Section 19.182 Replay Attacks Flashcards

Objective 2.4 Given a scenario, you must be able to analyse indicators of malicious activity

1
Q

Replay Attacks

A

Type of network-based attack where valid data transmissions are maliciously or fraudulently re-broadcast, repeated, or delayed

■ Involves intercepting data, analysing it, and deciding whether to retransmit it later

Example Let’s say an attacker’s able to capture the session that occurs when you log into your bank
with your username and password. Now, they could then replay that session to the bank at a later time and attempt to log in as you. This is the basic premise of a replay attack. And then reuse them to gain unauthorized access to the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Credential Replay Attack

A

Specific type of replay attack that Involves capturing a user’s login credentials during a session and reusing them for unauthorised access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Different from a Session Hijack

Session Hijack

A

● In a Session Hijack, the attacker alters real-time data transmission

● In a Replay Attack, the attacker intercepts the data and then can decide
later whether to retransmit the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Applications of Replay Attacks

A

Not limited to banking; can occur in various network transmissions

● Email
● Online shopping
● Social media

■ Common in wireless authentication attacks, especially with older encryption protocols like WEP (Wired Equivalent Privacy)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Preventing Replay Attacks

A

■ Use session tokens to uniquely identify authentication sessions

■ Session tokens are generated for each session, making it challenging for attackers to replay sessions

■ Implement multi-factor authentication to require additional authentication
factors, making replay more difficult

■ By using multi-factor authentication, attackers lack the necessary additional
information to replay login sessions

■ Implement security protocols like WPA3 (Wi-Fi Protected Access 3) to mitigate replay attack threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly