Watch this video on YouTube
In which of the following session hijacking phases does an attacker break the connection to a victim’s machine with knowledge of the next sequence number (NSN)?