Description: Session hijacking is a type of cyber attack in which an attacker takes control of a legitimate user’s session after the user has authenticated to a system. This attack relies on exploiting vulnerabilities in session management, where the attacker can steal or intercept the user’s session identifier (session ID). Once the attacker obtains this identifier, they can impersonate the user and access their data and resources, such as online accounts, social media, or corporate systems. The main characteristics of this type of attack include ease of execution, as it often does not require a high level of technical skill, and the ability to carry it out remotely. The relevance of session hijacking lies in its capacity to compromise information security and user privacy, which can result in financial losses and damage to the reputation of affected organizations. To mitigate this risk, it is recommended to implement security measures such as using HTTPS, expiring inactive sessions, and validating session tokens.