Clickjacking
Clickjacking is an attack that tricks a user into clicking a webpage element which is invisible or disguised as another element. This can cause users to unwittingly download malware, visit malicious web pages, provide credentials or sensitive information, transfer money, or purchase products online.
https://swisskyrepo.github.io/PayloadsAllTheThings/Clickjacking/
X-Frame-Options and Content Security Policy (CSP) are used to prevent this type of attacks. Identify them in Fingerprinting section.
- XSS + Clickjacking
If you have identified an XSS attack that requires a user to click on some element to trigger the XSS and the page is vulnerable to clickjacking, you could abuse it to trick the user into clicking the button/link.
- Burp Clickbandit
Test all the clickable parameters of the target website to determine if clickjacking is posible.
To set up the tool:
Intercept > Open browser
Burp menu > Burp Clickbandit
Copy Clickbandit to clipboard
Open burp browser, visit the victim, then, open developer tools
Paste the Clickbandit script into the developer console, and press enter.
Now, to run the attack:
Click Start
Click around the site, mimicking the actions that a victim user might perform.
Click Finish
To avoid frame busters, select Sandbox iframe. This adds the sandbox attribute to the iframe.
Last updated