nimbus icon indicating copy to clipboard operation
nimbus copied to clipboard

Intent driven security automation framework

Results 120 nimbus issues
Sort by recently updated
recently updated
newest added

Techniques: 1. Radio control manipulation via rogue xApps 2. Software Deployment Tools 3. Manipulate Virtual Network Function (VNF) Configuration

Intent
tactic: initialAccess

Techniques: 1. Exploit Public-Facing Application 2. Exploit Semi Public-Facing Application

Intent
tactic: initialAccess

Techniques: 1. Supply Chain Compromise 2. Radio control manipulation via rogue xApps 3. Software Deployment Tools 4. gNodeB Component Manipulation 5. Implant Internal Image 6. Rootkit Intent is implemented by...

Intent
tactic: initialAccess

Techniques: 1. Unauthorized access to Network Exposure Function (NEF) via token fraud 2. Radio control manipulation via rogue xApps 3. Impair Defenses 4. Network Sniffing 5. Adversary-in-the-Middle 6. Acquire Infrastructure

Intent
tactic: initialAccess

Techniques: 1. Obtain Capabilities 2. Develop Capabilities

Intent

Techniques: 1. Container Administration Command 2. Adversary-in-the-Middle

Intent