<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Arun+Kumar+V</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Arun+Kumar+V"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Arun_Kumar_V"/>
		<updated>2026-05-06T13:06:21Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Arun_Kumar_V&amp;diff=237633</id>
		<title>User:Arun Kumar V</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Arun_Kumar_V&amp;diff=237633"/>
				<updated>2018-02-15T20:02:01Z</updated>
		
		<summary type="html">&lt;p&gt;Arun Kumar V: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Arun Kumar''' currently works with IBM India Pvt Ltd as a Senior Security Consultant. &lt;br /&gt;
Work history :&lt;br /&gt;
Security analyst , Ernst Young ,Trivandrum ,India.&lt;br /&gt;
Security Analyst , Cognizant,Bangalore,India.&lt;br /&gt;
&lt;br /&gt;
He had done M.Tech in Cyber Security from Amrita Viswavidyapeetham,Coimbatore,India&lt;br /&gt;
&lt;br /&gt;
and holds a B.Tech in Computer Science under University of Calicut(Jyothi Engg. College,Thrissur),India.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Project Leader: [https://www.owasp.org/index.php/OWASP_Click_Me_Project OWASP Click Me]&lt;br /&gt;
&lt;br /&gt;
---- &lt;br /&gt;
[[Image:Facebook-32x32.png|50px|link=https://www.facebook.com/ARUNKUMAR.adu]]                   [[Image:Linkedin-32x32.png|50px|link=https://www.linkedin.com/in/beingarun]]&lt;/div&gt;</summary>
		<author><name>Arun Kumar V</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Arun_Kumar_V&amp;diff=237630</id>
		<title>User:Arun Kumar V</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Arun_Kumar_V&amp;diff=237630"/>
				<updated>2018-02-15T20:00:00Z</updated>
		
		<summary type="html">&lt;p&gt;Arun Kumar V: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Arun Kumar''' currently works with IBM India Pvt Ltd as a Senior Security Consultant. &lt;br /&gt;
Worked at Ernst Young ,Trivandrum ,India as a Security analyst.&lt;br /&gt;
Prior to that he was a Security Analyst at Cognizant,Bangalore,India.&lt;br /&gt;
&lt;br /&gt;
He had done M.Tech in Cyber Security from Amrita Viswavidyapeetham,Coimbatore,India&lt;br /&gt;
&lt;br /&gt;
and holds a B.Tech in Computer Science under University of Calicut(Jyothi Engg. College,Thrissur),India.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Project Leader: [https://www.owasp.org/index.php/OWASP_Click_Me_Project OWASP Click Me]&lt;br /&gt;
&lt;br /&gt;
---- &lt;br /&gt;
[[Image:Facebook-32x32.png|50px|link=https://www.facebook.com/ARUNKUMAR.adu]]                   [[Image:Linkedin-32x32.png|50px|link=https://www.linkedin.com/in/beingarun]]&lt;/div&gt;</summary>
		<author><name>Arun Kumar V</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Arun_Kumar_V&amp;diff=237628</id>
		<title>User:Arun Kumar V</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Arun_Kumar_V&amp;diff=237628"/>
				<updated>2018-02-15T19:59:21Z</updated>
		
		<summary type="html">&lt;p&gt;Arun Kumar V: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Arun Kumar''' currently works with IBM India Pvt Ltd . &lt;br /&gt;
Worked at Ernst Young ,Trivandrum ,India as a Security analyst.&lt;br /&gt;
Prior to that he was a Security Analyst at Cognizant,Bangalore,India.&lt;br /&gt;
&lt;br /&gt;
He had done M.Tech in Cyber Security from Amrita Viswavidyapeetham,Coimbatore,India&lt;br /&gt;
&lt;br /&gt;
and holds a B.Tech in Computer Science under University of Calicut(Jyothi Engg. College,Thrissur),India.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Project Leader: [https://www.owasp.org/index.php/OWASP_Click_Me_Project OWASP Click Me]&lt;br /&gt;
&lt;br /&gt;
---- &lt;br /&gt;
[[Image:Facebook-32x32.png|50px|link=https://www.facebook.com/ARUNKUMAR.adu]]                   [[Image:Linkedin-32x32.png|50px|link=https://www.linkedin.com/in/beingarun]]&lt;/div&gt;</summary>
		<author><name>Arun Kumar V</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Arun_Kumar_V&amp;diff=206691</id>
		<title>User:Arun Kumar V</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Arun_Kumar_V&amp;diff=206691"/>
				<updated>2016-01-17T16:08:21Z</updated>
		
		<summary type="html">&lt;p&gt;Arun Kumar V: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Arun Kumar''' currently works with Ernst Young ,Trivandrum ,India as a Security analyst.&lt;br /&gt;
&lt;br /&gt;
Previously he was a Security Analyst at Cognizant,Bangalore,India.&lt;br /&gt;
&lt;br /&gt;
He had done M.Tech in Cyber Security from Amrita Viswavidyapeetham,Coimbatore,India&lt;br /&gt;
&lt;br /&gt;
and holds a B.Tech in Computer Science under University of Calicut(Jyothi Engg. College,Thrissur),India.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Project Leader: [https://www.owasp.org/index.php/OWASP_Click_Me_Project OWASP Click Me]&lt;br /&gt;
&lt;br /&gt;
---- &lt;br /&gt;
[[Image:Facebook-32x32.png|50px|link=https://www.facebook.com/ARUNKUMAR.adu]]                   [[Image:Linkedin-32x32.png|50px|link=http://www.linkedin.com/in//beingarun]]&lt;/div&gt;</summary>
		<author><name>Arun Kumar V</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Arun_Kumar_V&amp;diff=204446</id>
		<title>User:Arun Kumar V</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Arun_Kumar_V&amp;diff=204446"/>
				<updated>2015-12-03T06:32:46Z</updated>
		
		<summary type="html">&lt;p&gt;Arun Kumar V: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Me.jpg]]&lt;br /&gt;
&lt;br /&gt;
'''Arun Kumar''' was a Security Analyst at Cognizant,Bangalore,India.&lt;br /&gt;
&lt;br /&gt;
Prior to that he had done M.Tech in Cyber Security from Amrita Viswavidyapeetham,Coimbatore,India&lt;br /&gt;
&lt;br /&gt;
and holds a B.Tech in Computer Science under University of Calicut(Jyothi Engg. College,Thrissur),India.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Project Leader: [https://www.owasp.org/index.php/OWASP_Click_Me_Project OWASP Click Me]&lt;br /&gt;
&lt;br /&gt;
---- &lt;br /&gt;
[[Image:Facebook-32x32.png|50px|link=https://www.facebook.com/ARUNKUMAR.adu]]                   [[Image:Linkedin-32x32.png|50px|link=http://www.linkedin.com/in//beingarun]]&lt;/div&gt;</summary>
		<author><name>Arun Kumar V</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Arun_Kumar_V&amp;diff=204445</id>
		<title>User:Arun Kumar V</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Arun_Kumar_V&amp;diff=204445"/>
				<updated>2015-12-03T06:32:25Z</updated>
		
		<summary type="html">&lt;p&gt;Arun Kumar V: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Me.jpg]]&lt;br /&gt;
&lt;br /&gt;
'''Arun Kumar''' was a Security Analyst at Cognizant,Bangalore,India.&lt;br /&gt;
&lt;br /&gt;
Prior to his that he had done M.Tech in Cyber Security from Amrita Viswavidyapeetham,Coimbatore,India&lt;br /&gt;
&lt;br /&gt;
and holds a B.Tech in Computer Science under University of Calicut(Jyothi Engg. College,Thrissur),India.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Project Leader: [https://www.owasp.org/index.php/OWASP_Click_Me_Project OWASP Click Me]&lt;br /&gt;
&lt;br /&gt;
---- &lt;br /&gt;
[[Image:Facebook-32x32.png|50px|link=https://www.facebook.com/ARUNKUMAR.adu]]                   [[Image:Linkedin-32x32.png|50px|link=http://www.linkedin.com/in//beingarun]]&lt;/div&gt;</summary>
		<author><name>Arun Kumar V</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=204444</id>
		<title>OWASP Click Me Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=204444"/>
				<updated>2015-12-03T06:23:09Z</updated>
		
		<summary type="html">&lt;p&gt;Arun Kumar V: /* Download */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:100px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[Image:OWASP Inactive Banner.jpg|800px| link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Inactive_Projects]] &amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Click Me Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project aimed at having a simple GUI which helps to create a test page for Clickjacking attacks.This is an attack which targets the clickable content on a website.&lt;br /&gt;
Clickjacking attack occurs when a malicious site tricks a user into clicking on a hidden element that belong to another site which they have loaded in a hidden frame or iframe.OWASP Click Me tool will help you to test whether your site is vulnerable to this attack by creating a html page that will try to load your web site from a frame.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Sites can use frame breaking scripts and X-Frame-Options set with DENY or SAME ORIGIN values to avoid Clickjacking attacks,by ensuring that their content is not embedded into other sites.&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Click Me Project is free to use. It is licensed under the Apache 2.0 License. &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project provides:&lt;br /&gt;
* Proof of concept for Clickjacking vulnerability .&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Darun.jpg |200px| link=https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/ClickMe.zip]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;|   &lt;br /&gt;
   |-&lt;br /&gt;
   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
The OWASP Click Me Project: The primary contributors to date have been:&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
==Acknowledgement==&lt;br /&gt;
* [[User:Samantha Groves|Samantha Groves]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* https://www.owasp.org/index.php/Clickjacking&lt;br /&gt;
: OWASP definition on Click jacking or &amp;quot;UI redress attack&amp;quot;&lt;br /&gt;
&lt;br /&gt;
*https://www.owasp.org/index.php/Testing_for_Clickjacking_(OWASP-CS-004)&lt;br /&gt;
: OWASP test guide for Click jacking attacks.&lt;br /&gt;
&lt;br /&gt;
=Download=&lt;br /&gt;
&lt;br /&gt;
Just a click away to get your copy of OWASP Click Me.Here we go !&lt;br /&gt;
==[[Image:Darun.jpg |200px| link=https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/ClickMe.zip]]==&lt;br /&gt;
&lt;br /&gt;
Click Me is made available in 3 formats ie as a java gui,python tool and as a stand alone html page.&lt;br /&gt;
&lt;br /&gt;
==Snapshot==&lt;br /&gt;
*Java&lt;br /&gt;
[[File:Java.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note :  jar file ,so you will need JRE in your system to run the file.&lt;br /&gt;
Double click the jar file or give &amp;quot;java -jar clickme.jar&amp;quot; in the command prompt.&lt;br /&gt;
----&lt;br /&gt;
*Python&lt;br /&gt;
 [[File:pyclickme.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note :  Give the test url as shown in the figure, and you will need Python framework supppport to run python file.&lt;br /&gt;
&lt;br /&gt;
$python clickme.py&lt;br /&gt;
----&lt;br /&gt;
*Html&lt;br /&gt;
[[File:Hmtl.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note : Load the html in a browser and give the test url in the text area and hit click me button&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
* Creating the test html page.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Click_Me_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;/div&gt;</summary>
		<author><name>Arun Kumar V</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Clickjacking&amp;diff=204153</id>
		<title>Clickjacking</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Clickjacking&amp;diff=204153"/>
				<updated>2015-12-01T11:53:24Z</updated>
		
