Description
Cybersecurity threat involving the interception and retransmission of valid data transmissions to exploit systems.
Features
- Intercepts legitimate network traffic
- Retransmits captured data
- Exploits authentication mechanisms
- Can bypass time-based security measures
- Applicable to various network protocols
Limitations
- Requires access to network traffic
- Effectiveness reduced by strong encryption
- Can be detected by sophisticated monitoring systems
- Limited usefulness against one-time authentication tokens
- May be prevented by proper session management
Use Cases
- Attacker replaying captured login credentials to gain unauthorized access to a financial system
- Malicious actor retransmitting intercepted API requests to repeatedly charge a victim's credit card
- Cybercriminal exploiting a smart home system by replaying commands to unlock doors or disable security alarms