nimbus
nimbus copied to clipboard
For power optimisation use case, add actions in the respective Adapters
More details needed here..
- Software Deployment Tools
- Exploit Public-Facing Application
- Compromise Software Supply Chain
- Standard Application Layer Protocol
- Adversary-in-the-Middle
- Service Based Interface
- Transmitted Data Manipulation
- Network Boundary Bridging
- Weaken Encryption
- Container Administration Command
- Network Function Service Discovery
- Network Flow Manipulation
- DNS Manipulation
- Registration of malicious network functions
- Unauthorized access to Network Exposure Function (NEF) via token fraud
- Exploit Semi-public Facing Application
- gNodeB Component Manipulation
- Radio Intelligent Controller (RIC)
- Rogue xApps unauthorized access
- Escape to Host