diff --git a/Clickjacking/Clickjacking.md b/Clickjacking/Clickjacking.md deleted file mode 100644 index 8503243..0000000 --- a/Clickjacking/Clickjacking.md +++ /dev/null @@ -1,96 +0,0 @@ -# Clickjacking: Web Application Security Vulnerability - -> Clickjacking is a type of web security vulnerability where a malicious website tricks a user into clicking on something different from what the user perceives, -> potentially causing the user to perform unintended actions without their knowledge or consent. Users are tricked into performing all sorts of unintended actions -> are such as typing in the password, clicking on ‘Delete my account’ button, liking a post, deleting a post, commenting on a blog. In other words all the actions -> that a normal user can do on a legitimate website can be done using clickjacking. - -## Summary -* [Tools](#tools) -* [Methodology](#methodology) - * [UI Redressing](#ui-redressing) - * [Invisible Frames](#invisible-frames) - * [Button/Form Hijacking](#button-form-hijacking) -* [Filter Bypasses](#filter-bypasses) -* [Practice Environments](#practice-environments) -* [Reference](#references) - -## Tools -* [Burp Suite](https://portswigger.net/burp) -* [OWASP ZAP](https://github.com/zaproxy/zaproxy) -* [Clickjack](https://github.com/machine1337/clickjack) - -## Methodology - -### UI Redressing -UI Redressing is a Clickjacking technique where an attacker overlays a transparent UI element on top of a legitimate website or application. -The transparent UI element contains malicious content or actions that are visually hidden from the user. By manipulating the transparency and positioning of elements, -the attacker can trick the user into interacting with the hidden content, believing they are interacting with the visible interface. -* **How UI Redressing Works:** - * Overlaying Transparent Element: The attacker creates a transparent HTML element (usually a `