Description
Adversaries may analyze telecom network protocols to identify vulnerabilities, misconfigurations, or opportunities for exploitation.
Sub-techniques
Specific variations of this technique
MOT3020.301SIP Protocol Analysis
4G
5G-SA: Demonstrated
Adversaries may analyze SIP protocol implementations to identify vulnerabilities in VoIP and IMS systems.
MOT3020.302Diameter Protocol Analysis
4G
5G-SA: Demonstrated
Adversaries may analyze Diameter protocol implementations to identify vulnerabilities in 4G and 5G core networks.
MOT3020.303HTTP/2 Protocol Analysis
5G-SA: Demonstrated
Adversaries may analyze HTTP/2 protocol implementations to identify vulnerabilities in 5G service-based interfaces.
Related Software
Software tools associated with this technique
No related software found
Network Generations
Mobile network generations this technique applies to
2G
Used
3G
Used
4G
Used
5G-SA
Demonstrated
5G-NSA
Not Applicable