOT3001.302Control Channel
2G
3G
4G
5G-SA: Theoretical
Adversaries may monitor control channels to gather information about network configuration, subscriber activities, and potential vulnerabilities in signaling protocols.
Related Software
Software tools associated with this technique
No related software found
Network Generations
Mobile network generations this technique applies to
2G
Used
3G
Used
4G
Used
5G-SA
Not Applicable
5G-NSA
Not Applicable