Replay Attack
mediumreplay-attack
Attacker captures and retransmits valid data transmissions to perform unauthorized actions
SpoofingTampering
MITRE ATT&CK techniques
| ID | Name | Tactic |
|---|---|---|
| T1557 | Adversary-in-the-Middle | Credential Access |
Common Weakness Enumeration
Mitigating controls
ctrl-replay-1- Implement request timestamps and nonces
ctrl-replay-2- Use short-lived tokens and session identifiers
ctrl-replay-3- Implement message sequence numbers
ctrl-replay-4- Use TLS to prevent packet capture