T 5.24 Replay of messages
Within the framework of this attack, attackers record a message and restore this information at a later point in time unchanged.
Examples:
- An attacker records the authentication data (e.g. user ID and password) during the login procedure of a user and uses this information in order to gain access to a system under a false identity (see also T 5.21 Trojan horses).
- In order to cause financial damage to the employer (government agency or company), an employee places an approved order several times.