This page (revision-1) was last changed on 29-Nov-2024 16:16 by UnknownAuthor

Only authorized users are allowed to rename pages.

Only authorized users are allowed to delete pages.

Page revision history

Version Date Modified Size Author Changes ... Change note

Page References

Incoming links Outgoing links

Version management

Difference between version and

At line 1 added 9 lines
!!! Overview
[{$pagename}] (also known as playback [exploit]) is a form of network [exploit] in which a valid data transmission is maliciously or fraudulently repeated or delayed. [{$pagename}] is carried out either by the originator or by an [Attacker] who __intercepts__ the data and re-transmits it, possibly as part of a masquerade attack by [IP] packet substitution.
!! [Use case]
Suppose [Alice] wants to prove her identity to [Bob]. [Bob] requests her [password] as [proof of identity|Authentication], which [Alice] dutifully provides (possibly after some transformation like a hash function); meanwhile, [Eve] is eavesdropping on the conversation and keeps the [password] (or the hash). After the interchange is over, [Eve] (posing as [Alice]) connects to [Bob]; when asked for a [proof of identity|Authentication], [Eve] sends [Alice]'s password (or hash) read from the last session, which [Bob] accepts thus granting access to [Eve].
!! More Information
There might be more information for this subject on one of the following:
[{ReferringPagesPlugin before='*' after='\n' }]