Clickjacking
Last updated
Last updated
Clickjacking is a malicious technique of tricking a user into clicking on something different from what the user perceives, thus potentially revealing confidential information or allowing others to take control of their computer while clicking on seemingly innocuous objects, including web pages.
--
Just cover the target site by an overlay, like in follows. Or use Burp Suite's Clickbandit (Burp
-> Burp Clickbandit
).
To prefill form data, just try appending params via url (GET).
A common protection to avoid clickjacking is to try to detect, when a website is being framed.
This can potentially be bypassed by using HTML5's sandbox
iframe attribute, by specifing allow-forms
, but omittin allow-scripts
and allow-top-navigation
.
Sometimes you may be able to combine the attack with XSS, by e.g. providing an XSS exploit via prefilled form data.
Setting X-Frame-Options
header to deny
, sameorigin
or allow-from <website>
.
Using Content-Security-Policy: <policy>
header, where <policy>
should contain frame-ancestors
being set to none
, self
or frame-ancestors <website>
.