T 5.24 Replay of messages

Within the framework of this attack, attackers record a message and restore this information at a later point in time unchanged.

Examples: