Different from a Session Hijack

Applications of Replay Attacks

Credential Replay Attack

Preventing Replay Attacks