<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ajay</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ajay"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Ajay"/>
		<updated>2026-04-25T08:17:54Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Clickjacking&amp;diff=168175</id>
		<title>Clickjacking</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Clickjacking&amp;diff=168175"/>
				<updated>2014-02-16T07:44:37Z</updated>
		
		<summary type="html">&lt;p&gt;Ajay: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Clickjacking, also known as a &amp;quot;UI redress attack&amp;quot;, is when an attacker uses multiple transparent or opaque layers to trick a user into clicking on a button or link on another page when they were intending to click on the the top level page. Thus, the attacker is &amp;quot;hijacking&amp;quot; clicks meant for their page and routing them to other another page, most likely owned by another application, domain, or both.&lt;br /&gt;
&lt;br /&gt;
Using a similar technique, keystrokes can also be hijacked. With a carefully crafted combination of stylesheets, iframes, and text boxes, a user can be led to believe they are typing in the password to their email or bank account, but are instead typing into an invisible frame controlled by the attacker.&lt;br /&gt;
&lt;br /&gt;
=Examples=&lt;br /&gt;
&lt;br /&gt;
For example, imagine an attacker who builds a web site that has a button on it that says &amp;quot;click here for a free iPod&amp;quot;.  However, on top of that web page, the attacker has loaded an iframe with your mail account, and lined up exactly the &amp;quot;delete all messages&amp;quot; button directly on top of the &amp;quot;free iPod&amp;quot; button.  The victim tries to click on the &amp;quot;free iPod&amp;quot; button but instead actually clicked on the invisible &amp;quot;delete all messages&amp;quot; button.  In essence, the attacker has &amp;quot;hijacked&amp;quot; the user's click, hence the name &amp;quot;Clickjacking&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
One of the most notorious examples of Clickjacking was an attack against the [http://www.macromedia.com/support/documentation/en/flashplayer/help/settings_manager06.html Adobe Flash plugin settings page]. By loading this page into an invisible iframe, an attacker could trick a user into altering the security settings of Flash, giving permission for any Flash animation to utilize the computer's microphone and camera.&lt;br /&gt;
&lt;br /&gt;
Clickjacking also made the news in the form of a [http://shiflett.org/blog/2009/feb/twitter-dont-click-exploit Twitter worm]. This clickjacking attack convinced users to click on a button which caused them to re-tweet the location of the malicious page, and propagated massively.&lt;br /&gt;
&lt;br /&gt;
There has also been clickjacking attacks abusing Facebook's &amp;quot;Like&amp;quot; functionality. [http://threatpost.com/en_us/blogs/facebook-jacking-scams-expand-060310 Attackers can trick logged-in Facebook users to arbitrarily like fan pages, links, groups, etc]&lt;br /&gt;
&lt;br /&gt;
= Defending against Clickjacking =&lt;br /&gt;
There are two main ways to prevent clickjacking:&lt;br /&gt;
# Sending the proper browser response headers that instruct the browser to not allow framing from other domains&lt;br /&gt;
# Employing defensive code in the UI to ensure that the current frame is the most top level window&lt;br /&gt;
&lt;br /&gt;
For more information on Clickjacking defense, please see the the [[Clickjacking Defense Cheat Sheet]].&lt;br /&gt;
&lt;br /&gt;
= References =&lt;br /&gt;
* https://developer.mozilla.org/en-US/docs/The_X-FRAME-OPTIONS_response_header&lt;br /&gt;
: Mozilla developer resource on The X-Frame-Options response header.&lt;br /&gt;
&lt;br /&gt;
* [http://w2spconf.com/2010/papers/p27.pdf Busting Frame Busting: A study of clickjacking vulnerabilites on top sites]&lt;br /&gt;
: A study by the Stanford Web Security Group outlining problems with deployed frame busting code.&lt;br /&gt;
&lt;br /&gt;
* [http://www.sectheory.com/clickjacking.htm Clickjacking, Sec Theory]&lt;br /&gt;
: A paper by Robert Hansen defining the term, its implications against Flash at the time of writing, and a disclosure timeline.&lt;br /&gt;
&lt;br /&gt;
* [https://www.codemagi.com/blog/post/194 https://www.codemagi.com/blog/post/194] &lt;br /&gt;
: Framebreaking defense for legacy browsers that do not support X-Frame-Option headers.&lt;br /&gt;
&lt;br /&gt;
* [[ClickjackFilter_for_Java_EE|Anti-clickjacking J2EE filter]]&lt;br /&gt;
: A simple J2EE servlet filter that sends anti-framing headers to the browser.&lt;/div&gt;</summary>
		<author><name>Ajay</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Clickjacking&amp;diff=168174</id>
		<title>Clickjacking</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Clickjacking&amp;diff=168174"/>
				<updated>2014-02-16T07:39:53Z</updated>
		
