<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>http://debianws.lexgopc.com/wiki143/index.php?action=history&amp;feed=atom&amp;title=Clickjacking</id>
	<title>Clickjacking - Revision history</title>
	<link rel="self" type="application/atom+xml" href="http://debianws.lexgopc.com/wiki143/index.php?action=history&amp;feed=atom&amp;title=Clickjacking"/>
	<link rel="alternate" type="text/html" href="http://debianws.lexgopc.com/wiki143/index.php?title=Clickjacking&amp;action=history"/>
	<updated>2026-05-09T17:54:01Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.43.1</generator>
	<entry>
		<id>http://debianws.lexgopc.com/wiki143/index.php?title=Clickjacking&amp;diff=7414457&amp;oldid=prev</id>
		<title>imported&gt;Maxeto0910: period after sentence</title>
		<link rel="alternate" type="text/html" href="http://debianws.lexgopc.com/wiki143/index.php?title=Clickjacking&amp;diff=7414457&amp;oldid=prev"/>
		<updated>2025-06-19T01:55:00Z</updated>

		<summary type="html">&lt;p&gt;period after sentence&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{Short description|Malicious technique of tricking a Web user}}&lt;br /&gt;
{{Use dmy dates|date=May 2023}}&lt;br /&gt;
[[File:Clickjacking.png|thumb|upright=1.35|In a clickjacking attack, the user is presented with a false interface, where their input is applied to something they cannot see.]]&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Clickjacking&amp;#039;&amp;#039;&amp;#039; (classified as a &amp;#039;&amp;#039;&amp;#039;user interface redress attack&amp;#039;&amp;#039;&amp;#039; or &amp;#039;&amp;#039;&amp;#039;UI redressing&amp;#039;&amp;#039;&amp;#039;) is a [[Malware|malicious technique]] of tricking a [[User (computing)|user]] into clicking on something different from what the user perceives, thus potentially revealing [[Confidentiality|confidential]] information or allowing others to take control of their computer while clicking on seemingly innocuous objects, including [[web page]]s.&amp;lt;ref&amp;gt;{{cite web|archive-url=https://web.archive.org/web/20150717230102/http://www.pcworld.idg.com.au/article/260609/adobe_request_hackers_nix_clickjacking_talk/|archive-date=2015-07-17|url=http://www.pcworld.idg.com.au/index.php/id;979405561|title=At Adobe&amp;#039;s request, hackers nix &amp;#039;clickjacking&amp;#039; talk|author=Robert McMillan|date=17 September 2008|publisher=PC World|access-date=2008-10-08}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite news|url=http://infotech.indiatimes.com/quickiearticleshow/3543527.cms|title=Beware, clickjackers on the prowl|author=Megha Dhawan|date=29 September 2008|access-date=2008-10-08|work=The Times of India|archive-date=24 July 2009|archive-url=https://web.archive.org/web/20090724155021/http://infotech.indiatimes.com/quickiearticleshow/3543527.cms|url-status=dead}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{cite web|url=https://www.theregister.co.uk/2008/10/07/clickjacking_surveillance_zombie/|title=Net game turns PC into undercover surveillance zombie|author=Dan Goodin|date=7 October 2008|work=The Register|access-date=2008-10-08}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{cite web|url=https://news.yahoo.com/s/nf/20081008/bs_nf/62355|title=Web Surfers Face Dangerous New Threat: &amp;#039;Clickjacking&amp;#039;|author=Fredrick Lane|date=8 October 2008|publisher=newsfactor.com|archive-url=https://web.archive.org/web/20081013003436/http://news.yahoo.com/s/nf/20081008/bs_nf/62355|archive-date=13 October 2008|url-status=dead|access-date=2008-10-08}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite journal|last1=Shahriar|first1=Hossain|last2=Devendran|first2=Vamshee Krishna|date=2014-07-04|title=Classification of Clickjacking Attacks and Detection Techniques|url=http://www.tandfonline.com/doi/abs/10.1080/19393555.2014.931489|journal=Information Security Journal: A Global Perspective|language=en|volume=23|issue=4–6|pages=137–147|doi=10.1080/19393555.2014.931489|s2cid=43912852|issn=1939-3555|url-access=subscription}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Clickjacking is an instance of the [[confused deputy problem]], wherein a computer is tricked into misusing its authority.&amp;lt;ref&amp;gt;[http://waterken.sourceforge.net/clickjacking/ The Confused Deputy rides again!], Tyler Close, October 2008&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== History ==&lt;br /&gt;
In 2002, it had been noted that it was possible to load a transparent layer over a [[web page]] and have the user&amp;#039;s input affect the transparent layer without the user noticing.&amp;lt;ref name=&amp;quot;OurEtg&amp;quot;&amp;gt;{{Cite web|url=https://media.blackhat.com/ad-12/Niemietz/bh-ad-12-androidmarcus_niemietz-WP.pdf|title=UI Redressing Attacks on Android Devices|last=Niemietz|first=Marcus|date=2012|website=Black Hat}}&amp;lt;/ref&amp;gt; However, fixes only started to trickle in around 2004,&amp;lt;ref name=&amp;quot;bug_162020&amp;quot;&amp;gt;{{cite web |title=162020 - pop up XPInstall/security dialog when user is about to click (comment 44) |url=https://bugzilla.mozilla.org/show_bug.cgi?id=162020#c44 |website=Mozilla/Firefox bug tracker |language=en}}&amp;lt;/ref&amp;gt; and the general problem was mostly ignored as a major issue until 2008.