Description
The adversary can disguise its signalling messages in order to avoid detection and blocking of their attacks.
Sub-techniques
Specific variations of this technique
MOT3005.301Unexpected Encoding
2G
3G
4G
The adversary may use an unexpected encoding of the signalling message in order to bypass detection and any defences which may be in place.
MOT3005.302Protocol Field Manipulation
2G
3G
4G
5G-SA: Theoretical
The adversary may manipulate protocol fields in unexpected ways to bypass detection systems.
Related Software
Software tools associated with this technique
No related software found
Network Generations
Mobile network generations this technique applies to
2G
Used
3G
Used
4G
Used
5G-SA
Not Applicable
5G-NSA
Not Applicable