None
An attack where the Attacker obtains some data (typically by eavesdropping on an authentication protocol run or by penetrating a system and stealing security files) that he/she is able to analyze in a system of his/her own choosing.
Source(s):
NIST SP 800-63-3
NIST SP 800-63-2
under Off-line Attack
[Superseded]