clickjacking

Clickjacking (UI redressing)

clickjacking
Content

๐Ÿ“š What Is Clickjacking (UI redressing) ?

โš” Clickjacking Attack Example

๐Ÿ”Ž How To Find

๐Ÿ›  Tools

๐Ÿ›บ Clickjacking mitigation

๐Ÿ“• Referance

๐Ÿ”ฌ Labs


๐Ÿ“š What Is Clickjacking (UI redressing)?

Clickjacking is an attack that tricks a user into clicking a webpage element that is invisible or disguised as another element.

This can cause users to unwittingly download malware, visit malicious web pages, provide credentials or sensitive information, transfer money, or purchase products online.

Clickjacking is performed by displaying an invisible page or HTML element, inside an iframe, on top of the page the user sees.

The user believes they are clicking the visible page but in fact, they are clicking an invisible element in the additional page transposed on top of it.

Clickjacking attacks use CSS to create and manipulate layers.

The attacker incorporates the target website as an iframe layer overlaid on the decoy website. An example using the style tag and parameters is as follows:

Basic Payload


โš” Clickjacking Attack Example

  1. The attacker creates an attractive page that promises to give the user a free trip to Tahiti.

  2. In the background, the attacker checks if the user is logged into his banking site and if so, loads the screen that enables transfer of funds, using query parameters to insert the attackerโ€™s bank details into the form.

  3. The bank transfer page is displayed in an invisible iframe above the free gift page, with the โ€œConfirm Transferโ€ button exactly aligned over the โ€œReceive Giftโ€ button visible to the user.

  4. The user visits the page and clicks the โ€œBook My Free Tripโ€ button.

  5. In reality, the user is clicking on the invisible iframe and has clicked the โ€œConfirm Transferโ€ button. Funds are transferred to the attacker.

  6. The user is redirected to a page with information about the free gift (not knowing what happened in the background).


๐Ÿ”Ž How To Find?

Find clickjacking vulnerabilities using Burp Suiteโ€™s web vulnerability scanner

There are many browsers extensions that inform you when the page is vulnerable to Clickjacking

A basic way to test if your site is vulnerable to clickjacking is to create an HTML page and attempt to include a sensitive page from your website in an iframe. It is important to execute the test code on another web server because this is the typical behavior in a clickjacking attack.

View the HTML page in a browser and evaluate the page as follows:

  • If the text โ€œWebsite is vulnerable to clickjackingโ€ appears and below it, you see the content of your sensitive page, the page is vulnerable to clickjacking. โœ…

  • If only the text โ€œWebsite is vulnerable to clickjackingโ€ appears, and you do not see the content of your sensitive page, the page is not vulnerable to the simplest form of clickjacking. โŒ


๐Ÿ›  Tools

Burp Clickbandit is a tool for generating clickjacking attacks. When you have found a web page that may be vulnerable to clickjacking, you can use Burp Clickbandit to create an attack and confirm that the vulnerability can be successfully exploited.


โš™ Clickjacking mitigation

There are three main mechanisms that can be used to defend against Clickjacking:

  1. Preventing the browser from loading the page in the frame using the X-Frame-Options or Content Security Policy (frame-ancestors) HTTP headers.

  2. Properly setting authentication cookies with SameSite=Strict (or Lax), unless they explicitly need None (which is rare).

  3. Implementing JavaScript code in the page to attempt to prevent it from being loaded in a frame (known as a โ€œframe-busterโ€).


  1. X-Frame-Options header There are three values allowed:

    1. DENY โ€“ does not allow any domain to display this page within a frame

    2. SAMEORIGIN โ€“ allows the current page to be displayed in a frame on another page, but only within the current domain

    3. ALLOW-FROM URI โ€“ allows the current page to be displayed in a frame, but only in a specific URI โ€“ for example, www.example.com/frame-page

  2. Content Security Policy (CSP)

    Content Security Policy (CSP) is a detection and prevention mechanism that provides mitigation against attacks such as XSS and clickjacking. CSP is usually implemented in the web server as a return header of the form:

    The recommended clickjacking protection is to incorporate the frame-ancestors directive in the applicationโ€™s Content Security Policy:

    1. The frame-ancestors โ€˜noneโ€™ directive is similar in behavior to the X-Frame-Options deny directive.

    2. The frame-ancestors โ€˜selfโ€™ directive is broadly equivalent to the X-Frame-Options sameorigin directive. The following CSP whitelists frames to the same domain only:

    3. Alternatively, framing can be restricted to named sites:

      Equivalent to the


๐Ÿ“• Reference

Portswigger

OWASP

Hacktricks

Imperva

clickbandit


๐Ÿ”ฌ Labs

portswigger

OWASP Broken Web Applications Project Install this Machine and will have a lot of Labs like DVWA, BWAPP, and Webgoat, etc

Last updated