Description
The adversary may access the target network by exploiting signalling (i.e. control plane) protocols.
Sub-techniques
Specific variations of this technique
MOT3003.301SS7 Protocol
2G
3G
The adversary may access the target network by using SS7 protocol.
MOT3003.302Diameter Protocol
4G
The adversary may access the target network by using Diameter protocol.
MOT3003.303HTTPS/2 Protocol
5G-SA: Demonstrated
The adversary may access the target network by using HTTPS/2 protocol.
MOT3003.304GTP Protocol
3G
4G
5G-SA: Theoretical
The adversary may access the target network by exploiting vulnerabilities in the GPRS Tunneling Protocol (GTP).
Related Software
Software tools associated with this technique
No related software found
Network Generations
Mobile network generations this technique applies to
2G
Used
3G
Used
4G
Used
5G-SA
Demonstrated
5G-NSA
Not Applicable