From bd32e77c242736ea67a71eccf188cdeebc20c42c Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Jes=C3=BAs=20Enrique=20Alcal=C3=A1=20Rojas?= Date: Tue, 27 Aug 2024 04:15:30 -0400 Subject: [PATCH] add content replay-attack@mIX8PsIGuwgPCGQZ6ok2H.md (#6798) * add content replay-attack@mIX8PsIGuwgPCGQZ6ok2H.md * Update src/data/roadmaps/cyber-security/content/replay-attack@mIX8PsIGuwgPCGQZ6ok2H.md new line --------- Co-authored-by: dsh --- .../content/replay-attack@mIX8PsIGuwgPCGQZ6ok2H.md | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/src/data/roadmaps/cyber-security/content/replay-attack@mIX8PsIGuwgPCGQZ6ok2H.md b/src/data/roadmaps/cyber-security/content/replay-attack@mIX8PsIGuwgPCGQZ6ok2H.md index e69de29bb..2fa0367c8 100644 --- a/src/data/roadmaps/cyber-security/content/replay-attack@mIX8PsIGuwgPCGQZ6ok2H.md +++ b/src/data/roadmaps/cyber-security/content/replay-attack@mIX8PsIGuwgPCGQZ6ok2H.md @@ -0,0 +1,8 @@ +# Replay Attack + +A Replay Attack is a type of network attack where an attacker intercepts and retransmits legitimate communication data, often with the aim of gaining unauthorized access to a system or performing unauthorized actions. In this attack, the attacker captures a valid data transmission and then "replays" it later, without needing to decrypt or alter the data, to trick the recipient into thinking it's a legitimate request. + +Visit the following resources to learn more: + +- [@article@What Is a Replay Attack?](https://usa.kaspersky.com/resource-center/definitions/replay-attack) +