ECCouncil Exam Questions

What is this attack most appropriately called?

Matthew re-injects a captured wireless packet back onto the network. He does this hundreds of
times within a second. The packet is correctly encrypted and Matthew assumes it is an ARP
request packet. The wireless host responds with a stream of responses, all individually encrypted
with different IVs. What is this attack most appropriately called?

A.
Spoof attack

B.
Replay attack

C.
Injection attack

D.
Rebound attack

Explanation:
A replay attack is a form of network attack in which a valid data transmission is
maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an
adversary who intercepts the data and retransmits it,possibly as part of a masquerade attack by IP
packet substitution (such as stream cipher attack).