Abstract
This chapter highlights the technique of password replay. It also describes that how password replay works and the dangers of password replay. The security used on the wireless network, wired equivalent privacy (WEP), is cracked using a variant of password replay, and then passwords are captured from the unencrypted network traffic. This allows the intruders to make their way along the TJX networks and copy out the contents of databases. Even better, they are able to install software at points in the network to “sniff” the unencrypted credit card data traveling the network. One way to capture passwords on a network is to capture and decode network packets. Password capture and replay is a significant, ongoing threat to the security of networks. Because traditional passwords and protocols that are susceptible to replay attacks are not going to go away any time soon, this represents a significant security risk.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.