Defense Evasion
MOT3005.302
Sub-technique

Protocol Field Manipulation

Public
2G
3G
4G
5G-SA: Theoretical
Description

The adversary may manipulate protocol fields in unexpected ways to bypass detection systems.

Related Software
Software tools associated with this technique

No related software found

Network Generations
Mobile network generations this technique applies to
2G
Used
3G
Used
4G
Used
5G-SA
Theoretical
5G-NSA
Not Applicable