Replay Attack
A replay attack occurs when an attacker intercepts a legitimate data transmission and retransmits it at a later time to trick a system into accepting it as valid. The attacker does not need to understand or decrypt the contents of the message; simply resending a captured transmission may be sufficient to authenticate or authorize fraudulent actions. Defenses rely on mechanisms that allow a receiving system to detect that a message has already been processed or is no longer valid.
In a replay attack, an adversary captures a previously authenticated message or credential artifact exchanged between a legitimate claimant and a verifier, then retransmits that artifact to gain unauthorized access or repeat a fraudulent transaction. Because the retransmitted data was originally valid, systems that lack replay-resistance controls may accept it without challenge. Notably, replay attacks can succeed even when transmitted data is encrypted, provided the receiving application does not enforce per-message uniqueness or temporal validity checks at the application layer. Protocol-layer anti-replay mechanisms, such as the sequence number and MAC controls embedded in TLS record layer or IPsec anti-replay windows, typically prevent ciphertext-level packet replay at the transport layer. Replay attacks against application protocols therefore generally involve the reuse of application-layer artifacts, such as session tokens, cookies, or authentication assertions, within a new or separate session context rather than blind retransmission of raw ciphertext packets. Common mitigations include the use of nonces, timestamps with bounded validity windows, sequence numbers enforced at the application layer, and short-lived cryptographic tokens that a verifier can mark as consumed after first use.
Why it matters
Replay attacks are significant because they allow an attacker to gain unauthorized access or repeat fraudulent transactions without needing to crack encryption or understand message contents. A captured authentication token, session cookie, or signed assertion may be sufficient on its own to impersonate a legitimate user or re-execute a sensitive operation, such as a funds transfer or an access grant, if the receiving system does not enforce per-message uniqueness or temporal validity. This makes replay attacks a practical threat even in environments where communications are encrypted at the transport layer, because the attack typically targets application-layer artifacts rather than attempting to tamper with ciphertext packets directly.
Who it's relevant to
Inside Replay Attack
Common questions
Answers to the questions practitioners most commonly ask about Replay Attack.