web page clickjacking

Disclaimer: This article is a blogger original article, shall not be reproduced without the bloggers allowed. https://blog.csdn.net/qq1124794084/article/details/84072580

Today saw a google of clickjacking vulnerabilities to gain 7500 US knife, connected as follows

https://apapedulimu.click/clickjacking-on-google-myaccount-worth-7500/

 

Clickjacking vulnerabilities, using the UI overlay, spoofing vulnerabilities visual for fishing.

Learn freebuff clickjacking can refer to the article "On the clickjacking attack"

https://www.freebuf.com/articles/web/67843.html

Clickjacking test method is very simple, the page inserted iframe tag, the display is able to successfully hijack success.

Such as: test hijacking page http://127.0.0.1/cj/index.html

Test poc

<html><iframe src="http://127.0.0.1/cj/index.html"></iframe></html>

This time access test poc

This result appears to indicate the page is hijacked our success.

Now generally write scripts to automate testing time will be concerned about whether to return the response headers have X-FRAME-OPTIONS, because this is a better way to solve the click hijacking. Then there may be the response headers clickjacking does not exist

http://127.0.0.1/cj/index.html we add X-FRAME-OPTIONS try the test results

This not a hijack.

Guess you like

Origin blog.csdn.net/qq1124794084/article/details/84072580