Session Hijacking (1)
Allows an attacker to steal, share, terminate, monitor and log any terminal session that is in progress
Session stolen across the network
HUNT, session hijacking tool written in November 1998: http://www.rootshell.com allows insertion of commands or takeover of session
What can be hijacked: telnet, rlogin, rsh, ftp