Figure 8.22 The attacker’s view of a session hijacking attack using Hunt