		<summary type="html">&lt;p&gt;Arun Kumar V: /* References */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Clickjacking, also known as a &amp;quot;UI redress attack&amp;quot;, is when an attacker uses multiple transparent or opaque layers to trick a user into clicking on a button or link on another page when they were intending to click on the the top level page. Thus, the attacker is &amp;quot;hijacking&amp;quot; clicks meant for their page and routing them to another page, most likely owned by another application, domain, or both.&lt;br /&gt;
&lt;br /&gt;
Using a similar technique, keystrokes can also be hijacked. With a carefully crafted combination of stylesheets, iframes, and text boxes, a user can be led to believe they are typing in the password to their email or bank account, but are instead typing into an invisible frame controlled by the attacker.&lt;br /&gt;
&lt;br /&gt;
=Examples=&lt;br /&gt;
&lt;br /&gt;
For example, imagine an attacker who builds a web site that has a button on it that says &amp;quot;click here for a free iPod&amp;quot;.  However, on top of that web page, the attacker has loaded an iframe with your mail account, and lined up exactly the &amp;quot;delete all messages&amp;quot; button directly on top of the &amp;quot;free iPod&amp;quot; button.  The victim tries to click on the &amp;quot;free iPod&amp;quot; button but instead actually clicked on the invisible &amp;quot;delete all messages&amp;quot; button.  In essence, the attacker has &amp;quot;hijacked&amp;quot; the user's click, hence the name &amp;quot;Clickjacking&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
One of the most notorious examples of Clickjacking was an attack against the [http://www.macromedia.com/support/documentation/en/flashplayer/help/settings_manager06.html Adobe Flash plugin settings page]. By loading this page into an invisible iframe, an attacker could trick a user into altering the security settings of Flash, giving permission for any Flash animation to utilize the computer's microphone and camera.&lt;br /&gt;
&lt;br /&gt;
Clickjacking also made the news in the form of a [http://shiflett.org/blog/2009/feb/twitter-dont-click-exploit Twitter worm]. This clickjacking attack convinced users to click on a button which caused them to re-tweet the location of the malicious page, and propagated massively.&lt;br /&gt;
&lt;br /&gt;
There have also been clickjacking attacks abusing Facebook's &amp;quot;Like&amp;quot; functionality. [http://threatpost.com/en_us/blogs/facebook-jacking-scams-expand-060310 Attackers can trick logged-in Facebook users to arbitrarily like fan pages, links, groups, etc]&lt;br /&gt;
&lt;br /&gt;
= Defending against Clickjacking =&lt;br /&gt;
There are two main ways to prevent clickjacking:&lt;br /&gt;
# Sending the proper X-Frame-Options HTTP response headers that instruct the browser to not allow framing from other domains&lt;br /&gt;
# Employing defensive code in the UI to ensure that the current frame is the most top level window&lt;br /&gt;
&lt;br /&gt;
For more information on Clickjacking defense, please see the the [[Clickjacking Defense Cheat Sheet]].&lt;br /&gt;
&lt;br /&gt;
= References =&lt;br /&gt;
* https://developer.mozilla.org/en-US/docs/The_X-FRAME-OPTIONS_response_header&lt;br /&gt;
: Mozilla developer resource on The X-Frame-Options response header.&lt;br /&gt;
&lt;br /&gt;
* [http://w2spconf.com/2010/papers/p27.pdf Busting Frame Busting: A study of clickjacking vulnerabilites on top sites]&lt;br /&gt;
: A study by the Stanford Web Security Group outlining problems with deployed frame busting code.&lt;br /&gt;
&lt;br /&gt;
* [http://www.sectheory.com/clickjacking.htm Clickjacking, Sec Theory]&lt;br /&gt;
: A paper by Robert Hansen defining the term, its implications against Flash at the time of writing, and a disclosure timeline.&lt;br /&gt;
&lt;br /&gt;
* [https://www.codemagi.com/blog/post/194 https://www.codemagi.com/blog/post/194] &lt;br /&gt;
: Framebreaking defense for legacy browsers that do not support X-Frame-Option headers.&lt;br /&gt;
&lt;br /&gt;
* [[ClickjackFilter_for_Java_EE|Anti-clickjacking J2EE filter]]&lt;br /&gt;
: A simple J2EE servlet filter that sends anti-framing headers to the browser.&lt;/div&gt;</summary>
		<author><name>Arun Kumar V</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Clickjacking&amp;diff=204145</id>
		<title>Clickjacking</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Clickjacking&amp;diff=204145"/>
				<updated>2015-12-01T11:50:33Z</updated>
		
		<summary type="html">&lt;p&gt;Arun Kumar V: /* References */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Clickjacking, also known as a &amp;quot;UI redress attack&amp;quot;, is when an attacker uses multiple transparent or opaque layers to trick a user into clicking on a button or link on another page when they were intending to click on the the top level page. Thus, the attacker is &amp;quot;hijacking&amp;quot; clicks meant for their page and routing them to another page, most likely owned by another application, domain, or both.&lt;br /&gt;
&lt;br /&gt;
Using a similar technique, keystrokes can also be hijacked. With a carefully crafted combination of stylesheets, iframes, and text boxes, a user can be led to believe they are typing in the password to their email or bank account, but are instead typing into an invisible frame controlled by the attacker.&lt;br /&gt;
&lt;br /&gt;
=Examples=&lt;br /&gt;
&lt;br /&gt;
For example, imagine an attacker who builds a web site that has a button on it that says &amp;quot;click here for a free iPod&amp;quot;.  However, on top of that web page, the attacker has loaded an iframe with your mail account, and lined up exactly the &amp;quot;delete all messages&amp;quot; button directly on top of the &amp;quot;free iPod&amp;quot; button.  The victim tries to click on the &amp;quot;free iPod&amp;quot; button but instead actually clicked on the invisible &amp;quot;delete all messages&amp;quot; button.  In essence, the attacker has &amp;quot;hijacked&amp;quot; the user's click, hence the name &amp;quot;Clickjacking&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
One of the most notorious examples of Clickjacking was an attack against the [http://www.macromedia.com/support/documentation/en/flashplayer/help/settings_manager06.html Adobe Flash plugin settings page]. By loading this page into an invisible iframe, an attacker could trick a user into altering the security settings of Flash, giving permission for any Flash animation to utilize the computer's microphone and camera.&lt;br /&gt;
&lt;br /&gt;
Clickjacking also made the news in the form of a [http://shiflett.org/blog/2009/feb/twitter-dont-click-exploit Twitter worm]. This clickjacking attack convinced users to click on a button which caused them to re-tweet the location of the malicious page, and propagated massively.&lt;br /&gt;
&lt;br /&gt;
There have also been clickjacking attacks abusing Facebook's &amp;quot;Like&amp;quot; functionality. [http://threatpost.com/en_us/blogs/facebook-jacking-scams-expand-060310 Attackers can trick logged-in Facebook users to arbitrarily like fan pages, links, groups, etc]&lt;br /&gt;
&lt;br /&gt;
= Defending against Clickjacking =&lt;br /&gt;
There are two main ways to prevent clickjacking:&lt;br /&gt;
# Sending the proper X-Frame-Options HTTP response headers that instruct the browser to not allow framing from other domains&lt;br /&gt;
# Employing defensive code in the UI to ensure that the current frame is the most top level window&lt;br /&gt;
&lt;br /&gt;
For more information on Clickjacking defense, please see the the [[Clickjacking Defense Cheat Sheet]].&lt;br /&gt;
&lt;br /&gt;
= References =&lt;br /&gt;
* https://developer.mozilla.org/en-US/docs/The_X-FRAME-OPTIONS_response_header&lt;br /&gt;
: Mozilla developer resource on The X-Frame-Options response header.&lt;br /&gt;
&lt;br /&gt;
* [http://w2spconf.com/2010/papers/p27.pdf Busting Frame Busting: A study of clickjacking vulnerabilites on top sites]&lt;br /&gt;
: A study by the Stanford Web Security Group outlining problems with deployed frame busting code.&lt;br /&gt;
&lt;br /&gt;
* [http://www.sectheory.com/clickjacking.htm Clickjacking, Sec Theory]&lt;br /&gt;
: A paper by Robert Hansen defining the term, its implications against Flash at the time of writing, and a disclosure timeline.&lt;br /&gt;
&lt;br /&gt;
* [https://www.codemagi.com/blog/post/194 https://www.codemagi.com/blog/post/194] &lt;br /&gt;
: Framebreaking defense for legacy browsers that do not support X-Frame-Option headers.&lt;br /&gt;
&lt;br /&gt;
* [[ClickjackFilter_for_Java_EE|Anti-clickjacking J2EE filter]]&lt;br /&gt;
: A simple J2EE servlet filter that sends anti-framing headers to the browser.&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Click_Me_Project Creating test page for Clickjack vulnerability]&lt;br /&gt;
: A tool to create test pages to check for clickjacking&lt;/div&gt;</summary>
		<author><name>Arun Kumar V</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Clickjacking&amp;diff=204142</id>
		<title>Clickjacking</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Clickjacking&amp;diff=204142"/>
				<updated>2015-12-01T11:49:28Z</updated>
		
		<summary type="html">&lt;p&gt;Arun Kumar V: /* References */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Clickjacking, also known as a &amp;quot;UI redress attack&amp;quot;, is when an attacker uses multiple transparent or opaque layers to trick a user into clicking on a button or link on another page when they were intending to click on the the top level page. Thus, the attacker is &amp;quot;hijacking&amp;quot; clicks meant for their page and routing them to another page, most likely owned by another application, domain, or both.&lt;br /&gt;
&lt;br /&gt;
Using a similar technique, keystrokes can also be hijacked. With a carefully crafted combination of stylesheets, iframes, and text boxes, a user can be led to believe they are typing in the password to their email or bank account, but are instead typing into an invisible frame controlled by the attacker.&lt;br /&gt;
&lt;br /&gt;
=Examples=&lt;br /&gt;
&lt;br /&gt;
For example, imagine an attacker who builds a web site that has a button on it that says &amp;quot;click here for a free iPod&amp;quot;.  However, on top of that web page, the attacker has loaded an iframe with your mail account, and lined up exactly the &amp;quot;delete all messages&amp;quot; button directly on top of the &amp;quot;free iPod&amp;quot; button.  The victim tries to click on the &amp;quot;free iPod&amp;quot; button but instead actually clicked on the invisible &amp;quot;delete all messages&amp;quot; button.  In essence, the attacker has &amp;quot;hijacked&amp;quot; the user's click, hence the name &amp;quot;Clickjacking&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
One of the most notorious examples of Clickjacking was an attack against the [http://www.macromedia.com/support/documentation/en/flashplayer/help/settings_manager06.html Adobe Flash plugin settings page]. By loading this page into an invisible iframe, an attacker could trick a user into altering the security settings of Flash, giving permission for any Flash animation to utilize the computer's microphone and camera.&lt;br /&gt;
&lt;br /&gt;
Clickjacking also made the news in the form of a [http://shiflett.org/blog/2009/feb/twitter-dont-click-exploit Twitter worm]. This clickjacking attack convinced users to click on a button which caused them to re-tweet the location of the malicious page, and propagated massively.&lt;br /&gt;
&lt;br /&gt;
There have also been clickjacking attacks abusing Facebook's &amp;quot;Like&amp;quot; functionality. [http://threatpost.com/en_us/blogs/facebook-jacking-scams-expand-060310 Attackers can trick logged-in Facebook users to arbitrarily like fan pages, links, groups, etc]&lt;br /&gt;
&lt;br /&gt;
= Defending against Clickjacking =&lt;br /&gt;
There are two main ways to prevent clickjacking:&lt;br /&gt;
# Sending the proper X-Frame-Options HTTP response headers that instruct the browser to not allow framing from other domains&lt;br /&gt;
# Employing defensive code in the UI to ensure that the current frame is the most top level window&lt;br /&gt;
&lt;br /&gt;
For more information on Clickjacking defense, please see the the [[Clickjacking Defense Cheat Sheet]].&lt;br /&gt;
&lt;br /&gt;
= References =&lt;br /&gt;
* https://developer.mozilla.org/en-US/docs/The_X-FRAME-OPTIONS_response_header&lt;br /&gt;
: Mozilla developer resource on The X-Frame-Options response header.&lt;br /&gt;
&lt;br /&gt;
* [http://w2spconf.com/2010/papers/p27.pdf Busting Frame Busting: A study of clickjacking vulnerabilites on top sites]&lt;br /&gt;
: A study by the Stanford Web Security Group outlining problems with deployed frame busting code.&lt;br /&gt;
&lt;br /&gt;
* [http://www.sectheory.com/clickjacking.htm Clickjacking, Sec Theory]&lt;br /&gt;
: A paper by Robert Hansen defining the term, its implications against Flash at the time of writing, and a disclosure timeline.&lt;br /&gt;
&lt;br /&gt;
* [https://www.codemagi.com/blog/post/194 https://www.codemagi.com/blog/post/194] &lt;br /&gt;
: Framebreaking defense for legacy browsers that do not support X-Frame-Option headers.&lt;br /&gt;
&lt;br /&gt;
* [[ClickjackFilter_for_Java_EE|Anti-clickjacking J2EE filter]]&lt;br /&gt;
: A simple J2EE servlet filter that sends anti-framing headers to the browser.&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Click_Me_Project : Creating test page for Clickjack vulnerability]&lt;br /&gt;
: A tool to create test pages to check for clickjacking&lt;/div&gt;</summary>
		<author><name>Arun Kumar V</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=204137</id>
		<title>OWASP Click Me Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=204137"/>
				<updated>2015-12-01T11:45:50Z</updated>
		
		<summary type="html">&lt;p&gt;Arun Kumar V: /* Classifications */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:100px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[Image:OWASP Inactive Banner.jpg|800px| link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Inactive_Projects]] &amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Click Me Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project aimed at having a simple GUI which helps to create a test page for Clickjacking attacks.This is an attack which targets the clickable content on a website.&lt;br /&gt;
Clickjacking attack occurs when a malicious site tricks a user into clicking on a hidden element that belong to another site which they have loaded in a hidden frame or iframe.OWASP Click Me tool will help you to test whether your site is vulnerable to this attack by creating a html page that will try to load your web site from a frame.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Sites can use frame breaking scripts and X-Frame-Options set with DENY or SAME ORIGIN values to avoid Clickjacking attacks,by ensuring that their content is not embedded into other sites.&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Click Me Project is free to use. It is licensed under the Apache 2.0 License. &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project provides:&lt;br /&gt;
* Proof of concept for Clickjacking vulnerability .&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Darun.jpg |200px| link=https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/ClickMe.zip]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;|   &lt;br /&gt;
   |-&lt;br /&gt;
   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
The OWASP Click Me Project: The primary contributors to date have been:&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
==Acknowledgement==&lt;br /&gt;
* [[User:Samantha Groves|Samantha Groves]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* https://www.owasp.org/index.php/Clickjacking&lt;br /&gt;
: OWASP definition on Click jacking or &amp;quot;UI redress attack&amp;quot;&lt;br /&gt;
&lt;br /&gt;
*https://www.owasp.org/index.php/Testing_for_Clickjacking_(OWASP-CS-004)&lt;br /&gt;
: OWASP test guide for Click jacking attacks.&lt;br /&gt;
&lt;br /&gt;
=Download=&lt;br /&gt;
&lt;br /&gt;
Just a click away to get your copy of OWASP Click Me.Here we go !&lt;br /&gt;
==[[Image:Darun.jpg |200px| link=https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/ClickMe.zip]]==&lt;br /&gt;
&lt;br /&gt;
Click Me is made available in 3 formats ie as a java gui,python tool and as a stand alone html page.&lt;br /&gt;
&lt;br /&gt;
==Snapshot==&lt;br /&gt;
*Java&lt;br /&gt;
[[File:Java.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note :  jar file ,so you will need JRE in your system to run the file.&lt;br /&gt;
Double click the jar file or give &amp;quot;java -jar clickme.jar&amp;quot; in the command prompt.&lt;br /&gt;
----&lt;br /&gt;
*Python&lt;br /&gt;
 [[File:pyclickme.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note :  Give the test url as shown in the figure, and you will need Python framework supppport to run python file.&lt;br /&gt;
&lt;br /&gt;
$python clickme.py https://www.example.com&amp;quot;&lt;br /&gt;
----&lt;br /&gt;
*Html&lt;br /&gt;
[[File:Hmtl.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note : Load the html in a browser and give the test url in the text area and hit click me button&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
* Creating the test html page.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Click_Me_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;/div&gt;</summary>
		<author><name>Arun Kumar V</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=204136</id>
		<title>OWASP Click Me Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=204136"/>
				<updated>2015-12-01T11:45:27Z</updated>
		
		<summary type="html">&lt;p&gt;Arun Kumar V: /* Classifications */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:100px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[Image:OWASP Inactive Banner.jpg|800px| link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Inactive_Projects]] &amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Click Me Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project aimed at having a simple GUI which helps to create a test page for Clickjacking attacks.This is an attack which targets the clickable content on a website.&lt;br /&gt;
Clickjacking attack occurs when a malicious site tricks a user into clicking on a hidden element that belong to another site which they have loaded in a hidden frame or iframe.OWASP Click Me tool will help you to test whether your site is vulnerable to this attack by creating a html page that will try to load your web site from a frame.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Sites can use frame breaking scripts and X-Frame-Options set with DENY or SAME ORIGIN values to avoid Clickjacking attacks,by ensuring that their content is not embedded into other sites.&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Click Me Project is free to use. It is licensed under the Apache 2.0 License. &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project provides:&lt;br /&gt;
* Proof of concept for Clickjacking vulnerability .&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Darun.jpg |200px| link=https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/ClickMe.zip]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
The OWASP Click Me Project: The primary contributors to date have been:&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
==Acknowledgement==&lt;br /&gt;
* [[User:Samantha Groves|Samantha Groves]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* https://www.owasp.org/index.php/Clickjacking&lt;br /&gt;
: OWASP definition on Click jacking or &amp;quot;UI redress attack&amp;quot;&lt;br /&gt;
&lt;br /&gt;
*https://www.owasp.org/index.php/Testing_for_Clickjacking_(OWASP-CS-004)&lt;br /&gt;
: OWASP test guide for Click jacking attacks.&lt;br /&gt;
&lt;br /&gt;
=Download=&lt;br /&gt;
&lt;br /&gt;
Just a click away to get your copy of OWASP Click Me.Here we go !&lt;br /&gt;
==[[Image:Darun.jpg |200px| link=https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/ClickMe.zip]]==&lt;br /&gt;
&lt;br /&gt;
Click Me is made available in 3 formats ie as a java gui,python tool and as a stand alone html page.&lt;br /&gt;
&lt;br /&gt;
==Snapshot==&lt;br /&gt;
*Java&lt;br /&gt;
[[File:Java.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note :  jar file ,so you will need JRE in your system to run the file.&lt;br /&gt;
Double click the jar file or give &amp;quot;java -jar clickme.jar&amp;quot; in the command prompt.&lt;br /&gt;
----&lt;br /&gt;
*Python&lt;br /&gt;
 [[File:pyclickme.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note :  Give the test url as shown in the figure, and you will need Python framework supppport to run python file.&lt;br /&gt;
&lt;br /&gt;
$python clickme.py https://www.example.com&amp;quot;&lt;br /&gt;
----&lt;br /&gt;
*Html&lt;br /&gt;
[[File:Hmtl.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note : Load the html in a browser and give the test url in the text area and hit click me button&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
* Creating the test html page.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Click_Me_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;/div&gt;</summary>
		<author><name>Arun Kumar V</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=204134</id>
		<title>OWASP Click Me Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=204134"/>
				<updated>2015-12-01T11:44:40Z</updated>
		
		<summary type="html">&lt;p&gt;Arun Kumar V: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:100px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[Image:OWASP Inactive Banner.jpg|800px| link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Inactive_Projects]] &amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Click Me Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project aimed at having a simple GUI which helps to create a test page for Clickjacking attacks.This is an attack which targets the clickable content on a website.&lt;br /&gt;
Clickjacking attack occurs when a malicious site tricks a user into clicking on a hidden element that belong to another site which they have loaded in a hidden frame or iframe.OWASP Click Me tool will help you to test whether your site is vulnerable to this attack by creating a html page that will try to load your web site from a frame.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Sites can use frame breaking scripts and X-Frame-Options set with DENY or SAME ORIGIN values to avoid Clickjacking attacks,by ensuring that their content is not embedded into other sites.&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Click Me Project is free to use. It is licensed under the Apache 2.0 License. &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project provides:&lt;br /&gt;
* Proof of concept for Clickjacking vulnerability .&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Darun.jpg |200px| link=https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/ClickMe.zip]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
The OWASP Click Me Project: The primary contributors to date have been:&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
==Acknowledgement==&lt;br /&gt;
* [[User:Samantha Groves|Samantha Groves]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* https://www.owasp.org/index.php/Clickjacking&lt;br /&gt;
: OWASP definition on Click jacking or &amp;quot;UI redress attack&amp;quot;&lt;br /&gt;
&lt;br /&gt;
*https://www.owasp.org/index.php/Testing_for_Clickjacking_(OWASP-CS-004)&lt;br /&gt;
: OWASP test guide for Click jacking attacks.&lt;br /&gt;
&lt;br /&gt;
=Download=&lt;br /&gt;
&lt;br /&gt;
Just a click away to get your copy of OWASP Click Me.Here we go !&lt;br /&gt;
==[[Image:Darun.jpg |200px| link=https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/ClickMe.zip]]==&lt;br /&gt;
&lt;br /&gt;
Click Me is made available in 3 formats ie as a java gui,python tool and as a stand alone html page.&lt;br /&gt;
&lt;br /&gt;
==Snapshot==&lt;br /&gt;
*Java&lt;br /&gt;
[[File:Java.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note :  jar file ,so you will need JRE in your system to run the file.&lt;br /&gt;
Double click the jar file or give &amp;quot;java -jar clickme.jar&amp;quot; in the command prompt.&lt;br /&gt;
----&lt;br /&gt;
*Python&lt;br /&gt;
 [[File:pyclickme.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note :  Give the test url as shown in the figure, and you will need Python framework supppport to run python file.&lt;br /&gt;
&lt;br /&gt;
$python clickme.py https://www.example.com&amp;quot;&lt;br /&gt;
----&lt;br /&gt;
*Html&lt;br /&gt;
[[File:Hmtl.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note : Load the html in a browser and give the test url in the text area and hit click me button&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
* Creating the test html page.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Click_Me_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;/div&gt;</summary>
		<author><name>Arun Kumar V</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=204131</id>
		<title>OWASP Click Me Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=204131"/>
				<updated>2015-12-01T11:36:30Z</updated>
		
		<summary type="html">&lt;p&gt;Arun Kumar V: /* Quick Download */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:100px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[Image:OWASP Inactive Banner.jpg|800px| link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Inactive_Projects]] &amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Click Me Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project aimed at having a simple GUI which helps to create a test page for Clickjacking attacks.This is an attack which targets the clickable content on a website.&lt;br /&gt;
Clickjacking attack occurs when a malicious site tricks a user into clicking on a hidden element that belong to another site which they have loaded in a hidden frame or iframe.OWASP Click Me tool will help you to test whether your site is vulnerable to this attack by creating a html page that will try to load your web site from a frame.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Sites can use frame breaking scripts and X-Frame-Options set with DENY or SAME ORIGIN values to avoid Clickjacking attacks,by ensuring that their content is not embedded into other sites.&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Click Me Project is free to use. It is licensed under the Apache 2.0 License. &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project provides:&lt;br /&gt;
* Proof of concept for Clickjacking vulnerability .&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Darun.jpg |200px| link=https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/ClickMe.zip]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
The OWASP Click Me Project: The primary contributors to date have been:&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
==Acknowledgement==&lt;br /&gt;
* [[User:Samantha Groves|Samantha Groves]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* https://www.owasp.org/index.php/Clickjacking&lt;br /&gt;
: OWASP definition on Click jacking or &amp;quot;UI redress attack&amp;quot;&lt;br /&gt;
&lt;br /&gt;
*https://www.owasp.org/index.php/Testing_for_Clickjacking_(OWASP-CS-004)&lt;br /&gt;
: OWASP test guide for Click jacking attacks.&lt;br /&gt;
&lt;br /&gt;
=Download=&lt;br /&gt;
&lt;br /&gt;
Just a click away to get your copy of OWASP Click Me.Here we go !&lt;br /&gt;
==[[Image:Darun.jpg |200px| link=https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/ClickMe.zip]]==&lt;br /&gt;
&lt;br /&gt;
Click Me is made available in 3 formats ie as a java gui,python tool and as a stand alone html page.&lt;br /&gt;
&lt;br /&gt;
==Snapshot==&lt;br /&gt;
*Java&lt;br /&gt;
[[File:Java.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note :  jar file ,so you will need JRE in your system to run the file.&lt;br /&gt;
Double click the jar file or give &amp;quot;java -jar clickme.jar&amp;quot; in the command prompt.&lt;br /&gt;
----&lt;br /&gt;
*Python&lt;br /&gt;
 [[File:pyclickme.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note :  Give the test url as shown in the figure, and you will need Python framework supppport to run python file.&lt;br /&gt;
&lt;br /&gt;
$python clickme.py https://www.example.com&amp;quot;&lt;br /&gt;
----&lt;br /&gt;
*Html&lt;br /&gt;
[[File:Hmtl.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note : Load the html in a browser and give the test url in the text area and hit click me button&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
* Creating the test html page.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Click_Me_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Arun Kumar V</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=204128</id>
		<title>OWASP Click Me Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=204128"/>
				<updated>2015-12-01T11:30:57Z</updated>
		
		<summary type="html">&lt;p&gt;Arun Kumar V: /* 200px| https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/ClickMe.zip */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:100px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[Image:OWASP Inactive Banner.jpg|800px| link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Inactive_Projects]] &amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Click Me Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project aimed at having a simple GUI which helps to create a test page for Clickjacking attacks.This is an attack which targets the clickable content on a website.&lt;br /&gt;
Clickjacking attack occurs when a malicious site tricks a user into clicking on a hidden element that belong to another site which they have loaded in a hidden frame or iframe.OWASP Click Me tool will help you to test whether your site is vulnerable to this attack by creating a html page that will try to load your web site from a frame.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Sites can use frame breaking scripts and X-Frame-Options set with DENY or SAME ORIGIN values to avoid Clickjacking attacks,by ensuring that their content is not embedded into other sites.&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Click Me Project is free to use. It is licensed under the Apache 2.0 License. &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project provides:&lt;br /&gt;
* Proof of concept for Clickjacking vulnerability .&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Darun.jpg |200px| link=https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/OWASPClickMe.zip]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
The OWASP Click Me Project: The primary contributors to date have been:&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
==Acknowledgement==&lt;br /&gt;
* [[User:Samantha Groves|Samantha Groves]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* https://www.owasp.org/index.php/Clickjacking&lt;br /&gt;
: OWASP definition on Click jacking or &amp;quot;UI redress attack&amp;quot;&lt;br /&gt;
&lt;br /&gt;
*https://www.owasp.org/index.php/Testing_for_Clickjacking_(OWASP-CS-004)&lt;br /&gt;
: OWASP test guide for Click jacking attacks.&lt;br /&gt;
&lt;br /&gt;
=Download=&lt;br /&gt;
&lt;br /&gt;
Just a click away to get your copy of OWASP Click Me.Here we go !&lt;br /&gt;
==[[Image:Darun.jpg |200px| link=https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/ClickMe.zip]]==&lt;br /&gt;
&lt;br /&gt;
Click Me is made available in 3 formats ie as a java gui,python tool and as a stand alone html page.&lt;br /&gt;
&lt;br /&gt;
==Snapshot==&lt;br /&gt;
*Java&lt;br /&gt;
[[File:Java.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note :  jar file ,so you will need JRE in your system to run the file.&lt;br /&gt;
Double click the jar file or give &amp;quot;java -jar clickme.jar&amp;quot; in the command prompt.&lt;br /&gt;
----&lt;br /&gt;
*Python&lt;br /&gt;
 [[File:pyclickme.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note :  Give the test url as shown in the figure, and you will need Python framework supppport to run python file.&lt;br /&gt;
&lt;br /&gt;
$python clickme.py https://www.example.com&amp;quot;&lt;br /&gt;
----&lt;br /&gt;
*Html&lt;br /&gt;
[[File:Hmtl.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note : Load the html in a browser and give the test url in the text area and hit click me button&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
* Creating the test html page.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Click_Me_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Arun Kumar V</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=204127</id>
		<title>OWASP Click Me Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=204127"/>
				<updated>2015-12-01T11:30:38Z</updated>
		
		<summary type="html">&lt;p&gt;Arun Kumar V: /* Quick Download */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:100px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[Image:OWASP Inactive Banner.jpg|800px| link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Inactive_Projects]] &amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Click Me Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project aimed at having a simple GUI which helps to create a test page for Clickjacking attacks.This is an attack which targets the clickable content on a website.&lt;br /&gt;
Clickjacking attack occurs when a malicious site tricks a user into clicking on a hidden element that belong to another site which they have loaded in a hidden frame or iframe.OWASP Click Me tool will help you to test whether your site is vulnerable to this attack by creating a html page that will try to load your web site from a frame.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Sites can use frame breaking scripts and X-Frame-Options set with DENY or SAME ORIGIN values to avoid Clickjacking attacks,by ensuring that their content is not embedded into other sites.&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Click Me Project is free to use. It is licensed under the Apache 2.0 License. &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project provides:&lt;br /&gt;
* Proof of concept for Clickjacking vulnerability .&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Darun.jpg |200px| link=https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/OWASPClickMe.zip]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
The OWASP Click Me Project: The primary contributors to date have been:&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
==Acknowledgement==&lt;br /&gt;
* [[User:Samantha Groves|Samantha Groves]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* https://www.owasp.org/index.php/Clickjacking&lt;br /&gt;
: OWASP definition on Click jacking or &amp;quot;UI redress attack&amp;quot;&lt;br /&gt;
&lt;br /&gt;
*https://www.owasp.org/index.php/Testing_for_Clickjacking_(OWASP-CS-004)&lt;br /&gt;
: OWASP test guide for Click jacking attacks.&lt;br /&gt;
&lt;br /&gt;
=Download=&lt;br /&gt;
&lt;br /&gt;
Just a click away to get your copy of OWASP Click Me.Here we go !&lt;br /&gt;
==[[Image:Darun.jpg |200px| https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/ClickMe.zip]]==&lt;br /&gt;
&lt;br /&gt;
Click Me is made available in 3 formats ie as a java gui,python tool and as a stand alone html page.&lt;br /&gt;
&lt;br /&gt;
==Snapshot==&lt;br /&gt;
*Java&lt;br /&gt;
[[File:Java.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note :  jar file ,so you will need JRE in your system to run the file.&lt;br /&gt;
Double click the jar file or give &amp;quot;java -jar clickme.jar&amp;quot; in the command prompt.&lt;br /&gt;
----&lt;br /&gt;
*Python&lt;br /&gt;
 [[File:pyclickme.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note :  Give the test url as shown in the figure, and you will need Python framework supppport to run python file.&lt;br /&gt;
&lt;br /&gt;
$python clickme.py https://www.example.com&amp;quot;&lt;br /&gt;
----&lt;br /&gt;
*Html&lt;br /&gt;
[[File:Hmtl.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note : Load the html in a browser and give the test url in the text area and hit click me button&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
* Creating the test html page.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Click_Me_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Arun Kumar V</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=204126</id>
		<title>OWASP Click Me Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=204126"/>
				<updated>2015-12-01T11:29:21Z</updated>
		
		<summary type="html">&lt;p&gt;Arun Kumar V: /* 200px| https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/OWASPClickMe.zip */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:100px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[Image:OWASP Inactive Banner.jpg|800px| link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Inactive_Projects]] &amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Click Me Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project aimed at having a simple GUI which helps to create a test page for Clickjacking attacks.This is an attack which targets the clickable content on a website.&lt;br /&gt;
Clickjacking attack occurs when a malicious site tricks a user into clicking on a hidden element that belong to another site which they have loaded in a hidden frame or iframe.OWASP Click Me tool will help you to test whether your site is vulnerable to this attack by creating a html page that will try to load your web site from a frame.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Sites can use frame breaking scripts and X-Frame-Options set with DENY or SAME ORIGIN values to avoid Clickjacking attacks,by ensuring that their content is not embedded into other sites.&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Click Me Project is free to use. It is licensed under the Apache 2.0 License. &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project provides:&lt;br /&gt;
* Proof of concept for Clickjacking vulnerability .&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Darun.jpg |200px| https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/OWASPClickMe.zip]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
The OWASP Click Me Project: The primary contributors to date have been:&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
==Acknowledgement==&lt;br /&gt;
* [[User:Samantha Groves|Samantha Groves]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* https://www.owasp.org/index.php/Clickjacking&lt;br /&gt;
: OWASP definition on Click jacking or &amp;quot;UI redress attack&amp;quot;&lt;br /&gt;
&lt;br /&gt;
*https://www.owasp.org/index.php/Testing_for_Clickjacking_(OWASP-CS-004)&lt;br /&gt;
: OWASP test guide for Click jacking attacks.&lt;br /&gt;
&lt;br /&gt;
=Download=&lt;br /&gt;
&lt;br /&gt;
Just a click away to get your copy of OWASP Click Me.Here we go !&lt;br /&gt;
==[[Image:Darun.jpg |200px| https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/ClickMe.zip]]==&lt;br /&gt;
&lt;br /&gt;
Click Me is made available in 3 formats ie as a java gui,python tool and as a stand alone html page.&lt;br /&gt;
&lt;br /&gt;
==Snapshot==&lt;br /&gt;
*Java&lt;br /&gt;
[[File:Java.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note :  jar file ,so you will need JRE in your system to run the file.&lt;br /&gt;
Double click the jar file or give &amp;quot;java -jar clickme.jar&amp;quot; in the command prompt.&lt;br /&gt;
----&lt;br /&gt;
*Python&lt;br /&gt;
 [[File:pyclickme.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note :  Give the test url as shown in the figure, and you will need Python framework supppport to run python file.&lt;br /&gt;
&lt;br /&gt;
$python clickme.py https://www.example.com&amp;quot;&lt;br /&gt;
----&lt;br /&gt;
*Html&lt;br /&gt;
[[File:Hmtl.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note : Load the html in a browser and give the test url in the text area and hit click me button&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
* Creating the test html page.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Click_Me_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Arun Kumar V</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=204125</id>
		<title>OWASP Click Me Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=204125"/>
				<updated>2015-12-01T11:26:52Z</updated>
		
		<summary type="html">&lt;p&gt;Arun Kumar V: /* Download */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:100px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[Image:OWASP Inactive Banner.jpg|800px| link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Inactive_Projects]] &amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Click Me Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project aimed at having a simple GUI which helps to create a test page for Clickjacking attacks.This is an attack which targets the clickable content on a website.&lt;br /&gt;
Clickjacking attack occurs when a malicious site tricks a user into clicking on a hidden element that belong to another site which they have loaded in a hidden frame or iframe.OWASP Click Me tool will help you to test whether your site is vulnerable to this attack by creating a html page that will try to load your web site from a frame.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Sites can use frame breaking scripts and X-Frame-Options set with DENY or SAME ORIGIN values to avoid Clickjacking attacks,by ensuring that their content is not embedded into other sites.&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Click Me Project is free to use. It is licensed under the Apache 2.0 License. &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project provides:&lt;br /&gt;
* Proof of concept for Clickjacking vulnerability .&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Darun.jpg |200px| https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/OWASPClickMe.zip]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
The OWASP Click Me Project: The primary contributors to date have been:&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
==Acknowledgement==&lt;br /&gt;
* [[User:Samantha Groves|Samantha Groves]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* https://www.owasp.org/index.php/Clickjacking&lt;br /&gt;
: OWASP definition on Click jacking or &amp;quot;UI redress attack&amp;quot;&lt;br /&gt;
&lt;br /&gt;
*https://www.owasp.org/index.php/Testing_for_Clickjacking_(OWASP-CS-004)&lt;br /&gt;
: OWASP test guide for Click jacking attacks.&lt;br /&gt;
&lt;br /&gt;
=Download=&lt;br /&gt;
&lt;br /&gt;
Just a click away to get your copy of OWASP Click Me.Here we go !&lt;br /&gt;
==[[Image:Darun.jpg |200px| https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/OWASPClickMe.zip]]==&lt;br /&gt;
&lt;br /&gt;
Click Me is made available in 3 formats ie as a java gui,python tool and as a stand alone html page.&lt;br /&gt;
&lt;br /&gt;
==Snapshot==&lt;br /&gt;
*Java&lt;br /&gt;
[[File:Java.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note :  jar file ,so you will need JRE in your system to run the file.&lt;br /&gt;
Double click the jar file or give &amp;quot;java -jar clickme.jar&amp;quot; in the command prompt.&lt;br /&gt;
----&lt;br /&gt;
*Python&lt;br /&gt;
 [[File:pyclickme.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note :  Give the test url as shown in the figure, and you will need Python framework supppport to run python file.&lt;br /&gt;
&lt;br /&gt;
$python clickme.py https://www.example.com&amp;quot;&lt;br /&gt;
----&lt;br /&gt;
*Html&lt;br /&gt;
[[File:Hmtl.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note : Load the html in a browser and give the test url in the text area and hit click me button&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
* Creating the test html page.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Click_Me_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Arun Kumar V</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Pyclickme.jpg&amp;diff=204124</id>
		<title>File:Pyclickme.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Pyclickme.jpg&amp;diff=204124"/>
				<updated>2015-12-01T11:26:16Z</updated>
		
		<summary type="html">&lt;p&gt;Arun Kumar V: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Arun Kumar V</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=204119</id>
		<title>OWASP Click Me Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=204119"/>
				<updated>2015-12-01T11:14:19Z</updated>
		
		<summary type="html">&lt;p&gt;Arun Kumar V: /* Download */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:100px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[Image:OWASP Inactive Banner.jpg|800px| link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Inactive_Projects]] &amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Click Me Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project aimed at having a simple GUI which helps to create a test page for Clickjacking attacks.This is an attack which targets the clickable content on a website.&lt;br /&gt;
Clickjacking attack occurs when a malicious site tricks a user into clicking on a hidden element that belong to another site which they have loaded in a hidden frame or iframe.OWASP Click Me tool will help you to test whether your site is vulnerable to this attack by creating a html page that will try to load your web site from a frame.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Sites can use frame breaking scripts and X-Frame-Options set with DENY or SAME ORIGIN values to avoid Clickjacking attacks,by ensuring that their content is not embedded into other sites.&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Click Me Project is free to use. It is licensed under the Apache 2.0 License. &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project provides:&lt;br /&gt;
* Proof of concept for Clickjacking vulnerability .&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Darun.jpg |200px| https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/OWASPClickMe.zip]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
The OWASP Click Me Project: The primary contributors to date have been:&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
==Acknowledgement==&lt;br /&gt;
* [[User:Samantha Groves|Samantha Groves]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* https://www.owasp.org/index.php/Clickjacking&lt;br /&gt;
: OWASP definition on Click jacking or &amp;quot;UI redress attack&amp;quot;&lt;br /&gt;
&lt;br /&gt;
*https://www.owasp.org/index.php/Testing_for_Clickjacking_(OWASP-CS-004)&lt;br /&gt;
: OWASP test guide for Click jacking attacks.&lt;br /&gt;
&lt;br /&gt;
=Download=&lt;br /&gt;
&lt;br /&gt;
Just a click away to get your copy of OWASP Click Me.Here we go !&lt;br /&gt;
==[[Image:Darun.jpg |200px| https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/OWASPClickMe.zip]]==&lt;br /&gt;
&lt;br /&gt;
Click Me is made available in 3 formats ie as a java gui,python tool and as a stand alone html page.&lt;br /&gt;
&lt;br /&gt;
==Snapshot==&lt;br /&gt;
*Java&lt;br /&gt;
[[File:Java.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note :  jar file ,so you will need JRE in your system to run the file.&lt;br /&gt;
Double click the jar file or give &amp;quot;java -jar clickme.jar&amp;quot; in the command prompt.&lt;br /&gt;
----&lt;br /&gt;
*Python&lt;br /&gt;
 [[File:Clickme.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note :  Give the test url as shown in the figure, and you will need Python framework supppport to run python file.&lt;br /&gt;
&lt;br /&gt;
$python clickme.py https://www.example.com&amp;quot;&lt;br /&gt;
----&lt;br /&gt;
*Html&lt;br /&gt;
[[File:Hmtl.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note : Load the html in a browser and give the test url in the text area and hit click me button&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
* Creating the test html page.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Click_Me_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Arun Kumar V</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Python.jpg&amp;diff=204114</id>
		<title>File:Python.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Python.jpg&amp;diff=204114"/>
				<updated>2015-12-01T10:53:03Z</updated>
		
		<summary type="html">&lt;p&gt;Arun Kumar V: Arun Kumar V uploaded a new version of &amp;amp;quot;File:Python.jpg&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Arun Kumar V</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Arun_Kumar_V&amp;diff=204113</id>
		<title>User:Arun Kumar V</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Arun_Kumar_V&amp;diff=204113"/>
				<updated>2015-12-01T10:50:05Z</updated>
		
