diff --git a/Clickjacking/Clickjacking.md b/Clickjacking/Clickjacking.md new file mode 100644 index 0000000..8503243 --- /dev/null +++ b/Clickjacking/Clickjacking.md @@ -0,0 +1,96 @@ +# Clickjacking: Web Application Security Vulnerability + +> Clickjacking is a type of web security vulnerability where a malicious website tricks a user into clicking on something different from what the user perceives, +> potentially causing the user to perform unintended actions without their knowledge or consent. Users are tricked into performing all sorts of unintended actions +> are such as typing in the password, clicking on ‘Delete my account’ button, liking a post, deleting a post, commenting on a blog. In other words all the actions +> that a normal user can do on a legitimate website can be done using clickjacking. + +## Summary +* [Tools](#tools) +* [Methodology](#methodology) + * [UI Redressing](#ui-redressing) + * [Invisible Frames](#invisible-frames) + * [Button/Form Hijacking](#button-form-hijacking) +* [Filter Bypasses](#filter-bypasses) +* [Practice Environments](#practice-environments) +* [Reference](#references) + +## Tools +* [Burp Suite](https://portswigger.net/burp) +* [OWASP ZAP](https://github.com/zaproxy/zaproxy) +* [Clickjack](https://github.com/machine1337/clickjack) + +## Methodology + +### UI Redressing +UI Redressing is a Clickjacking technique where an attacker overlays a transparent UI element on top of a legitimate website or application. +The transparent UI element contains malicious content or actions that are visually hidden from the user. By manipulating the transparency and positioning of elements, +the attacker can trick the user into interacting with the hidden content, believing they are interacting with the visible interface. +* **How UI Redressing Works:** + * Overlaying Transparent Element: The attacker creates a transparent HTML element (usually a `