Figure 8.19  A network-based session hijacking scenario