diff --git a/index.html b/index.html new file mode 100644 index 0000000..5ff6990 --- /dev/null +++ b/index.html @@ -0,0 +1,38 @@ + +
+ + | Reconnaissance | + +Resource Development | + +Initial Access | + +Execution | + +Persistence | + +Privilege Escalation | + +Defense Evasion | + +Credential Access | + +Discovery | + +Lateral Movement | + +Collection | + +Command and Control | + +Exfiltration | + +Impact | + +Fraud | + + +
---|
Technique Name | +Accuknox Support | + + +
MNO Roaming Partners | +no + |
Unauthorized access to Network Exposure Function (NEF) via token fraud | +no + |
Supply Chain Compromise | +no + |
Cloud Accounts | +no + |
SIM Credential Theft | +no + |
Protocol Tunneling | +no + |
Exploit Public-Facing Application | +no + |
Compromise Service Supply Chain | +no + |
Exploit Semi-public Facing Application | +no + |
UE Access via GTP-U | +no + |
Radio control manipulation via rogue xApps | +no + |
Compromise Software Supply Chain | +no + |
Compromise Hardware Supply Chain | +no + |
Trusted Relationship | +no + |
Valid Accounts | +no + |
Technique Name | +Accuknox Support | + + +
Registration of malicious network functions | +no + |
Software Deployment Tools | +no + |
gNodeB Component Manipulation | +no + |
RAN Intelligent Controller (RIC) | +no + |
xApp | +no + |
rApp | +no + |
Over-the-Air Input | +no + |
Baseband API | +no + |
Exploitation for Client Execution | +no + |
Technique Name | +Accuknox Support | + + +
Implant Internal Image | +no + |
Local Accounts | +no + |
Unauthorized software in NFVI | +no + |
Cloud Accounts | +no + |
Valid Accounts | +no + |
Pre-OS Boot | +no + |
Technique Name | +Accuknox Support | + + +
Escape to Host | +yes + |
Cloud Accounts | +no + |
Malicious privileged container VNF Shared Resource Access | +no + |
Valid Accounts | +no + |
Technique Name | +Accuknox Support | + + +
Bypass home routing | +no + |
Bid down UE | +no + |
Manipulate Virtual Network Function (VNF) Configuration | +no + |
Rootkit | +no + |
Unauthorized software in NFVI | +no + |
Radio Interface | +no + |
Cloud Accounts | +no + |
Malicious co-tenancy exploit of NFVI (Network Slice) | +no + |
Network Slice infrastructure resource hijacking | +no + |
Network Boundary Bridging | +no + |
Spoof network slice identifier | +no + |
Weaken Integrity | +no + |
Radio Interface | +no + |
Network Interfaces | +no + |
Network Interfaces | +no + |
GTP-U Abuse | +no + |
Impair Defenses | +no + |
Valid Accounts | +no + |
Pre-OS Boot | +no + |
Weaken Encryption | +no + |
Technique Name | +Accuknox Support | + + +
Supply Chain Compromise | +no + |
Accessing Terminated VNF | +no + |
Network Sniffing | +no + |
Hardware Security Module Key Signing | +no + |
Roaming and Interconnection | +no + |
Radio interface | +no + |
SIM cloning | +no + |
Non-SBI | +no + |
Service Based Interface | +no + |
SIM Credential Theft | +no + |
Container Administration Command | +no + |
Credentials from Password Stores | +no + |
Adversary-in-the-Middle | +no + |
Technique Name | +Accuknox Support | + + +
Escape to Host | +yes + |
Unauthorized access to Network Exposure Function (NEF) via token fraud | +no + |
Remote Services | +no + |
Software Deployment Tools | +no + |
Radio control manipulation via rogue xApps | +no + |
Technique Name | +Accuknox Support | + + +
Traffic Duplication | +no + |
Protocol Tunneling | +no + |
Exfiltration Over Unencrypted Non-C2 Protocol | +no + |
Exfiltration Over Alternative Protocol | +no + |
Covert Exfiltration of Data Via DNS Request | +no + |
Automated Exfiltration | +no + |
Technique Name | +Accuknox Support | + + +
Application Layer Protocol | +no + |
Protocol Tunneling | +no + |
Exfiltration Over Alternative Protocol | +no + |
Covert Exfiltration of Data Via DNS Request | +no + |
Technique Name | +Accuknox Support | + + +
False Base Station or Access Point | +no + |
Obtain Capabilities | +no + |
Programable UE devices | +no + |
Configurability of Fake Base Station or Access Point | +no + |
Acquire Infrastructure | +no + |
Exploits | +no + |
Operator Network | +no + |
Network Access | +no + |
Develop Capabilities | +no + |
Stage Capabilities | +no + |
Configure Operator Core Network | +no + |
Tool | +no + |
Radio Network Functions | +no + |
Technique Name | +Accuknox Support | + + +
Internal resource search | +no + |
Gather Victim Host Information | +no + |
Technique Name | +Accuknox Support | + + +
Abuse of Inter-operator Interfaces | +no + |
Alter Subscriber Profile | +no + |
Falsify interconnect invoice | +no + |
SIM cloning | +no + |
Charging fraud via NF control | +no + |