1. User browses a web page (User -> Web server)
  2. Web server replies with requested page and sets a cookie on the user’s browser ( Web server -> User)
  3. Attacker steals cookie (Sniffing, XSS, phishing attack) (User -> Attacker)
  4. Attacker orders for product using modified cookie (Attacker -> Web server)
  5. Product is delivered to attacker’s address (Web server -> Attacker)