Reconnaissance
MOT3020.303
Sub-technique

HTTP/2 Protocol Analysis

Public
5G-SA: Demonstrated
Description

Adversaries may analyze HTTP/2 protocol implementations to identify vulnerabilities in 5G service-based interfaces.

Network Generations
Mobile network generations this technique applies to
2G
Not Applicable
3G
Not Applicable
4G
Not Applicable
5G-SA
Demonstrated
5G-NSA
Not Applicable