		<summary type="html">&lt;p&gt;Arun Kumar V: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Me.jpg]]&lt;br /&gt;
&lt;br /&gt;
'''Arun Kumar''' was a Security Analyst at Cognizant,Bangalore,India.&lt;br /&gt;
&lt;br /&gt;
Prior to his current employment he has done M.Tech in Cyber Security from Amrita Viswavidyapeetham,Coimbatore,India&lt;br /&gt;
&lt;br /&gt;
and holds a B.Tech in Computer Science under University of Calicut(Jyothi Engg. College,Thrissur),India.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Project Leader: [https://www.owasp.org/index.php/OWASP_Click_Me_Project OWASP Click Me]&lt;br /&gt;
&lt;br /&gt;
---- &lt;br /&gt;
[[Image:Facebook-32x32.png|50px|link=https://www.facebook.com/ARUNKUMAR.adu]]                   [[Image:Linkedin-32x32.png|50px|link=http://www.linkedin.com/in//beingarun]]&lt;/div&gt;</summary>
		<author><name>Arun Kumar V</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Darun.jpg&amp;diff=190488</id>
		<title>File:Darun.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Darun.jpg&amp;diff=190488"/>
				<updated>2015-02-28T19:28:19Z</updated>
		
		<summary type="html">&lt;p&gt;Arun Kumar V: Arun Kumar V uploaded a new version of &amp;amp;quot;File:Darun.jpg&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Arun Kumar V</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=190487</id>
		<title>OWASP Click Me Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=190487"/>
				<updated>2015-02-28T19:25:22Z</updated>
		
		<summary type="html">&lt;p&gt;Arun Kumar V: /* Click Me to Download */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Click Me Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project aimed at having a simple GUI which helps to create a test page for Clickjacking attacks.This is an attack which targets the clickable content on a website.&lt;br /&gt;
Clickjacking attack occurs when a malicious site tricks a user into clicking on a hidden element that belong to another site which they have loaded in a hidden frame or iframe.OWASP Click Me tool will help you to test whether your site is vulnerable to this attack by creating a html page that will try to load your web site from a frame.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Sites can use frame breaking scripts and X-Frame-Options set with DENY or SAME ORIGIN values to avoid Clickjacking attacks,by ensuring that their content is not embedded into other sites.&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Click Me Project is free to use. It is licensed under the Apache 2.0 License. &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project provides:&lt;br /&gt;
* Proof of concept for Clickjacking vulnerability .&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Darun.jpg |200px| https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/OWASPClickMe.zip]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
The OWASP Click Me Project: The primary contributors to date have been:&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
==Acknowledgement==&lt;br /&gt;
* [[User:Samantha Groves|Samantha Groves]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* https://www.owasp.org/index.php/Clickjacking&lt;br /&gt;
: OWASP definition on Click jacking or &amp;quot;UI redress attack&amp;quot;&lt;br /&gt;
&lt;br /&gt;
*https://www.owasp.org/index.php/Testing_for_Clickjacking_(OWASP-CS-004)&lt;br /&gt;
: OWASP test guide for Click jacking attacks.&lt;br /&gt;
&lt;br /&gt;
=Download=&lt;br /&gt;
&lt;br /&gt;
Just a click away to get your copy of OWASP Click Me.Here we go !&lt;br /&gt;
==[[Image:Darun.jpg |200px| https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/OWASPClickMe.zip]]==&lt;br /&gt;
&lt;br /&gt;
Click Me is made available in 3 formats ie as a java gui,python tool and as a stand alone html page.&lt;br /&gt;
&lt;br /&gt;
==Snapshot==&lt;br /&gt;
*Java&lt;br /&gt;
[[File:Java.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note :  jar file ,so you will need JRE in your system to run the file.&lt;br /&gt;
Double click the jar file or give &amp;quot;java -jar clickme.jar&amp;quot; in the command prompt.&lt;br /&gt;
----&lt;br /&gt;
*Python&lt;br /&gt;
 [[File:Python.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note :  Give the test url as shown in the figure, and you will need Python framework supppport to run python file.&lt;br /&gt;
&lt;br /&gt;
$python clickme.py https://www.example.com&amp;quot;&lt;br /&gt;
----&lt;br /&gt;
*Html&lt;br /&gt;
[[File:Hmtl.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note : Load the html in a browser and give the test url in the text area and hit click me button&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
* Creating the test html page.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Click_Me_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Arun Kumar V</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=190486</id>
		<title>OWASP Click Me Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=190486"/>
				<updated>2015-02-28T19:23:34Z</updated>
		
		<summary type="html">&lt;p&gt;Arun Kumar V: /* Quick Download */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Click Me Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project aimed at having a simple GUI which helps to create a test page for Clickjacking attacks.This is an attack which targets the clickable content on a website.&lt;br /&gt;
Clickjacking attack occurs when a malicious site tricks a user into clicking on a hidden element that belong to another site which they have loaded in a hidden frame or iframe.OWASP Click Me tool will help you to test whether your site is vulnerable to this attack by creating a html page that will try to load your web site from a frame.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Sites can use frame breaking scripts and X-Frame-Options set with DENY or SAME ORIGIN values to avoid Clickjacking attacks,by ensuring that their content is not embedded into other sites.&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Click Me Project is free to use. It is licensed under the Apache 2.0 License. &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project provides:&lt;br /&gt;
* Proof of concept for Clickjacking vulnerability .&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Darun.jpg |200px| https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/OWASPClickMe.zip]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
The OWASP Click Me Project: The primary contributors to date have been:&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
==Acknowledgement==&lt;br /&gt;
* [[User:Samantha Groves|Samantha Groves]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* https://www.owasp.org/index.php/Clickjacking&lt;br /&gt;
: OWASP definition on Click jacking or &amp;quot;UI redress attack&amp;quot;&lt;br /&gt;
&lt;br /&gt;
*https://www.owasp.org/index.php/Testing_for_Clickjacking_(OWASP-CS-004)&lt;br /&gt;
: OWASP test guide for Click jacking attacks.&lt;br /&gt;
&lt;br /&gt;
=Download=&lt;br /&gt;
&lt;br /&gt;
Just a click away to get your copy of OWASP Click Me.Here we go !&lt;br /&gt;
==[https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/OWASPClickMe.zip Click Me to Download]==&lt;br /&gt;
&lt;br /&gt;
Click Me is made available in 3 formats ie as a java gui,python tool and as a stand alone html page.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Snapshot==&lt;br /&gt;
*Java&lt;br /&gt;
[[File:Java.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note :  jar file ,so you will need JRE in your system to run the file.&lt;br /&gt;
Double click the jar file or give &amp;quot;java -jar clickme.jar&amp;quot; in the command prompt.&lt;br /&gt;
----&lt;br /&gt;
*Python&lt;br /&gt;
 [[File:Python.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note :  Give the test url as shown in the figure, and you will need Python framework supppport to run python file.&lt;br /&gt;
&lt;br /&gt;
$python clickme.py https://www.example.com&amp;quot;&lt;br /&gt;
----&lt;br /&gt;
*Html&lt;br /&gt;
[[File:Hmtl.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note : Load the html in a browser and give the test url in the text area and hit click me button&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
* Creating the test html page.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Click_Me_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Arun Kumar V</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Darun.jpg&amp;diff=190485</id>
		<title>File:Darun.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Darun.jpg&amp;diff=190485"/>
				<updated>2015-02-28T19:21:40Z</updated>
		
		<summary type="html">&lt;p&gt;Arun Kumar V: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Arun Kumar V</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=190484</id>
		<title>OWASP Click Me Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=190484"/>
				<updated>2015-02-28T18:42:04Z</updated>
		
		<summary type="html">&lt;p&gt;Arun Kumar V: /* Snapshot */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Click Me Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project aimed at having a simple GUI which helps to create a test page for Clickjacking attacks.This is an attack which targets the clickable content on a website.&lt;br /&gt;
Clickjacking attack occurs when a malicious site tricks a user into clicking on a hidden element that belong to another site which they have loaded in a hidden frame or iframe.OWASP Click Me tool will help you to test whether your site is vulnerable to this attack by creating a html page that will try to load your web site from a frame.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Sites can use frame breaking scripts and X-Frame-Options set with DENY or SAME ORIGIN values to avoid Clickjacking attacks,by ensuring that their content is not embedded into other sites.&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Click Me Project is free to use. It is licensed under the Apache 2.0 License. &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project provides:&lt;br /&gt;
* Proof of concept for Clickjacking vulnerability .&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/OWASPClickMe.zip Click Me]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
The OWASP Click Me Project: The primary contributors to date have been:&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
==Acknowledgement==&lt;br /&gt;
* [[User:Samantha Groves|Samantha Groves]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* https://www.owasp.org/index.php/Clickjacking&lt;br /&gt;
: OWASP definition on Click jacking or &amp;quot;UI redress attack&amp;quot;&lt;br /&gt;
&lt;br /&gt;
*https://www.owasp.org/index.php/Testing_for_Clickjacking_(OWASP-CS-004)&lt;br /&gt;
: OWASP test guide for Click jacking attacks.&lt;br /&gt;
&lt;br /&gt;
=Download=&lt;br /&gt;
&lt;br /&gt;
Just a click away to get your copy of OWASP Click Me.Here we go !&lt;br /&gt;
==[https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/OWASPClickMe.zip Click Me to Download]==&lt;br /&gt;
&lt;br /&gt;
Click Me is made available in 3 formats ie as a java gui,python tool and as a stand alone html page.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Snapshot==&lt;br /&gt;
*Java&lt;br /&gt;
[[File:Java.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note :  jar file ,so you will need JRE in your system to run the file.&lt;br /&gt;
Double click the jar file or give &amp;quot;java -jar clickme.jar&amp;quot; in the command prompt.&lt;br /&gt;
----&lt;br /&gt;
*Python&lt;br /&gt;
 [[File:Python.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note :  Give the test url as shown in the figure, and you will need Python framework supppport to run python file.&lt;br /&gt;
&lt;br /&gt;
$python clickme.py https://www.example.com&amp;quot;&lt;br /&gt;
----&lt;br /&gt;
*Html&lt;br /&gt;
[[File:Hmtl.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note : Load the html in a browser and give the test url in the text area and hit click me button&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
* Creating the test html page.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Click_Me_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Arun Kumar V</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=190483</id>
		<title>OWASP Click Me Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=190483"/>
				<updated>2015-02-28T18:40:52Z</updated>
		
		<summary type="html">&lt;p&gt;Arun Kumar V: /* Snapshot */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Click Me Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project aimed at having a simple GUI which helps to create a test page for Clickjacking attacks.This is an attack which targets the clickable content on a website.&lt;br /&gt;
Clickjacking attack occurs when a malicious site tricks a user into clicking on a hidden element that belong to another site which they have loaded in a hidden frame or iframe.OWASP Click Me tool will help you to test whether your site is vulnerable to this attack by creating a html page that will try to load your web site from a frame.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Sites can use frame breaking scripts and X-Frame-Options set with DENY or SAME ORIGIN values to avoid Clickjacking attacks,by ensuring that their content is not embedded into other sites.&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Click Me Project is free to use. It is licensed under the Apache 2.0 License. &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project provides:&lt;br /&gt;
* Proof of concept for Clickjacking vulnerability .&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/OWASPClickMe.zip Click Me]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
The OWASP Click Me Project: The primary contributors to date have been:&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
==Acknowledgement==&lt;br /&gt;
* [[User:Samantha Groves|Samantha Groves]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* https://www.owasp.org/index.php/Clickjacking&lt;br /&gt;
: OWASP definition on Click jacking or &amp;quot;UI redress attack&amp;quot;&lt;br /&gt;
&lt;br /&gt;
*https://www.owasp.org/index.php/Testing_for_Clickjacking_(OWASP-CS-004)&lt;br /&gt;
: OWASP test guide for Click jacking attacks.&lt;br /&gt;
&lt;br /&gt;
=Download=&lt;br /&gt;
&lt;br /&gt;
Just a click away to get your copy of OWASP Click Me.Here we go !&lt;br /&gt;
==[https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/OWASPClickMe.zip Click Me to Download]==&lt;br /&gt;
&lt;br /&gt;
Click Me is made available in 3 formats ie as a java gui,python tool and as a stand alone html page.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Snapshot==&lt;br /&gt;
*Java&lt;br /&gt;
[[File:Java.jpg]]&lt;br /&gt;
Note :  jar file ,so you will need JRE in your system to run the file.&lt;br /&gt;
Double click the jar file or give &amp;quot;java -jar clickme.jar&amp;quot; in the command prompt.&lt;br /&gt;
----&lt;br /&gt;
*Python&lt;br /&gt;
 [[File:Python.jpg]]&lt;br /&gt;
Note :  Give the test url as shown in the figure, and you will need Python framework supppport to run python file.&lt;br /&gt;
&lt;br /&gt;
$python clickme.py https://www.example.com&amp;quot;&lt;br /&gt;
----&lt;br /&gt;
*Html&lt;br /&gt;
[[File:Hmtl.jpg]]&lt;br /&gt;
Note : Load the html in a browser and give the test url in the text area and hit click me button&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
* Creating the test html page.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Click_Me_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Arun Kumar V</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=190482</id>
		<title>OWASP Click Me Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=190482"/>
				<updated>2015-02-28T18:39:06Z</updated>
		
