relay attack
topeltteesklus
olemus
rünne autentimisandmete saamiseks:
ründaja vahendab (traadita) sidet (Bluetooth, RFID),
teeseldes mõlemat suhtluspoolt;
on lihtsam ja passiivsem vahendusründest
(mis enamasti manipuleerib sõnumeid);
ei tarvitse teada edasisaadetavate andmete sisu
= attack to obtain authentication data: the attacker mediates (wireless) communication (Bluetooth, RFID), spoofing both sides of the communication; simpler and more passive than a man-in-the-middle attack (which mostly manipulates messages); does not require knowledge of the content of the data to be transferred
ülevaateid
https://en.wikipedia.org/wiki/Relay_attack
https://www.youtube.com/watch?v=_R2JVPJzufg
https://sites.uclouvain.be/security/download/slides/Avoine-2011-tarragona-slides.pdf
https://www.secureauth.com/blog/what-is-old-is-new-again-the-relay-attack/
https://www.comparitech.com/blog/information-security/what-is-relay-attack/
tõrje
https://murdoch.is/talks/ccc07relayattacks.pdf
https://file.scirp.org/pdf/_2013100710225622.pdf
https://pure.royalholloway.ac.uk/portal/files/27887119/main.pdf