O'Reilly logo

Kali Linux Wireless Penetration Testing Cookbook by Sean-Philip Oriyano

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Performing a data replay

Now let's take things up a notch by performing a follow-on attack to sniffing commonly known as a replay, or data replay. As the name suggests, information that is captured from the network is stored and then played back to the network device it was directed at. However, the attack can be much more dangerous if the right information is collected and little to no protective measures are used on the defensive side.

Information such as login credentials that could be captured during a victims' login process could simply be replayed at a server or another resource and access granted. This would be tremendously effective in environments where protocols that are not encrypted are in use.

In this recipe, we will perform ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required