Fill in the blank with the appropriate name of the attack.
______ takes best advantage of an existing authenticated connection
session hijacking
Submit