From ce4affc79b783c4590803d649ab2ea2244adb23f Mon Sep 17 00:00:00 2001 From: Aadith Sukumar <62766172+aadi1011@users.noreply.github.com> Date: Mon, 9 Oct 2023 09:40:28 +0530 Subject: [PATCH] Update and rename Clickjacking.md to README.md --- Clickjacking/Clickjacking.md | 96 ---------------- Clickjacking/README.md | 207 +++++++++++++++++++++++++++++++++++ 2 files changed, 207 insertions(+), 96 deletions(-) delete mode 100644 Clickjacking/Clickjacking.md create mode 100644 Clickjacking/README.md diff --git a/Clickjacking/Clickjacking.md b/Clickjacking/Clickjacking.md deleted file mode 100644 index 8503243..0000000 --- a/Clickjacking/Clickjacking.md +++ /dev/null @@ -1,96 +0,0 @@ -# Clickjacking: Web Application Security Vulnerability - -> Clickjacking is a type of web security vulnerability where a malicious website tricks a user into clicking on something different from what the user perceives, -> potentially causing the user to perform unintended actions without their knowledge or consent. Users are tricked into performing all sorts of unintended actions -> are such as typing in the password, clicking on ‘Delete my account’ button, liking a post, deleting a post, commenting on a blog. In other words all the actions -> that a normal user can do on a legitimate website can be done using clickjacking. - -## Summary -* [Tools](#tools) -* [Methodology](#methodology) - * [UI Redressing](#ui-redressing) - * [Invisible Frames](#invisible-frames) - * [Button/Form Hijacking](#button-form-hijacking) -* [Filter Bypasses](#filter-bypasses) -* [Practice Environments](#practice-environments) -* [Reference](#references) - -## Tools -* [Burp Suite](https://portswigger.net/burp) -* [OWASP ZAP](https://github.com/zaproxy/zaproxy) -* [Clickjack](https://github.com/machine1337/clickjack) - -## Methodology - -### UI Redressing -UI Redressing is a Clickjacking technique where an attacker overlays a transparent UI element on top of a legitimate website or application. -The transparent UI element contains malicious content or actions that are visually hidden from the user. By manipulating the transparency and positioning of elements, -the attacker can trick the user into interacting with the hidden content, believing they are interacting with the visible interface. -* **How UI Redressing Works:** - * Overlaying Transparent Element: The attacker creates a transparent HTML element (usually a `