Just Google for session hijacking attacks. There's a wealth of information on the topic. It's a regular entry in OWASP top 10.
OWASP's page lists 3 more examples which it seems you omitted for some reason.