Which of the following techniques is used to compromise session IDs, with an attacker intruding into an existing connection between systems and attempting to intercept the messages being transmitted?
a) Spoofing
b) Cross-site scripting
c) Session hijacking
d) SQL injection