Dev Updates | Final StepsThis lesson discusses the replay attack specific to the Kerberos protocol. Get the complete Kerberos Course here. Another attack Kerberos is prone to is known as the replay attack. An attacker monitors the network and makes a copy of the messages between the KDC and the client as they are being exchanged. The copied message can then be replayed back to KDC by the attacker at a later time. For instance, say Laila, after receiving the TGT from the Authentication Server,...