Watch this video on YouTube
Alex injects malicious data into intercepted messages within a TCP session where source routing is disabled. The attacker attempts to predict the responses from both the client and server. Which hijacking technique is exemplified in this case?