Replay Attack

medium

replay-attack

Attacker captures and retransmits valid data transmissions to perform unauthorized actions

SpoofingTampering

MITRE ATT&CK techniques

IDNameTactic
T1557 Adversary-in-the-Middle Credential Access

Common Weakness Enumeration

Mitigating controls

ctrl-replay-1
Implement request timestamps and nonces
ctrl-replay-2
Use short-lived tokens and session identifiers
ctrl-replay-3
Implement message sequence numbers
ctrl-replay-4
Use TLS to prevent packet capture

References