Clickjacking
Last updated
Was this helpful?
Last updated
Was this helpful?
Lots of websites allow to browsers to render them in a <frame>
, <iframe>
, <embed>
or <object>
. This allows attackers to "load" the website in a transparent layer and trick users into thinking they are browsing the legitimate website. This allows attackers to "hijack" their clicks and make them do something else (Twitter worm, Facebook likes).
HTTP security headers like XFO (X-Frame-Options
) and CSP (Content-Security-Policy
) mitigate clickjacking attacks.
The following HTML code can be used in a browser to attempt a clickjacking on a target URL.