Jump to content

Active attack: Difference between revisions

From Hackerpedia
imported>Unknown user
No edit summary
imported>Unknown user
No edit summary
 
(One intermediate revision by the same user not shown)
(No difference)

Latest revision as of 00:24, 20 January 2026

Languages: English | Français

Active attack

An attack on a secure communication protocol where the attacker transmits data to the claimant, Credential Service Provider (CSP), verifier, or Relying Party (RP). Examples of active attacks include man-in- the middle (MitM), impersonation, and session hijacking. [NIST SP 800-63-3, adapted]


Source: NIST | Category: