Description
An adversary may query the Network Repository Function (NRF) to discover restricted Network Function (NF) services to further target that NF.
Sub-techniques
Specific variations of this technique
Related Software
Software tools associated with this technique
No related software found
Network Generations
Mobile network generations this technique applies to
2G
Not Applicable
3G
Not Applicable
4G
Not Applicable
5G-SA
Demonstrated
5G-NSA
Not Applicable