-
Notifications
You must be signed in to change notification settings - Fork 0
/
accuknox_support.yaml
139 lines (138 loc) · 4.55 KB
/
accuknox_support.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
techniques:
MNO Roaming Partners : no
Implant Internal Image : no
Bypass home routing : no
Bid down UE : no
Internal resource search : no
Network Function Service Discovery : no
Network Flow Manipulation : no
'Controller ' : no
vSwitch : no
Manipulate Virtual Network Function (VNF) Configuration : no
Escape to Host : yes
Memory Scraping : no
Application Layer Protocol : no
Local Accounts : no
Rootkit : no
Unauthorized software in NFVI : no
Service Exhaustion Flood : no
Registration of malicious network functions : no
Radio Jamming : no
'Redirection of traffic via user plane network function ' : no
Fraudulent AMF registration for UE in UDM : no
Unauthorized access to Network Exposure Function (NEF) via token fraud : no
5G-GUTI reuse : no
Radio Interface : no
Tunnel Endpoint ID (TEID) uniqueness failure : no
Remote Services : no
Supply Chain Compromise : no
Software Deployment Tools : no
Cloud Accounts : no
Malicious VNF Instantiation : no
Accessing Terminated VNF : no
Shared resource discovery : no
Malicious privileged container VNF Shared Resource Access : no
Malicious co-tenancy exploit of NFVI (Network Slice) : no
Network Slice infrastructure resource hijacking : no
Network Slice application resource hijacking : no
Network Sniffing : no
Traffic Duplication : no
Hardware Security Module Key Signing : no
Device Database Manipulation : no
Flooding of core network component : no
Abuse of Inter-operator Interfaces : no
Remote System Discovery : no
Network Service Discovery : no
Network Boundary Bridging : no
Vandalism of Network Infrastructure : no
Cabling and junction boxes : no
Radio Access Hardware : no
Edge servers : no
Theft of Assets : no
Core Network Function Signaling : no
'Roaming and Interconnection ' : no
Subscriber Profile Identifier Discovery : no
Intercept Home Network via SUCI : no
Intercept bid-down SUPI : no
Passive radio signals observation : no
Self Location Measurement : no
Radio interface : no
Consume data allocation to deny or degrade service : no
Trigger fraud alert to deny service : no
Alter Subscriber Profile : no
Spoof network slice identifier : no
'Discover network slice identifier ' : no
Falsify interconnect invoice : no
SIM cloning : no
'Non-SBI ' : no
Transmitted Data Manipulation : no
Locate UE : no
Shared Network Function in slice : no
'Service Based Interface ' : no
DOS a UE via gNB or NF signaling : no
Retrieve UE subscription data : no
Charging fraud via NF control : no
SIM Credential Theft : no
Network-side SMS collection : no
'Charging Data Record (CDR) collection ' : no
NAS Exploit : no
gNodeB Component Manipulation : no
RAN Intelligent Controller (RIC) : no
xApp : no
rApp : no
Obtain subscriber identifier via NF : no
Protocol Tunneling : no
False Base Station or Access Point : no
Weaken Integrity : no
Exploit Public-Facing Application : no
Endpoint Denial of Service : no
Obtain Capabilities : no
Programable UE devices : no
Configurability of Fake Base Station or Access Point : no
Shared slice common control network function resource exhaustion : no
Exfiltration Over Unencrypted Non-C2 Protocol : no
Exfiltration Over Alternative Protocol : no
Acquire Infrastructure : no
Network Interfaces : no
Compromise Service Supply Chain : no
Intercept unencrypted SUPI : no
Exploit Semi-public Facing Application : no
Over-the-Air Input : no
Baseband API : no
Exploits : no
Operator Network : no
Network Access : no
UE Access via GTP-U : no
Discover TEID : no
UE DoS to AMF : no
GTP-U Abuse : no
Diameter signaling : no
Radio control manipulation via rogue xApps : no
IAB Denial of Service : no
Develop Capabilities : no
Stage Capabilities : no
Configure Operator Core Network : no
Silent SMS : no
Silent or spoofed paging : no
Alter ML Model : no
AI/ML training data and prediction poisoning : no
Compromise Software Supply Chain : no
Compromise Hardware Supply Chain : no
Hardware Additions : no
Tool : no
' Radio Network Functions' : no
Transmit Spoofed Broadcast Message : no
'Covert Exfiltration of Data Via DNS Request ' : no
Trusted Relationship : no
Impair Defenses : no
Gather Victim Host Information : no
Valid Accounts : no
Pre-OS Boot : no
Weaken Encryption : no
Container Administration Command : no
Automated Exfiltration : no
Credentials from Password Stores : no
Network Denial of Service : no
Adversary-in-the-Middle : no
Data Manipulation : no
Exploitation for Client Execution : no