Replay Attacks – CompTIA Security+ SY0-401: 3.2

Even if the bad guys can’t hack into your system, they may be able to temporarily morph into something that looks exactly like you. In this video, you’ll learn how replay attacks can be used to gain inappropriate access to devices and how software developers can protect against replay attacks.