Spoofing Vs Hijacking
Types of session hijacking
TCP/IP concepts
Performing Sequence prediction
ACK Storms
Session Hijacking Tools