hijacking

The control of a connection taken by the attacker after the user authentication has been established.