This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP Click Me Project"

From OWASP
Jump to: navigation, search
(Snapshot)
(Snapshot)
Line 75: Line 75:
 
Note :  jar file ,so you will need JRE in your system to run the file.
 
Note :  jar file ,so you will need JRE in your system to run the file.
 
Double click the jar file or give "java -jar clickme.jar" in the command prompt.
 
Double click the jar file or give "java -jar clickme.jar" in the command prompt.
 
+
----
 
*Python
 
*Python
 
  [[File:Python.jpg]]
 
  [[File:Python.jpg]]
Line 81: Line 81:
  
 
$python clickme.py https://www.example.com"
 
$python clickme.py https://www.example.com"
 
+
----
 
*Html
 
*Html
 
[[File:Hmtl.jpg]]
 
[[File:Hmtl.jpg]]
 
Note : Load the html in a browser and give the test url in the text area and hit click me button
 
Note : Load the html in a browser and give the test url in the text area and hit click me button
 +
----
  
 
= Get Involved =
 
= Get Involved =

Revision as of 18:40, 28 February 2015

OWASP Project Header.jpg

OWASP Click Me Project

The OWASP Click Me Project aimed at having a simple GUI which helps to create a test page for Clickjacking attacks.This is an attack which targets the clickable content on a website. Clickjacking attack occurs when a malicious site tricks a user into clicking on a hidden element that belong to another site which they have loaded in a hidden frame or iframe.OWASP Click Me tool will help you to test whether your site is vulnerable to this attack by creating a html page that will try to load your web site from a frame.


Sites can use frame breaking scripts and X-Frame-Options set with DENY or SAME ORIGIN values to avoid Clickjacking attacks,by ensuring that their content is not embedded into other sites.

Licensing

The OWASP Click Me Project is free to use. It is licensed under the Apache 2.0 License.

The OWASP Click Me Project provides:

  • Proof of concept for Clickjacking vulnerability .

Project Leader


Quick Download

Click Me

Classifications

Owasp-incubator-trans-85.png Owasp-builders-small.png
Owasp-defenders-small.png
Cc-button-y-sa-small.png
Project Type Files TOOL.jpg