An intrusion technique whereby an attacker sends a command to an already existing connection between two machines, in order to wrest control of the connection away from the machine that initiated it with the goal of gaining access to a server while bypassing normal authentication measures.