#############################################################
# Application Name : İnternet Explorer 7
# Vulnerable Type : Clickjacking
# Author : UzmiX
#############################################################
< ------------------- header data end of ------------------- >
<html>
<body>
<div id="open"
阅读全文 »
Tags: Clickjacking,
IE7,
Vulnerability
来源:hackademix.net
Finally NoScript 1.8.2.1 is out, featuring the announced new anti-clickjacking countermeasures enabled by default, independent from IFRAME and plugin content blocking settings.
The most specific and ambitious is called ClearClick: whenever you click or otherwise interact, through your mouse or your keyboard, with an embedded element which is partially obstructed, transparent or otherwise disguised, NoScript prevents the interaction from completing and reveals you the real thing in “clear”. At that point you can evaluate if the click target was actually the intended one, and decide if keeping it locked or unlock it for free interaction. This comes quite handy now that more dangerous usages of clickjacking are being disclosed, such as enabling your microphone or your webcam behind your back to spy you through the interwebs.
阅读全文 »
Tags: Clickjacking,
NoScript
来源:ha.ckers.org
Today is the day we can finally start talking about clickjacking. This is just meant to be a quick post that you can use as a reference sheet. It is not a thorough advisory of every site/vendor/plugin that is vulnerable – there are far too many to count. Jeremiah and I got the final word today that it was fine to start talking about this due to the click jacking PoC against Flash that was released today (watch the video for a good demonstration) that essentially spilled the beans regarding several of the findings that were most concerning. Thankfully, Adobe has been working on this since we let them know, so despite the careless disclosure, much of the work to mitigate this on their end is already complete.
阅读全文 »
Tags: Clickjacking
作者:Monyer
昨天晚上Rsnake放出了clickjacking的Detail,今天大致看了下,这种攻击对于Flash来说,危险性是加倍的。想你不经意间的鼠标点击,你的摄像头就被控制了或者你的麦克风就被录音了,这是不是很恐怖?
阅读全文 »
Tags: Clickjacking
作者:Monyer
最初看到有Clickjacking这个东西还是在大风那里,被人说的玄天玄地的,也不知道到底是个怎么样的东西。今天又看到一个demo,也不知道是真是假。但如果是真的,那么Clickjacking应该是这样一个东西:
阅读全文 »
Tags: Clickjacking
作者:刺
刚从青海回来,看到了一些Clickjacking的文章和demo,如果demo正确的话。
Clickjacking跟XSIO原理差不多,不过这个是弄个iframe设置为透明,然后用style控制别的元素的位置(z-index),比如伪造一个button。
这样当伪造的button漂浮在透明的iframe上时候,让人点击button,实际上就是点击了iframe里的那个链接。
所以当iframe指向某个网站时候,就可以欺骗用户去点击该网站里链接,所以anti-CSRF常常使用的token也会变得无效,因为这是用户自己的行为。
阅读全文 »
Tags: Clickjacking
作者:刺
RSnake 和 Jeremiah Grossman 本来说因为Adobe的请求所以不去OWASP大会讲了,但是看来他们还是决定去讲一部分。从今天部分参加了OWASP的朋友的描述来看,ClickJacking大致是这么回事:
1. 表现为点击某个链接或button时,实际上是点击到别的地方去了(劫持链接)
2. 不一定需要javascript,所以noscript也挡不住,但是如果有javascript会让事情更简单
3. 攻击是基于DHTML的
4. 使用lynx浏览器的话,不会受到影响(因为这玩意太简陋了)
5. 需要攻击者一定程度上控制页面
6. 如果禁用iframe的话,可以防止跨域的clickjacking
7. 在一个flash游戏中点击的话(一般会有大量鼠标点击),效果会更好(估计adobe公司担心的这个?)
阅读全文 »
Tags: Clickjacking
新闻来源:zdnet.com (via cnBeta)
安全专家们最近发出警告,一个最新发现的跨浏览器攻击漏洞将带来非常可怕的安全问题,该漏洞影响所有主流桌面 平台,包括,IE, Firefox, Safari, Opera 以及 Adobe Flash。这个被称为 Clickjacking 的安全威胁,原本要在 OWASP NYC AppSec 2008 大会上公布,但包括 Adobe 在内的厂商请求暂时不要公开这个漏洞,直到他们开发出安全补丁。
发现这个漏洞的是两个安全研究专家,Robert Hansen 与 Jeremiah Grossman,他们已经略透露了一点相关信息以显示该安全威胁的严重性。
Clickjacking 到底是什么东西?
阅读全文 »
Tags: Clickjacking