Prerrequisitos
The attacker must have knowledge of the target’s mobile phone number.
Habilidades requeridas
Open source and commercial tools are available for this attack.
Mitigaciones
Frequent changing of mobile number.
Debilidades relacionadas
| CWE-ID |
Nombre de la debilidad |
|
Insertion of Sensitive Information Into Sent Data The code transmits data to another actor, but a portion of the data includes sensitive information that should not be accessible to that actor. |
Referencias
REF-487
Location Leaks on the GSM Air Interface
Denis Foo Kune, John Koelndorfer, Nicholas Hopper, Yongdae Kim.
https://www-users.cs.umn.edu/~hoppernj/celluloc.pdf
Envío
| Nombre |
Organización |
Fecha |
Fecha de lanzamiento |
| CAPEC Content Team |
The MITRE Corporation |
2015-11-09 +00:00 |
|
Modificaciones
| Nombre |
Organización |
Fecha |
Comentario |
| CAPEC Content Team |
The MITRE Corporation |
2018-07-31 +00:00 |
Updated Attack_Motivation-Consequences, Description Summary, References |