		<summary type="html">&lt;p&gt;Arun Kumar V: /* Snapshot */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Click Me Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project aimed at having a simple GUI which helps to create a test page for Clickjacking attacks.This is an attack which targets the clickable content on a website.&lt;br /&gt;
Clickjacking attack occurs when a malicious site tricks a user into clicking on a hidden element that belong to another site which they have loaded in a hidden frame or iframe.OWASP Click Me tool will help you to test whether your site is vulnerable to this attack by creating a html page that will try to load your web site from a frame.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Sites can use frame breaking scripts and X-Frame-Options set with DENY or SAME ORIGIN values to avoid Clickjacking attacks,by ensuring that their content is not embedded into other sites.&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Click Me Project is free to use. It is licensed under the Apache 2.0 License. &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project provides:&lt;br /&gt;
* Proof of concept for Clickjacking vulnerability .&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/OWASPClickMe.zip Click Me]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
The OWASP Click Me Project: The primary contributors to date have been:&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
==Acknowledgement==&lt;br /&gt;
* [[User:Samantha Groves|Samantha Groves]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* https://www.owasp.org/index.php/Clickjacking&lt;br /&gt;
: OWASP definition on Click jacking or &amp;quot;UI redress attack&amp;quot;&lt;br /&gt;
&lt;br /&gt;
*https://www.owasp.org/index.php/Testing_for_Clickjacking_(OWASP-CS-004)&lt;br /&gt;
: OWASP test guide for Click jacking attacks.&lt;br /&gt;
&lt;br /&gt;
=Download=&lt;br /&gt;
&lt;br /&gt;
Just a click away to get your copy of OWASP Click Me.Here we go !&lt;br /&gt;
==[https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/OWASPClickMe.zip Click Me to Download]==&lt;br /&gt;
&lt;br /&gt;
Click Me is made available in 3 formats ie as a java gui,python tool and as a stand alone html page.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Snapshot==&lt;br /&gt;
*Java&lt;br /&gt;
[[File:Java.jpg]]&lt;br /&gt;
Note :  jar file ,so you will need JRE in your system to run the file.&lt;br /&gt;
Double click the jar file or give &amp;quot;java -jar clickme.jar&amp;quot; in the command prompt.&lt;br /&gt;
&lt;br /&gt;
*Python&lt;br /&gt;
 [[File:Python.jpg]]&lt;br /&gt;
Note :  Give the test url as shown in the figure, and you will need Python framework supppport to run python file.&lt;br /&gt;
&lt;br /&gt;
$python clickme.py https://www.example.com&amp;quot;&lt;br /&gt;
&lt;br /&gt;
*Html&lt;br /&gt;
[[File:Hmtl.jpg]]&lt;br /&gt;
Note : Load the html in a browser and give the test url in the text area and hit click me button&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
* Creating the test html page.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Click_Me_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Arun Kumar V</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=190481</id>
		<title>OWASP Click Me Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=190481"/>
				<updated>2015-02-28T18:38:36Z</updated>
		
		<summary type="html">&lt;p&gt;Arun Kumar V: /* Snapshot */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Click Me Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project aimed at having a simple GUI which helps to create a test page for Clickjacking attacks.This is an attack which targets the clickable content on a website.&lt;br /&gt;
Clickjacking attack occurs when a malicious site tricks a user into clicking on a hidden element that belong to another site which they have loaded in a hidden frame or iframe.OWASP Click Me tool will help you to test whether your site is vulnerable to this attack by creating a html page that will try to load your web site from a frame.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Sites can use frame breaking scripts and X-Frame-Options set with DENY or SAME ORIGIN values to avoid Clickjacking attacks,by ensuring that their content is not embedded into other sites.&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Click Me Project is free to use. It is licensed under the Apache 2.0 License. &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project provides:&lt;br /&gt;
* Proof of concept for Clickjacking vulnerability .&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/OWASPClickMe.zip Click Me]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
The OWASP Click Me Project: The primary contributors to date have been:&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
==Acknowledgement==&lt;br /&gt;
* [[User:Samantha Groves|Samantha Groves]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* https://www.owasp.org/index.php/Clickjacking&lt;br /&gt;
: OWASP definition on Click jacking or &amp;quot;UI redress attack&amp;quot;&lt;br /&gt;
&lt;br /&gt;
*https://www.owasp.org/index.php/Testing_for_Clickjacking_(OWASP-CS-004)&lt;br /&gt;
: OWASP test guide for Click jacking attacks.&lt;br /&gt;
&lt;br /&gt;
=Download=&lt;br /&gt;
&lt;br /&gt;
Just a click away to get your copy of OWASP Click Me.Here we go !&lt;br /&gt;
==[https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/OWASPClickMe.zip Click Me to Download]==&lt;br /&gt;
&lt;br /&gt;
Click Me is made available in 3 formats ie as a java gui,python tool and as a stand alone html page.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Snapshot==&lt;br /&gt;
*==Java== &lt;br /&gt;
[[File:Java.jpg]]&lt;br /&gt;
Note :  jar file ,so you will need JRE in your system to run the file.&lt;br /&gt;
Double click the jar file or give &amp;quot;java -jar clickme.jar&amp;quot; in the command prompt.&lt;br /&gt;
&lt;br /&gt;
*==Python==&lt;br /&gt;
 [[File:Python.jpg]]&lt;br /&gt;
Note :  Give the test url as shown in the figure, and you will need Python framework supppport to run python file.&lt;br /&gt;
&lt;br /&gt;
$python clickme.py https://www.example.com&amp;quot;&lt;br /&gt;
&lt;br /&gt;
*==Html==&lt;br /&gt;
[[File:Hmtl.jpg]]&lt;br /&gt;
Note : Load the html in a browser and give the test url in the text area and hit click me button&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
* Creating the test html page.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Click_Me_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Arun Kumar V</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=190480</id>
		<title>OWASP Click Me Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=190480"/>
				<updated>2015-02-28T18:36:14Z</updated>
		
		<summary type="html">&lt;p&gt;Arun Kumar V: /* Snapshot */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Click Me Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project aimed at having a simple GUI which helps to create a test page for Clickjacking attacks.This is an attack which targets the clickable content on a website.&lt;br /&gt;
Clickjacking attack occurs when a malicious site tricks a user into clicking on a hidden element that belong to another site which they have loaded in a hidden frame or iframe.OWASP Click Me tool will help you to test whether your site is vulnerable to this attack by creating a html page that will try to load your web site from a frame.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Sites can use frame breaking scripts and X-Frame-Options set with DENY or SAME ORIGIN values to avoid Clickjacking attacks,by ensuring that their content is not embedded into other sites.&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Click Me Project is free to use. It is licensed under the Apache 2.0 License. &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project provides:&lt;br /&gt;
* Proof of concept for Clickjacking vulnerability .&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/OWASPClickMe.zip Click Me]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
The OWASP Click Me Project: The primary contributors to date have been:&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
==Acknowledgement==&lt;br /&gt;
* [[User:Samantha Groves|Samantha Groves]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* https://www.owasp.org/index.php/Clickjacking&lt;br /&gt;
: OWASP definition on Click jacking or &amp;quot;UI redress attack&amp;quot;&lt;br /&gt;
&lt;br /&gt;
*https://www.owasp.org/index.php/Testing_for_Clickjacking_(OWASP-CS-004)&lt;br /&gt;
: OWASP test guide for Click jacking attacks.&lt;br /&gt;
&lt;br /&gt;
=Download=&lt;br /&gt;
&lt;br /&gt;
Just a click away to get your copy of OWASP Click Me.Here we go !&lt;br /&gt;
==[https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/OWASPClickMe.zip Click Me to Download]==&lt;br /&gt;
&lt;br /&gt;
Click Me is made available in 3 formats ie as a java gui,python tool and as a stand alone html page.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Snapshot==&lt;br /&gt;
* [[File:Java.jpg]]&lt;br /&gt;
Note :  jar file ,so you will need JRE in your system to run the file.&lt;br /&gt;
&lt;br /&gt;
* [[File:Python.jpg]]&lt;br /&gt;
Note :  Give the test url as shown in the figure, and you will need Python framework supppport to run python file.&lt;br /&gt;
&lt;br /&gt;
$python clickme.py https://www.example.com&amp;quot;&lt;br /&gt;
&lt;br /&gt;
* [[File:Hmtl.jpg]]&lt;br /&gt;
Note : Load the html in a browser and give the test url in the text area and hit click me button&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
* Creating the test html page.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Click_Me_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Arun Kumar V</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Hmtl.jpg&amp;diff=190479</id>
		<title>File:Hmtl.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Hmtl.jpg&amp;diff=190479"/>
				<updated>2015-02-28T18:33:41Z</updated>
		
		<summary type="html">&lt;p&gt;Arun Kumar V: Arun Kumar V uploaded a new version of &amp;amp;quot;File:Hmtl.jpg&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Arun Kumar V</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=190478</id>
		<title>OWASP Click Me Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=190478"/>
				<updated>2015-02-28T18:31:13Z</updated>
		
		<summary type="html">&lt;p&gt;Arun Kumar V: /* Snapshot */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Click Me Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project aimed at having a simple GUI which helps to create a test page for Clickjacking attacks.This is an attack which targets the clickable content on a website.&lt;br /&gt;
Clickjacking attack occurs when a malicious site tricks a user into clicking on a hidden element that belong to another site which they have loaded in a hidden frame or iframe.OWASP Click Me tool will help you to test whether your site is vulnerable to this attack by creating a html page that will try to load your web site from a frame.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Sites can use frame breaking scripts and X-Frame-Options set with DENY or SAME ORIGIN values to avoid Clickjacking attacks,by ensuring that their content is not embedded into other sites.&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Click Me Project is free to use. It is licensed under the Apache 2.0 License. &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project provides:&lt;br /&gt;
* Proof of concept for Clickjacking vulnerability .&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/OWASPClickMe.zip Click Me]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
The OWASP Click Me Project: The primary contributors to date have been:&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
==Acknowledgement==&lt;br /&gt;
* [[User:Samantha Groves|Samantha Groves]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* https://www.owasp.org/index.php/Clickjacking&lt;br /&gt;
: OWASP definition on Click jacking or &amp;quot;UI redress attack&amp;quot;&lt;br /&gt;
&lt;br /&gt;
*https://www.owasp.org/index.php/Testing_for_Clickjacking_(OWASP-CS-004)&lt;br /&gt;
: OWASP test guide for Click jacking attacks.&lt;br /&gt;
&lt;br /&gt;
=Download=&lt;br /&gt;
&lt;br /&gt;
Just a click away to get your copy of OWASP Click Me.Here we go !&lt;br /&gt;
==[https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/OWASPClickMe.zip Click Me to Download]==&lt;br /&gt;
&lt;br /&gt;
Click Me is made available in 3 formats ie as a java gui,python tool and as a stand alone html page.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Snapshot==&lt;br /&gt;
[[File:Java.jpg]]&lt;br /&gt;
Note :  jar file ,so you will need JRE in your system to run the file.&lt;br /&gt;
&lt;br /&gt;
[[File:Python.jpg]]&lt;br /&gt;
Note :  Give the test url as shown in the figure, and you will need Python framework supppport to run python file.&lt;br /&gt;
&lt;br /&gt;
$python clickme.py https://www.example.com&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[File:Html.jpg]]&lt;br /&gt;
Note : Load the html in a browser and give the test url in the text area and hit click me button&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
* Creating the test html page.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Click_Me_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Arun Kumar V</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=190477</id>
		<title>OWASP Click Me Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=190477"/>
				<updated>2015-02-28T18:25:44Z</updated>
		
		<summary type="html">&lt;p&gt;Arun Kumar V: /* Snapshot */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Click Me Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project aimed at having a simple GUI which helps to create a test page for Clickjacking attacks.This is an attack which targets the clickable content on a website.&lt;br /&gt;
Clickjacking attack occurs when a malicious site tricks a user into clicking on a hidden element that belong to another site which they have loaded in a hidden frame or iframe.OWASP Click Me tool will help you to test whether your site is vulnerable to this attack by creating a html page that will try to load your web site from a frame.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Sites can use frame breaking scripts and X-Frame-Options set with DENY or SAME ORIGIN values to avoid Clickjacking attacks,by ensuring that their content is not embedded into other sites.&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Click Me Project is free to use. It is licensed under the Apache 2.0 License. &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project provides:&lt;br /&gt;
* Proof of concept for Clickjacking vulnerability .&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/OWASPClickMe.zip Click Me]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
The OWASP Click Me Project: The primary contributors to date have been:&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
==Acknowledgement==&lt;br /&gt;
* [[User:Samantha Groves|Samantha Groves]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* https://www.owasp.org/index.php/Clickjacking&lt;br /&gt;
: OWASP definition on Click jacking or &amp;quot;UI redress attack&amp;quot;&lt;br /&gt;
&lt;br /&gt;
*https://www.owasp.org/index.php/Testing_for_Clickjacking_(OWASP-CS-004)&lt;br /&gt;
: OWASP test guide for Click jacking attacks.&lt;br /&gt;
&lt;br /&gt;
=Download=&lt;br /&gt;
&lt;br /&gt;
Just a click away to get your copy of OWASP Click Me.Here we go !&lt;br /&gt;
==[https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/OWASPClickMe.zip Click Me to Download]==&lt;br /&gt;
&lt;br /&gt;
==Snapshot==&lt;br /&gt;
[[File:Java.jpg]]&lt;br /&gt;
&lt;br /&gt;
Note : OWASP Click Me is a jar file ,so you will need JRE in your system to run the file.&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
* Creating the test html page.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Click_Me_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Arun Kumar V</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Hmtl.jpg&amp;diff=190476</id>
		<title>File:Hmtl.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Hmtl.jpg&amp;diff=190476"/>
				<updated>2015-02-28T18:22:50Z</updated>
		
		<summary type="html">&lt;p&gt;Arun Kumar V: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Arun Kumar V</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Python.jpg&amp;diff=190475</id>
		<title>File:Python.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Python.jpg&amp;diff=190475"/>
				<updated>2015-02-28T18:22:30Z</updated>
		
		<summary type="html">&lt;p&gt;Arun Kumar V: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Arun Kumar V</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Java.jpg&amp;diff=190474</id>
		<title>File:Java.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Java.jpg&amp;diff=190474"/>
				<updated>2015-02-28T18:22:01Z</updated>
		
		<summary type="html">&lt;p&gt;Arun Kumar V: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Arun Kumar V</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=190473</id>
		<title>OWASP Click Me Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=190473"/>
				<updated>2015-02-28T18:06:32Z</updated>
		
		<summary type="html">&lt;p&gt;Arun Kumar V: /* Get Involved */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Click Me Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project aimed at having a simple GUI which helps to create a test page for Clickjacking attacks.This is an attack which targets the clickable content on a website.&lt;br /&gt;
Clickjacking attack occurs when a malicious site tricks a user into clicking on a hidden element that belong to another site which they have loaded in a hidden frame or iframe.OWASP Click Me tool will help you to test whether your site is vulnerable to this attack by creating a html page that will try to load your web site from a frame.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Sites can use frame breaking scripts and X-Frame-Options set with DENY or SAME ORIGIN values to avoid Clickjacking attacks,by ensuring that their content is not embedded into other sites.&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Click Me Project is free to use. It is licensed under the Apache 2.0 License. &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project provides:&lt;br /&gt;
* Proof of concept for Clickjacking vulnerability .&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/OWASPClickMe.zip Click Me]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
The OWASP Click Me Project: The primary contributors to date have been:&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
==Acknowledgement==&lt;br /&gt;
* [[User:Samantha Groves|Samantha Groves]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* https://www.owasp.org/index.php/Clickjacking&lt;br /&gt;
: OWASP definition on Click jacking or &amp;quot;UI redress attack&amp;quot;&lt;br /&gt;
&lt;br /&gt;
*https://www.owasp.org/index.php/Testing_for_Clickjacking_(OWASP-CS-004)&lt;br /&gt;
: OWASP test guide for Click jacking attacks.&lt;br /&gt;
&lt;br /&gt;
=Download=&lt;br /&gt;
&lt;br /&gt;
Just a click away to get your copy of OWASP Click Me.Here we go !&lt;br /&gt;
==[https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/OWASPClickMe.zip Click Me to Download]==&lt;br /&gt;
&lt;br /&gt;
==Snapshot==&lt;br /&gt;
[[File:OWASPClickMe.jpg]]&lt;br /&gt;
&lt;br /&gt;
Note : OWASP Click Me is a jar file ,so you will need JRE in your system to run the file.&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
* Creating the test html page.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Click_Me_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Arun Kumar V</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=190472</id>
		<title>OWASP Click Me Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=190472"/>
				<updated>2015-02-28T18:05:39Z</updated>
		
		<summary type="html">&lt;p&gt;Arun Kumar V: /* Get Involved */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Click Me Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project aimed at having a simple GUI which helps to create a test page for Clickjacking attacks.This is an attack which targets the clickable content on a website.&lt;br /&gt;
Clickjacking attack occurs when a malicious site tricks a user into clicking on a hidden element that belong to another site which they have loaded in a hidden frame or iframe.OWASP Click Me tool will help you to test whether your site is vulnerable to this attack by creating a html page that will try to load your web site from a frame.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Sites can use frame breaking scripts and X-Frame-Options set with DENY or SAME ORIGIN values to avoid Clickjacking attacks,by ensuring that their content is not embedded into other sites.&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Click Me Project is free to use. It is licensed under the Apache 2.0 License. &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project provides:&lt;br /&gt;
* Proof of concept for Clickjacking vulnerability .&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/OWASPClickMe.zip Click Me]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
The OWASP Click Me Project: The primary contributors to date have been:&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
==Acknowledgement==&lt;br /&gt;
* [[User:Samantha Groves|Samantha Groves]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* https://www.owasp.org/index.php/Clickjacking&lt;br /&gt;
: OWASP definition on Click jacking or &amp;quot;UI redress attack&amp;quot;&lt;br /&gt;
&lt;br /&gt;
*https://www.owasp.org/index.php/Testing_for_Clickjacking_(OWASP-CS-004)&lt;br /&gt;
: OWASP test guide for Click jacking attacks.&lt;br /&gt;
&lt;br /&gt;
=Download=&lt;br /&gt;
&lt;br /&gt;
Just a click away to get your copy of OWASP Click Me.Here we go !&lt;br /&gt;
==[https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/OWASPClickMe.zip Click Me to Download]==&lt;br /&gt;
&lt;br /&gt;
==Snapshot==&lt;br /&gt;
[[File:OWASPClickMe.jpg]]&lt;br /&gt;
&lt;br /&gt;
Note : OWASP Click Me is a jar file ,so you will need JRE in your system to run the file.&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
* Creating the test html page.&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Click Me Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
*Create a GUI which will help to provide a Proof of Concept on how the attack could be exploited for a given web page.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Click_Me_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Arun Kumar V</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=178848</id>
		<title>OWASP Click Me Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=178848"/>
				<updated>2014-07-16T07:35:58Z</updated>
		
		<summary type="html">&lt;p&gt;Arun Kumar V: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Click Me Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project aimed at having a simple GUI which helps to create a test page for Clickjacking attacks.This is an attack which targets the clickable content on a website.&lt;br /&gt;
Clickjacking attack occurs when a malicious site tricks a user into clicking on a hidden element that belong to another site which they have loaded in a hidden frame or iframe.OWASP Click Me tool will help you to test whether your site is vulnerable to this attack by creating a html page that will try to load your web site from a frame.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Sites can use frame breaking scripts and X-Frame-Options set with DENY or SAME ORIGIN values to avoid Clickjacking attacks,by ensuring that their content is not embedded into other sites.&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Click Me Project is free to use. It is licensed under the Apache 2.0 License. &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project provides:&lt;br /&gt;
* Proof of concept for Clickjacking vulnerability .&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/OWASPClickMe.zip Click Me]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
The OWASP Click Me Project: The primary contributors to date have been:&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
==Acknowledgement==&lt;br /&gt;
* [[User:Samantha Groves|Samantha Groves]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* https://www.owasp.org/index.php/Clickjacking&lt;br /&gt;
: OWASP definition on Click jacking or &amp;quot;UI redress attack&amp;quot;&lt;br /&gt;
&lt;br /&gt;
*https://www.owasp.org/index.php/Testing_for_Clickjacking_(OWASP-CS-004)&lt;br /&gt;
: OWASP test guide for Click jacking attacks.&lt;br /&gt;
&lt;br /&gt;
=Download=&lt;br /&gt;
&lt;br /&gt;
Just a click away to get your copy of OWASP Click Me.Here we go !&lt;br /&gt;
==[https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/OWASPClickMe.zip Click Me to Download]==&lt;br /&gt;
&lt;br /&gt;
==Snapshot==&lt;br /&gt;
[[File:OWASPClickMe.jpg]]&lt;br /&gt;
&lt;br /&gt;
Note : OWASP Click Me is a jar file ,so you will need JRE in your system to run the file.&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
As of March 2014, the priorities are:&lt;br /&gt;
* Creating the test html page.&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Click Me Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
*Create a GUI which will help to provide a Proof of Concept on how the attack could be exploited for a given web page.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Click_Me_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Arun Kumar V</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=169792</id>
		<title>OWASP Click Me Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=169792"/>
				<updated>2014-03-08T15:08:40Z</updated>
		
		<summary type="html">&lt;p&gt;Arun Kumar V: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Click Me Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project aimed at having a simple GUI which helps to create a test page for Clickjacking attacks.This is an attack which targets the clickable content on a website.&lt;br /&gt;
Clickjacking attack occurs when a malicious site tricks a user into clicking on a hidden element that belong to another site which they have loaded in a hidden frame or iframe.OWASP Click Me tool will help you to test whether your site is vulnerable to this attack by creating a html page that will try to load your web site from a frame.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Sites can use frame breaking scripts and X-Frame-Options set with DENY or SAME ORIGIN values to avoid Clickjacking attacks,by ensuring that their content is not embedded into other sites.&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Click Me Project is free to use. It is licensed under the Apache 2.0 License. &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project provides:&lt;br /&gt;
&lt;br /&gt;
* Proof of concept for Clickjacking vulnerability .&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/OWASPClickMe.zip Click Me]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
The OWASP Click Me Project: The primary contributors to date have been:&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
==Acknowledgement==&lt;br /&gt;
* [[User:Samantha Groves|Samantha Groves]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* https://www.owasp.org/index.php/Clickjacking&lt;br /&gt;
: OWASP definition on Click jacking or &amp;quot;UI redress attack&amp;quot;&lt;br /&gt;
&lt;br /&gt;
*https://www.owasp.org/index.php/Testing_for_Clickjacking_(OWASP-CS-004)&lt;br /&gt;
: OWASP test guide for Click jacking attacks.&lt;br /&gt;
&lt;br /&gt;
=Download=&lt;br /&gt;
&lt;br /&gt;
Just a click away to get your copy of OWASP Click Me.Here we go !&lt;br /&gt;
==[https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/OWASPClickMe.zip Click Me to Download]==&lt;br /&gt;
&lt;br /&gt;
==Snapshot==&lt;br /&gt;
[[File:OWASPClickMe.jpg]]&lt;br /&gt;
&lt;br /&gt;
Note : OWASP Click Me is a jar file ,so you will need JRE in your system to run the file.&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
As of March 2014, the priorities are:&lt;br /&gt;
* Creating the test html page.&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Click Me Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
*Create a GUI which will help to provide a Proof of Concept on how the attack could be exploited for a given web page.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Click_Me_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Arun Kumar V</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=169518</id>
		<title>OWASP Click Me Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=169518"/>
				<updated>2014-03-05T19:38:45Z</updated>
		
		<summary type="html">&lt;p&gt;Arun Kumar V: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Click Me Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project aimed at having a simple GUI which helps to create a test page for Clickjacking attacks.This is an attack which targets the clickable content on a website.&lt;br /&gt;
Clickjacking attack occurs when a malicious site tricks a user into clicking on a hidden element that belong to another site which they have loaded in a hidden frame or iframe.OWASP Click Me tool will help you to test whether your site is vulnerable to this attack by creating a html page that will try to load your web site from a frame.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Sites can use frame breaking scripts and X-Frame-Options set with DENY or SAME ORIGIN values to avoid Clickjacking attacks,by ensuring that their content is not embedded into other sites.&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Click Me Project is free to use. It is licensed under the Apache 2.0 License. &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project provides:&lt;br /&gt;
&lt;br /&gt;
* Proof of concept for Clickjacking vulnerability .&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/OWASP.ClickMe.jar Click Me]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
The OWASP Click Me Project: The primary contributors to date have been:&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
==Acknowledgement==&lt;br /&gt;
* [[User:Samantha Groves|Samantha Groves]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* https://www.owasp.org/index.php/Clickjacking&lt;br /&gt;
: OWASP definition on Click jacking or &amp;quot;UI redress attack&amp;quot;&lt;br /&gt;
&lt;br /&gt;
*https://www.owasp.org/index.php/Testing_for_Clickjacking_(OWASP-CS-004)&lt;br /&gt;
: OWASP test guide for Click jacking attacks.&lt;br /&gt;
&lt;br /&gt;
=Download=&lt;br /&gt;
&lt;br /&gt;
Just a click away to get your copy of OWASP Click Me.Here we go !&lt;br /&gt;
==[https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/OWASP.ClickMe.jar Click Me to Download]==&lt;br /&gt;
&lt;br /&gt;
==Snapshot==&lt;br /&gt;
[[File:OWASPClickMe.jpg]]&lt;br /&gt;
&lt;br /&gt;
Note : OWASP Click Me is a jar file ,so you will need JRE in your system to run the file.&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
As of March 2014, the priorities are:&lt;br /&gt;
* Creating the test html page.&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Click Me Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
*Create a GUI which will help to provide a Proof of Concept on how the attack could be exploited for a given web page.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Click_Me_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Arun Kumar V</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=169517</id>
		<title>OWASP Click Me Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=169517"/>
				<updated>2014-03-05T19:37:39Z</updated>
		
