Which term describes an attack that uses a sniffer to capture traffic and then replay it to spoof communications?

Prepare for the Certified Ethical Hacker Version 11 Exam. Study with comprehensive questions and explanations. Equip yourself with the skills needed for success!

Multiple Choice

Which term describes an attack that uses a sniffer to capture traffic and then replay it to spoof communications?

Explanation:
A replay attack happens when an attacker captures legitimate network traffic and then retransmits those exact messages to trick the recipient into believing the communication is fresh and legitimate. By using a sniffer, the attacker can record credentials, session tokens, or command frames, and later replay them to gain access or impersonate a legitimate party. If the protocol lacks protections like nonces, timestamps, or proper session binding, the replayed data will be accepted, enabling unauthorized actions. Defenses include ensuring each message is fresh (nonces or timestamps), binding messages to a specific session, and using secure protocols like TLS with proper anti-replay measures. The other terms describe different activities or technologies rather than the behavior of capturing and reissuing old traffic to spoof communications.

A replay attack happens when an attacker captures legitimate network traffic and then retransmits those exact messages to trick the recipient into believing the communication is fresh and legitimate. By using a sniffer, the attacker can record credentials, session tokens, or command frames, and later replay them to gain access or impersonate a legitimate party. If the protocol lacks protections like nonces, timestamps, or proper session binding, the replayed data will be accepted, enabling unauthorized actions. Defenses include ensuring each message is fresh (nonces or timestamps), binding messages to a specific session, and using secure protocols like TLS with proper anti-replay measures. The other terms describe different activities or technologies rather than the behavior of capturing and reissuing old traffic to spoof communications.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy