Figure 8.22 The attacker’s view of a session hijacking
attack using Hunt