		<summary type="html">&lt;p&gt;Arun Kumar V: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Click Me Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project aimed at having a simple GUI which helps to create a test page for Clickjacking attacks.This is an attack which targets the clickable content on a website.&lt;br /&gt;
Clickjacking attack occurs when a malicious site tricks a user into clicking on a hidden element that belong to another site which they have loaded in a hidden frame or iframe.OWASP Click Me tool will help you to test whether your site is vulnerable to this attack by creating a html page that will try to load your web site from a frame.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Sites can use frame breaking scripts and X-Frame-Options set with DENY or SAME ORIGIN values to avoid Clickjacking attacks,by ensuring that their content is not embedded into other sites.&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Click Me Project is free to use. It is licensed under the Apache 2.0 License. &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project provides:&lt;br /&gt;
&lt;br /&gt;
* Proof of concept for Clickjacking vulnerability .&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/OWASP.ClickMe.jar Click Me]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
The OWASP Click Me Project: The primary contributors to date have been:&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
==Acknowledgement==&lt;br /&gt;
* [[User:Samantha Groves|Samantha Groves]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* https://www.owasp.org/index.php/Clickjacking&lt;br /&gt;
: OWASP definition on Click jacking or &amp;quot;UI redress attack&amp;quot;&lt;br /&gt;
&lt;br /&gt;
*https://www.owasp.org/index.php/Testing_for_Clickjacking_(OWASP-CS-004)&lt;br /&gt;
: OWASP test guide for Click jacking attacks.&lt;br /&gt;
&lt;br /&gt;
=Download=&lt;br /&gt;
&lt;br /&gt;
Just a click away to get your copy of OWASP Click Me.Here we go !&lt;br /&gt;
==[https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/OWASP.ClickMe.jar Click Me]==&lt;br /&gt;
&lt;br /&gt;
==Snapshot==&lt;br /&gt;
[[File:OWASPClickMe.jpg]]&lt;br /&gt;
&lt;br /&gt;
Note : OWASP Click Me is a jar file ,so you will need JRE in your system to run the file.&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
As of March 2014, the priorities are:&lt;br /&gt;
* Creating the test html page.&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Click Me Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
*Create a GUI which will help to provide a Proof of Concept on how the attack could be exploited for a given web page.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Click_Me_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Arun Kumar V</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=169516</id>
		<title>OWASP Click Me Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=169516"/>
				<updated>2014-03-05T19:36:18Z</updated>
		
		<summary type="html">&lt;p&gt;Arun Kumar V: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Click Me Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project aimed at having a simple GUI which helps to create a test page for Clickjacking attacks.This is an attack which targets the clickable content on a website.&lt;br /&gt;
Clickjacking attack occurs when a malicious site tricks a user into clicking on a hidden element that belong to another site which they have loaded in a hidden frame or iframe.OWASP Click Me tool will help you to test whether your site is vulnerable to this attack by creating a html page that will try to load your web site from a frame.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Sites can use frame breaking scripts and X-Frame-Options set with DENY or SAME ORIGIN values to avoid Clickjacking attacks,by ensuring that their content is not embedded into other sites.&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Click Me Project is free to use. It is licensed under the Apache 2.0 License. &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project provides:&lt;br /&gt;
&lt;br /&gt;
* Proof of concept for Clickjacking vulnerability .&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/OWASP.ClickMe.jar Click Me]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
The OWASP Click Me Project: The primary contributors to date have been:&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
==Acknowledgement==&lt;br /&gt;
* [[User:Samantha Groves|Samantha Groves]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* https://www.owasp.org/index.php/Clickjacking&lt;br /&gt;
: OWASP definition on Click jacking or &amp;quot;UI redress attack&amp;quot;&lt;br /&gt;
&lt;br /&gt;
*https://www.owasp.org/index.php/Testing_for_Clickjacking_(OWASP-CS-004)&lt;br /&gt;
: OWASP test guide for Click jacking attacks.&lt;br /&gt;
&lt;br /&gt;
=Download=&lt;br /&gt;
&lt;br /&gt;
Just a click away to get your copy of OWASP Click Me.Here we go !&lt;br /&gt;
==[https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/OWASP.ClickMe.jar Click Me]==&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==Snapshot==&lt;br /&gt;
[[File:OWASPClickMe.jpg]]&lt;br /&gt;
&lt;br /&gt;
Note : OWASP Click Me is a jar file ,so you will need JRE in your system to run the file.&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
As of March 2014, the priorities are:&lt;br /&gt;
* Creating the test html page.&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Click Me Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
*Create a GUI which will help to provide a Proof of Concept on how the attack could be exploited for a given web page.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Click_Me_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Arun Kumar V</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=169515</id>
		<title>OWASP Click Me Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=169515"/>
				<updated>2014-03-05T19:34:55Z</updated>
		
		<summary type="html">&lt;p&gt;Arun Kumar V: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Click Me Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project aimed at having a simple GUI which helps to create a test page for Clickjacking attacks.This is an attack which targets the clickable content on a website.&lt;br /&gt;
Clickjacking attack occurs when a malicious site tricks a user into clicking on a hidden element that belong to another site which they have loaded in a hidden frame or iframe.OWASP Click Me tool will help you to test whether your site is vulnerable to this attack by creating a html page that will try to load your web site from a frame.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Sites can use frame breaking scripts and X-Frame-Options set with DENY or SAME ORIGIN values to avoid Clickjacking attacks,by ensuring that their content is not embedded into other sites.&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Click Me Project is free to use. It is licensed under the Apache 2.0 License. &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project provides:&lt;br /&gt;
&lt;br /&gt;
* Proof of concept for Clickjacking vulnerability .&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/OWASP.ClickMe.jar Click Me]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
The OWASP Click Me Project: The primary contributors to date have been:&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
==Acknowledgement==&lt;br /&gt;
* [[User:Samantha Groves|Samantha Groves]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* https://www.owasp.org/index.php/Clickjacking&lt;br /&gt;
: OWASP definition on Click jacking or &amp;quot;UI redress attack&amp;quot;&lt;br /&gt;
&lt;br /&gt;
*https://www.owasp.org/index.php/Testing_for_Clickjacking_(OWASP-CS-004)&lt;br /&gt;
: OWASP test guide for Click jacking attacks.&lt;br /&gt;
&lt;br /&gt;
=Download=&lt;br /&gt;
&lt;br /&gt;
==Get OWASP Click Me==&lt;br /&gt;
Just a click away to get your copy of OWASP Click Me.Here we go !&lt;br /&gt;
[https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/OWASP.ClickMe.jar Click Me]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==Snapshot==&lt;br /&gt;
[[File:OWASPClickMe.jpg]]&lt;br /&gt;
&lt;br /&gt;
Note : OWASP Click Me is a jar file ,so you will need JRE in your system to run the file.&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
As of March 2014, the priorities are:&lt;br /&gt;
* Creating the test html page.&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Click Me Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
*Create a GUI which will help to provide a Proof of Concept on how the attack could be exploited for a given web page.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Click_Me_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Arun Kumar V</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASPClickMe.jpg&amp;diff=169514</id>
		<title>File:OWASPClickMe.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASPClickMe.jpg&amp;diff=169514"/>
				<updated>2014-03-05T19:31:29Z</updated>
		
		<summary type="html">&lt;p&gt;Arun Kumar V: https://www.owasp.org/index.php/OWASP_Click_Me_Project&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;https://www.owasp.org/index.php/OWASP_Click_Me_Project&lt;/div&gt;</summary>
		<author><name>Arun Kumar V</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Arun_Kumar_V&amp;diff=169499</id>
		<title>User:Arun Kumar V</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Arun_Kumar_V&amp;diff=169499"/>
				<updated>2014-03-05T16:56:28Z</updated>
		
		<summary type="html">&lt;p&gt;Arun Kumar V: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Me.jpg]]&lt;br /&gt;
&lt;br /&gt;
'''Arun Kumar''' is a Security Analyst at Cognizant,Bangalore,India.&lt;br /&gt;
&lt;br /&gt;
Prior to his current employment he has done M.Tech in Cyber Security from Amrita Viswavidyapeetham,Coimbatore,India&lt;br /&gt;
&lt;br /&gt;
and holds a B.Tech in Computer Science under University of Calicut(Jyothi Engg. College,Thrissur),India.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Project Leader: [https://www.owasp.org/index.php/OWASP_Click_Me_Project OWASP Click Me]&lt;br /&gt;
&lt;br /&gt;
---- &lt;br /&gt;
[[Image:Facebook-32x32.png|50px|link=https://www.facebook.com/ARUNKUMAR.adu]]                   [[Image:Linkedin-32x32.png|50px|link=http://www.linkedin.com/in//beingarun]]&lt;/div&gt;</summary>
		<author><name>Arun Kumar V</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Arun_Kumar_V&amp;diff=169498</id>
		<title>User:Arun Kumar V</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Arun_Kumar_V&amp;diff=169498"/>
				<updated>2014-03-05T16:54:41Z</updated>
		
		<summary type="html">&lt;p&gt;Arun Kumar V: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Me.jpg]]&lt;br /&gt;
&lt;br /&gt;
'''Arun Kumar''' is a Security Analyst at Cognizant,Bangalore,India.&lt;br /&gt;
&lt;br /&gt;
Prior to his current employment he has done M.Tech in Cyber Security from Amrita Viswavidyapeetham,Coimbatore,India&lt;br /&gt;
&lt;br /&gt;
and holds a B.Tech in Computer Science under University of Calicut(Jyothi Engg. College,Thrissur),India.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Project Leader: https://www.owasp.org/index.php/OWASP_Click_Me_Project&lt;br /&gt;
&lt;br /&gt;
---- &lt;br /&gt;
[[Image:Facebook-32x32.png|50px|link=https://www.facebook.com/ARUNKUMAR.adu]]                   [[Image:Linkedin-32x32.png|50px|link=http://www.linkedin.com/in//beingarun]]&lt;/div&gt;</summary>
		<author><name>Arun Kumar V</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=169497</id>
		<title>OWASP Click Me Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Click_Me_Project&amp;diff=169497"/>
				<updated>2014-03-05T16:44:21Z</updated>
		
		<summary type="html">&lt;p&gt;Arun Kumar V: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Click Me Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project aimed at having a simple GUI which helps to create a test page for Clickjacking attacks.This is an attack which targets the clickable content on a website.&lt;br /&gt;
Clickjacking attack occurs when a malicious site tricks a user into clicking on a hidden element that belong to another site which they have loaded in a hidden frame or iframe.OWASP Click Me tool will help you to test whether your site is vulnerable to this attack by creating a html page that will try to load your web site from a frame.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Sites can use frame breaking scripts and X-Frame-Options set with DENY or SAME ORIGIN values to avoid Clickjacking attacks,by ensuring that their content is not embedded into other sites.&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Click Me Project is free to use. It is licensed under the Apache 2.0 License. &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The OWASP Click Me Project provides:&lt;br /&gt;
&lt;br /&gt;
* Proof of concept for Clickjacking vulnerability .&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/OWASP.ClickMe.jar Click Me]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
The OWASP Click Me Project: The primary contributors to date have been:&lt;br /&gt;
* [[User:Arun Kumar V|Arun Kumar]]&lt;br /&gt;
&lt;br /&gt;
==Acknowledgement==&lt;br /&gt;
* [[User:Samantha Groves|Samantha Groves]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* https://www.owasp.org/index.php/Clickjacking&lt;br /&gt;
: OWASP definition on Click jacking or &amp;quot;UI redress attack&amp;quot;&lt;br /&gt;
&lt;br /&gt;
*https://www.owasp.org/index.php/Testing_for_Clickjacking_(OWASP-CS-004)&lt;br /&gt;
: OWASP test guide for Click jacking attacks.&lt;br /&gt;
&lt;br /&gt;
=Download=&lt;br /&gt;
&lt;br /&gt;
Just a click away to get your copy of OWASP Click Me.Here we go !&lt;br /&gt;
[https://github.com/beingArunkumar/OWASP-ClickMe/releases/download/v1.0/OWASP.ClickMe.jar Click Me]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note : OWASP Click Me is a jar file ,so you will need JRE in your system to run the file.&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
As of March 2014, the priorities are:&lt;br /&gt;
* Creating the test html page.&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Click Me Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
*Create a GUI which will help to provide a Proof of Concept on how the attack could be exploited for a given web page.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Click_Me_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Arun Kumar V</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Arun_Kumar_V&amp;diff=169496</id>
		<title>User:Arun Kumar V</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Arun_Kumar_V&amp;diff=169496"/>
				<updated>2014-03-05T16:32:55Z</updated>
		
		<summary type="html">&lt;p&gt;Arun Kumar V: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Me.jpg]]&lt;br /&gt;
&lt;br /&gt;
'''Arun Kumar''' is a Security Analyst at Cognizant,Bangalore,India.&lt;br /&gt;
&lt;br /&gt;
Prior to his current employment he has done M.Tech in Cyber Security from Amrita Viswavidyapeetham,Coimbatore,India&lt;br /&gt;
&lt;br /&gt;
and holds a B.Tech in Computer Science under University of Calicut(Jyothi Engg. College,Thrissur),India.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Project Leader: https://www.owasp.org/index.php/OWASP_Click_Me_Project&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Connect &lt;br /&gt;
[[Image:Facebook-32x32.png|50px|link=https://www.facebook.com/ARUNKUMAR.adu]]                   [[Image:Linkedin-32x32.png|50px|link=http://www.linkedin.com/in//beingarun]]&lt;/div&gt;</summary>
		<author><name>Arun Kumar V</name></author>	</entry>

	</feed>