An attacker uses a network sniffer to capture the packets of a transaction that adds $20 to a gift card.
The attacker then user a function of the sniffer to push those packets back onto the network again, adding another $20 to the gift card.
This can be done many times.
Which of the following describes this type of attack?
Click on the arrows to vote for the correct answer
A. B. C. D. E.C.
The type of attack described in the scenario is a replay attack, which is option C.
A replay attack involves an attacker intercepting a legitimate transaction between two parties, recording the transaction data (e.g., packets), and then replaying that data at a later time to the same or a different target system. The objective of a replay attack is to impersonate the original sender or gain unauthorized access to a system or resource.
In this scenario, the attacker used a network sniffer to capture the packets of a legitimate transaction that added $20 to a gift card. The attacker then used a function of the sniffer to push those packets back onto the network again, adding another $20 to the gift card. This process can be repeated many times, allowing the attacker to continuously add funds to the gift card.
The other answer options do not fit the scenario as well as the replay attack does: