Defense Evasion
MOT3029.302
Sub-technique

Protocol Tunneling

Public
4G
5G-SA: Demonstrated
Description

Adversaries may tunnel malicious traffic through legitimate protocols to avoid detection.

Related Software
Software tools associated with this technique

No related software found

Network Generations
Mobile network generations this technique applies to
2G
Not Applicable
3G
Not Applicable
4G
Used
5G-SA
Demonstrated
5G-NSA
Not Applicable