This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Click Me Project"
Arun Kumar V (talk | contribs) (→Click Me to Download) |
|||
Line 1: | Line 1: | ||
=Main= | =Main= | ||
− | <div style="width:100%;height: | + | <div style="width:100%;height:100px;border:0,margin:0;overflow: hidden;">[[Image:OWASP Inactive Banner.jpg|800px| link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Inactive_Projects]] </div> |
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |- | {| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |- |
Revision as of 23:05, 9 May 2015
The OWASP Click Me Project: The primary contributors to date have been:
Acknowledgement
References
- OWASP definition on Click jacking or "UI redress attack"
- OWASP test guide for Click jacking attacks.
Just a click away to get your copy of OWASP Click Me.Here we go !
Click Me is made available in 3 formats ie as a java gui,python tool and as a stand alone html page.
Snapshot
- Java
Note : jar file ,so you will need JRE in your system to run the file.
Double click the jar file or give "java -jar clickme.jar" in the command prompt.
- Python
Note : Give the test url as shown in the figure, and you will need Python framework supppport to run python file.
$python clickme.py https://www.example.com"
- Html
Note : Load the html in a browser and give the test url in the text area and hit click me button
As of now, the priorities are:
- Creating the test html page.
PROJECT INFO What does this OWASP project offer you? |
RELEASE(S) INFO What releases are available for this project? | |||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|