Piggyback attack is an active form of wiretapping. In fact the attacker gains access to a system via intervals of inactivity in another user’s legitimate connection. It is also called a “between the line attack” or "piggyback-entry wiretapping".
In security, piggybacking is actually when someone tags along with another person who is authorized to gain entry into a restricted area, or pass something. Here we apply that concept to computer networks or workstations.
References
Piggyback attack Wikipedia(Text) CC BY-SA