An attack in which an attacker listens passively to the authentication protocol to capture information that can be used in a subsequent active attack to masquerade as the claimant.
						                            Source(s):
						                            
								                            
                                                                
                                                                    NIST SP 800-63-3
                                                                
                                                                										                             under Eavesdropping Attack 
                                                                                                                                
									                            
						                            
						                            
						                        
					                            
						                              Type of attack in which an adversary uses a WiMAX traffic analyzer within the range of a BS or SS/MS to monitor WiMAX communications.
						                            Source(s):
						                            
								                            
                                                                
                                                                    NIST SP 800-127
                                                                
										                             [Withdrawn]
                                                                                                                                                                                                
									                            
						                            
						                            
						                        
					                            
						                              An attack in which an Attacker listens passively to the authentication protocol to capture information which can be used in a subsequent active attack to masquerade as the Claimant.
						                            Source(s):
						                            
								                            
                                                                
                                                                    NIST SP 800-63-2
                                                                
										                             [Superseded]
                                                                										                             under Eavesdropping Attack