Search⌘ K
AI Features

Attacks: Replay Attack

Explore how replay attacks target the Kerberos authentication protocol by reusing copied tickets. Understand defenses such as time-based authenticators, address restrictions, and replay caches to recognize how Kerberos protects against these threats.

We'll cover the following...

Another attack Kerberos is prone to is known as the replay attack. An attacker monitors the network and makes a copy of the messages between the KDC and the client as they are being exchanged. The copied message can then be replayed back to KDC by the attacker at a later time. For instance, say Laila, after receiving the TGT from the Authentication Server, requests for a service ticket to talk to a file server from where she intends to download a file. The attacker quietly makes a copy of the service ticket the TGS sends to Laila for communicating ...