Figure 8.19
A network-based session hijacking
scenario