Description

Cybersecurity threat involving the interception and retransmission of valid data transmissions to exploit systems.

Features

Limitations

Use Cases