Header always append X-Frame-Options
> DENY
>
> 4.2. FrameBusting JavaScript
>
> This method utilizes JavaScript to “bust” iframes. This is done by
> checking if the current web page is the top web page (not within a frame)
> and if the web page is currently not the top page, then it becomes the top
> page.
>
> The following example segment of code can be used to demonstrate this:
>
> if (top.location.hostname !=
> self.location.hostname){
> top.location.href = self.location.href;
> }
>
> It should be noted that recent techniques have found to be able to bypass
> this clickjacking prevention technique as seen in the whitepaper by web
> application security researcher Collin Jackson –
> http://www.collinjackson.com/research/xssauditor.pdf.
>
> 4.3.Unique URL request
>
> Similar to a CSRF nonce, this can be employed so attackers cannot deliver
> the attack URL easily.
>
> 4.4. CAPTCHAs
>
> Similar to the way it prevents attackers from spamming a web form, this
> can be used as an additional layer of verification on each transaction.
>
> 4.5. Element Randomization
>
> Generally it is possible to clickjack due to buttons and links being in a
> static area of the web page, allowing attackers to place invisible frames
> over them. A technique to prevent this from occurring is to randomize the
> links or buttons on load, thus preventing attackers from hard coding static
> iframes.
>
>
> Proof of concept:
>
> image.png
>
> EXPLOIT:
>
> the impact is high. This vulnerability can be linked to a multitude of
> attacks including keylogging and stealing user credentials.
>
> An example of an attack on a application could consist of sending out
> emails to authenticated users of the application. This would require either
> some amount of inside knowledge to target specific users. Alternatively,
> mass emails could be sent out in the hope one user logged in to the
> application responds. The email would contain an “interesting” link which
> directs the victim to a landing page displaying an advert.
>
>
>
> On the landing page is a “skip this ad” link that has a transparent iframe
> located over it (placed by the attacker). When the victim then clicks on
> the link, they will interact with the attacker’s malicious code.
>
> Further examples of clickjacking attacks can be seen occurring in the past
> on social media sites where victims are enticed into clicking links which
> spam their contacts as reported by the BBC News –
> http://www.bbc.co.uk/news/10224434.
>
> The clickjacking attack:
>
> The “clickjacking” attack allows an evil page to click on a “victim site”
> on behalf of the visitor.
>
> Many sites were hacked this way, including Twitter, Facebook, Paypal and
> other sites. They are all fixed, of course.
>
> The idea:
>
> The idea is very simple.
>
> Here’s how clickjacking was done with Facebook:
>
> A visitor is lured to the evil page. It doesn’t matter how.
> The page has a harmless-looking link on it (like “get rich now” or “click
> here, very funny”).
> Over that link the evil page positions a transparent
>
> Click here!
>
> Please authenticate to join the conversation.
Duplicate
🐞 Bugs
Tech Issues
Almost 2 years ago

Ahmed Chauhan
Get notified by email when there are changes.
Duplicate
🐞 Bugs
Tech Issues
Almost 2 years ago

Ahmed Chauhan
Get notified by email when there are changes.