In this type of Man-in-the-Middle attack, packets and authentication tokens are captured using a sniffer.
However, host A can continue to receive data as long as the SYN sequence numbers of transmitted packets from host B are lower than the packet segment containing the set FIN flag.