Attacks: Replay Attack

This lesson discusses the replay attack specific to the Kerberos protocol.

We'll cover the following...

Another attack Kerberos is prone to is known as the replay attack. An attacker monitors the network and makes a copy of the messages between the KDC and the client as they are being exchanged. The copied message can then be replayed back to KDC by the attacker at a later time. For instance, say Laila, after receiving the TGT from the Authentication Server, requests for a service ticket to talk to a file server from where she intends to download a file. The attacker quietly makes a copy of the service ticket the TGS sends to Laila for communicating ...