The process of listening in to an interactive session on a network, cancelling the log out issued by the user, and continuing the session masquerading as the user. It is also known as a piggy back attack. It is usually carried out for criminal reasons.