Session Hijacking ├── Concepts │ ├── Definition │ ├── Success Factors │ ├── Process │ ├── Packet Analysis │ ├── Types │ ├── OSI Model Relevance │ └── Spoofing vs. Hijacking ├── Session Hijacking Process │ ├── Tracking the Connection │ ├── Desynchronizing the Connection │ └── Injecting the Attacker's Packet ├── Packet Analysis of a Local Session Hijack ├── Types of Session Hijacking │ ├── Passive │ └── Active ├── Session Hijacking in OSI Model │ ├── Network-Level Hijacking │ └── Application-Level Hijacking ├── Spoofing vs. Hijacking └── Compromising Session IDs ├── Using Sniffing ├── Predicting Session Tokens ├── Using MITM Attack └── Using MITB Attack