Replay Attack - Example

Example

Suppose Alice wants to prove her identity to Bob. Bob requests her password as proof of identity, which Alice dutifully provides (possibly after some transformation like a hash function); meanwhile, Trudy is eavesdropping on the conversation and keeps the password (or the hash). After the interchange is over, Trudy (posing as Alice) connects to Bob; when asked for a proof of identity, Trudy sends Alice's password (or hash) read from the last session, which Bob accepts.

Read more about this topic:  Replay Attack

Famous quotes containing the word example:

    Our intellect is not the most subtle, the most powerful, the most appropriate, instrument for revealing the truth. It is life that, little by little, example by example, permits us to see that what is most important to our heart, or to our mind, is learned not by reasoning but through other agencies. Then it is that the intellect, observing their superiority, abdicates its control to them upon reasoned grounds and agrees to become their collaborator and lackey.
    Marcel Proust (1871–1922)