1.1.12a Client Hijacking Attacks Click here to review the PDF notes. Click here for your Quiz. Be sure to drop off your google doc into google classroom.