An attack in which an attacker listens passively to the authentication protocol to capture information that can be used in a subsequent active attack to masquerade as the claimant.
Source(s):
NIST SP 800-63-3
under Eavesdropping Attack
Type of attack in which an adversary uses a WiMAX traffic analyzer within the range of a BS or SS/MS to monitor WiMAX communications.
Source(s):
NIST SP 800-127
[Withdrawn]
An attack in which an Attacker listens passively to the authentication protocol to capture information which can be used in a subsequent active attack to masquerade as the Claimant.
Source(s):
NIST SP 800-63-2
[Superseded]
under Eavesdropping Attack