Forum

  • By (Deleted User)

    I have a question about IV replay-attacks. In order for a replay-attack to be successful wouldn’t an attacker have to capture the entire session between the two end stations? Lets say the attacker wanted to change a financial companies customer data. The data the attacker wants to change is how much money the customers owe on their mortgage. The attacker wants to replay payment information sent over a non-secured wireless LAN. In order to start a session the attackers computer would have to go through the TCP handshake first in order to establish a session with the server before the attacking computer could then send the replay packets needed to change the customers data on the server. Any comments on this?

Page 1 of 1
  • 1