Learn Clickjacking 2.0 attack method

TipsMake.com - At the hacker conference - Black Hat Europe just ended in Barcelona, ​​the British security expert - Paul Stone demonstrated a completely new attack method of clickjacking attack .

Learn Clickjacking 2.0 attack method Picture 1 Clickjacking involves a web page that is prepared manually by automatically inserting an iFrame 'stealth' module under the action of the mouse cursor. When users work on a certain website, they are actually interacting with another website with components controlled through iFrame.

Stone's presentation does not limit the number of clicks, can fill in text and form values, read text that is being opened in the victim's browser or other source sites. At the same time, Stone also takes full advantage of the drag-and-drop capabilities, provided by the API, which are now available in most current browsers like Internet Explorer, Firefox, Chrome and Safari. In addition to "assigning" a victim to a controlled object, Stone also demonstrates the ability to "control" the user to drag any object, a text string from a window or a form. available on 1 'invisible' module.

This can be explained as follows, users log into a social page or a certain website, when opening a website from this source page through a built-in hidden frame, of course people use does not know this existence. In Stone's opinion, the policy of operating in the same source of browsers does not show much of the counter-action in this situation, and the components in that site will automatically be converted from any site to The site is built on the user's 'unintentional' action. Using this method, Stone can circumvent the restrictions to prevent tampering with similar requests to cross-site.

In contrast, the drag-and-drop feature is also used to copy content from the user's window to the attacker's work window. Also according to Stone, this can be used to access the website's HTML code, including ID functions or token identification strings. And through this mechanism, the attacker will easily insert other control functions.
Such attacks are becoming more sophisticated when Java and Javascript are embedded in the system. Also, according to Stone, Java's drag-and-drop API is more powerful than the browser. Taking advantage of this, attackers will divide and mark text as text by dragging and dropping content with a single click. When combining this feature with other attack methods via Javascript, it is possible to place drag and drop commands at any time, even if the mouse pointer has not moved to the location specified by the Java applet. or when the victim does not press and hold the left mouse button.

Besides, Java also supports faster form fill feature. Instead of waiting for each action to click on the victim, the attacker can complete the content form in a single operation. ' Spraying ', the brief method of this method, can work in Windows and Mac OS X platforms, but cannot be applied to Linux.

However, these types of attacks can be blocked by trusted web server systems, when sending the request with " X-FRAME-OPTIONS: DENY " to the header of a browser, any thing This will protect and allow the website to display in a single frame. However, only the latest browser versions such as Internet Explorer 8, Safari 4 and Chrome 2 are able to 'notice' this option, maybe Mozilla Firefox will be equipped with this feature for a while. time is not far away. Stone also points out that, for large or very large websites like facebook.com, googlemail.com and twitter.com, it has been able to fight clickjacking, but besides that, according to the reviews. Other security experts, mobile or smartphone versions of these browsers have also been optimized to the highest level to avoid the risk of clickjacking attacks.

Recently, Stone has provided tools to help developers understand more about the mechanism of clickjacking. This tool illustrates the full process and implementation modules of clickjacking attack mechanisms, including classic and modern ways.

4.5 ★ | 2 Vote

May be interested

  • What is PetitPotam Attack? How to overcome PetitPotam attackWhat is PetitPotam Attack? How to overcome PetitPotam attack
    petitpotam is a new attack method with the ability to take control of a domain controller and then take over the entire windows domain.
  • Learn about Gutmann data deletion methodLearn about Gutmann data deletion method
    the gutmann method is one of several software-based data sanitization methods, used in some file shredder and data destruction programs, to overwrite existing information on a hard drive or other storage device.
  • Method in HTTPMethod in HTTP
    the set of common methods for http / 1.1 is defined below and this set of settings can be expanded based on the requirements. these method names are case-sensitive and they must be used in uppercase.
  • Learn about SQL Injection and how to prevent itLearn about SQL Injection and how to prevent it
    sql injection is one of the types of web hacking by injecting sql query / command codes into input before transferring to the web application, you can login without a username and password, remote execution (remote execution), dump data and retrieve the root of sql server.
  • What is a Replay Attack?What is a Replay Attack?
    a replay attack occurs when a cybercriminal eavesdroves a communication over a secure network, intercepts it, then delays or resends the content, to get the recipient to do what the hacker wants.
  • What is Volumetric DDoS Attack?What is Volumetric DDoS Attack?
    volumetric ddos attack is designed to overwhelm internal network capacity with large volumes of malicious traffic. volumetric ddos attack is usually performed against a specific target
  • Do you know what is the preferred 'prey' of DDoS attack?Do you know what is the preferred 'prey' of DDoS attack?
    distributed denial of service (ddos) is a common method used by hackers to try to bring down a website.
  • Hacker white hat shows offensive and defensiveHacker white hat shows offensive and defensive
    in the morning of april 23, 2011 in hanoi, karrox international it academy held a meeting with the theme 'white hat hacker - attack & defense'.
  • Learn about Brute Force attackLearn about Brute Force attack
    brute force attack mechanism has its advantages. it can also be used to check network security and recover forgotten passwords.
  • Analysis of an attack (Part 3)Analysis of an attack (Part 3)
    in part 2 of this series, we have left all the necessary information required for an attack on the victim network. with that note, let's continue with a real attack. this attack follows the transmission of ecommerce