		<summary type="html">&lt;p&gt;Ajay: add an example of apache configuration&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Clickjacking, also known as a &amp;quot;UI redress attack&amp;quot;, is when an attacker uses multiple transparent or opaque layers to trick a user into clicking on a button or link on another page when they were intending to click on the the top level page. Thus, the attacker is &amp;quot;hijacking&amp;quot; clicks meant for their page and routing them to other another page, most likely owned by another application, domain, or both.&lt;br /&gt;
&lt;br /&gt;
Using a similar technique, keystrokes can also be hijacked. With a carefully crafted combination of stylesheets, iframes, and text boxes, a user can be led to believe they are typing in the password to their email or bank account, but are instead typing into an invisible frame controlled by the attacker.&lt;br /&gt;
&lt;br /&gt;
=Examples=&lt;br /&gt;
&lt;br /&gt;
For example, imagine an attacker who builds a web site that has a button on it that says &amp;quot;click here for a free iPod&amp;quot;.  However, on top of that web page, the attacker has loaded an iframe with your mail account, and lined up exactly the &amp;quot;delete all messages&amp;quot; button directly on top of the &amp;quot;free iPod&amp;quot; button.  The victim tries to click on the &amp;quot;free iPod&amp;quot; button but instead actually clicked on the invisible &amp;quot;delete all messages&amp;quot; button.  In essence, the attacker has &amp;quot;hijacked&amp;quot; the user's click, hence the name &amp;quot;Clickjacking&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
One of the most notorious examples of Clickjacking was an attack against the [http://www.macromedia.com/support/documentation/en/flashplayer/help/settings_manager06.html Adobe Flash plugin settings page]. By loading this page into an invisible iframe, an attacker could trick a user into altering the security settings of Flash, giving permission for any Flash animation to utilize the computer's microphone and camera.&lt;br /&gt;
&lt;br /&gt;
Clickjacking also made the news in the form of a [http://shiflett.org/blog/2009/feb/twitter-dont-click-exploit Twitter worm]. This clickjacking attack convinced users to click on a button which caused them to re-tweet the location of the malicious page, and propagated massively.&lt;br /&gt;
&lt;br /&gt;
There has also been clickjacking attacks abusing Facebook's &amp;quot;Like&amp;quot; functionality. [http://threatpost.com/en_us/blogs/facebook-jacking-scams-expand-060310 Attackers can trick logged-in Facebook users to arbitrarily like fan pages, links, groups, etc]&lt;br /&gt;
&lt;br /&gt;
= Defending against Clickjacking =&lt;br /&gt;
There are two main ways to prevent clickjacking:&lt;br /&gt;
# Sending the proper browser response headers that instruct the browser to not allow framing from other domains&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Configuration snippet for Apache HTTP server&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Disallow page to be loaded in a frame.&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;IfModule headers_module&amp;gt;&lt;br /&gt;
Header  set X-Frame-Options DENY&lt;br /&gt;
&amp;lt;/IfModule&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Only allow pages from the same origin to be loaded in a frame.&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;IfModule headers_module&amp;gt;&lt;br /&gt;
Header  set X-Frame-Options SAMEORIGIN&lt;br /&gt;
&amp;lt;/IfModule&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
# Employing defensive code in the UI to ensure that the current frame is the most top level window&lt;br /&gt;
&lt;br /&gt;
For more information on Clickjacking defense, please see the the [[Clickjacking Defense Cheat Sheet]].&lt;br /&gt;
&lt;br /&gt;
= References =&lt;br /&gt;
* https://developer.mozilla.org/en-US/docs/The_X-FRAME-OPTIONS_response_header&lt;br /&gt;
: Mozilla developer resource on The X-Frame-Options response header.&lt;br /&gt;
&lt;br /&gt;
* [http://w2spconf.com/2010/papers/p27.pdf Busting Frame Busting: A study of clickjacking vulnerabilites on top sites]&lt;br /&gt;
: A study by the Stanford Web Security Group outlining problems with deployed frame busting code.&lt;br /&gt;
&lt;br /&gt;
* [http://www.sectheory.com/clickjacking.htm Clickjacking, Sec Theory]&lt;br /&gt;
: A paper by Robert Hansen defining the term, its implications against Flash at the time of writing, and a disclosure timeline.&lt;br /&gt;
&lt;br /&gt;
* [https://www.codemagi.com/blog/post/194 https://www.codemagi.com/blog/post/194] &lt;br /&gt;
: Framebreaking defense for legacy browsers that do not support X-Frame-Option headers.&lt;br /&gt;
&lt;br /&gt;
* [[ClickjackFilter_for_Java_EE|Anti-clickjacking J2EE filter]]&lt;br /&gt;
: A simple J2EE servlet filter that sends anti-framing headers to the browser.&lt;/div&gt;</summary>
		<author><name>Ajay</name></author>	</entry>

	</feed>