From bd42625b3216d6e8d2573fb51609eac0a69950ee Mon Sep 17 00:00:00 2001 From: Aadith Sukumar <62766172+aadi1011@users.noreply.github.com> Date: Sun, 8 Oct 2023 23:50:58 +0530 Subject: [PATCH 1/6] Create Clickjacking.md Added a directory to discuss clickjacking attacks --- Clickjacking/Clickjacking.md | 96 ++++++++++++++++++++++++++++++++++++ 1 file changed, 96 insertions(+) create mode 100644 Clickjacking/Clickjacking.md diff --git a/Clickjacking/Clickjacking.md b/Clickjacking/Clickjacking.md new file mode 100644 index 0000000000..850324311a --- /dev/null +++ b/Clickjacking/Clickjacking.md @@ -0,0 +1,96 @@ +# Clickjacking: Web Application Security Vulnerability + +> Clickjacking is a type of web security vulnerability where a malicious website tricks a user into clicking on something different from what the user perceives, +> potentially causing the user to perform unintended actions without their knowledge or consent. Users are tricked into performing all sorts of unintended actions +> are such as typing in the password, clicking on ‘Delete my account’ button, liking a post, deleting a post, commenting on a blog. In other words all the actions +> that a normal user can do on a legitimate website can be done using clickjacking. + +## Summary +* [Tools](#tools) +* [Methodology](#methodology) + * [UI Redressing](#ui-redressing) + * [Invisible Frames](#invisible-frames) + * [Button/Form Hijacking](#button-form-hijacking) +* [Filter Bypasses](#filter-bypasses) +* [Practice Environments](#practice-environments) +* [Reference](#references) + +## Tools +* [Burp Suite](https://portswigger.net/burp) +* [OWASP ZAP](https://github.com/zaproxy/zaproxy) +* [Clickjack](https://github.com/machine1337/clickjack) + +## Methodology + +### UI Redressing +UI Redressing is a Clickjacking technique where an attacker overlays a transparent UI element on top of a legitimate website or application. +The transparent UI element contains malicious content or actions that are visually hidden from the user. By manipulating the transparency and positioning of elements, +the attacker can trick the user into interacting with the hidden content, believing they are interacting with the visible interface. +* **How UI Redressing Works:** + * Overlaying Transparent Element: The attacker creates a transparent HTML element (usually a `