&amp;lt;ref name=&amp;quot;OurEtg&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In 2008, Jeremiah Grossman and Robert Hansen (of SecTheory) had discovered that [[Adobe Flash Player]] was able to be clickjacked, allowing an [[Security hacker|attacker]] to gain access to a user&amp;#039;s computer without the user&amp;#039;s knowledge.&amp;lt;ref name=&amp;quot;OurEtg&amp;quot; /&amp;gt; Grossman and Hansen coined the term &amp;quot;clickjacking&amp;quot;,&amp;lt;ref&amp;gt;[http://www.securityfocus.com/news/11535/ You don&amp;#039;t know (click)jack] Robert Lemos, October 2008&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite web|url=http://www.sectheory.com/clickjacking.htm|title=Facebook Help Number 1-888-996-3777|last=JAstine|first=Berry|access-date=7 June 2016}}&amp;lt;/ref&amp;gt; a [[portmanteau]] of the words &amp;quot;click&amp;quot; and &amp;quot;hijacking&amp;quot;.&amp;lt;ref name=&amp;quot;OurEtg&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As more attacks of a similar nature were discovered, the focus of the term &amp;quot;UI redressing&amp;quot; was changed to describe the category of these attacks, rather than just clickjacking itself.&amp;lt;ref name=&amp;quot;OurEtg&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
One form of clickjacking takes advantage of vulnerabilities that are present in applications or web pages to allow the attacker to manipulate the user&amp;#039;s computer for their own advantage.&lt;br /&gt;
&lt;br /&gt;
For example, a clickjacked page tricks a user into performing undesired actions by clicking on concealed links. On a clickjacked page, the attackers load another page over the original page in a transparent layer to trick the user into taking actions, the outcomes of which will not be the same as the user expects. The unsuspecting users think that they are clicking visible buttons, while they are actually performing actions on the invisible page, clicking buttons of the page below the layer. The hidden page may be an authentication page; therefore, the attackers can trick users into performing actions which the users never intended. There is no way of tracing such actions to the attackers later, as the users would have been genuinely authenticated on the hidden page.&lt;br /&gt;
&lt;br /&gt;
== Clickjacking categories ==&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039;Classic:&amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039; works mostly through a [[web browser]]&amp;lt;ref name=&amp;quot;OurEtg&amp;quot; /&amp;gt;&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039;Likejacking:&amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039; utilizes [[Facebook|Facebook&amp;#039;s]] social media capabilities&amp;lt;ref&amp;gt;{{Cite news|url=https://nakedsecurity.sophos.com/2010/05/31/viral-clickjacking-like-worm-hits-facebook-users/|title=Viral clickjacking &amp;#039;Like&amp;#039; worm hits Facebook&amp;amp;nbsp;users|date=2010-05-31|work=Naked Security|access-date=2018-10-23|language=en-US}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite news|url=https://nakedsecurity.sophos.com/2010/05/31/facebook-likejacking-worm/|title=Facebook Worm –&amp;amp;nbsp;&amp;quot;Likejacking&amp;quot;|date=2010-05-31|work=Naked Security|access-date=2018-10-23|language=en-US}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039;Nested:&amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039; clickjacking tailored to affect [[Google+]]&amp;lt;ref name=&amp;quot;MrsdKur&amp;quot;&amp;gt;{{Cite web|url=https://www.usenix.org/system/files/conference/woot12/woot12-final16.pdf|title=On the fragility and limitations of current Browser-provided Clickjacking protection schemes|last=Lekies|first=Sebastian|date=2012|website=USENIX}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039;Cursorjacking:&amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039; manipulates the cursor&amp;#039;s appearance and location&amp;lt;ref name=&amp;quot;OurEtg&amp;quot; /&amp;gt;&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039;MouseJacking&amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039;: inject keyboard or mouse input via remote RF link&amp;lt;ref&amp;gt;{{Cite web|url=http://www.mousejack.com/|title=Wireless Mouse Hacks &amp;amp; Network Security Protection|website=MOUSEJACK|language=en|access-date=2020-01-03}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039;Browserless:&amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039; does not use a browser&amp;lt;ref name=&amp;quot;OurEtg&amp;quot; /&amp;gt;&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039;[[Cookiejacking]]:&amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039; acquires cookies from browsers&amp;lt;ref name=&amp;quot;OurEtg&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;Valotta-2011&amp;quot;&amp;gt;{{Cite web|url=https://sites.google.com/site/tentacoloviola/cookiejacking|title=Cookiejacking|last=Valotta|first=Rosario|date=2011|website=tentacoloViola – sites.google.com|access-date=2018-10-23|archive-date=7 August 2019|archive-url=https://web.archive.org/web/20190807214255/https://sites.google.com/site/tentacoloviola/cookiejacking|url-status=dead}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039;Filejacking:&amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039; capable of setting up the affected device as a file server&amp;lt;ref name=&amp;quot;OurEtg&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;MtrDyr&amp;quot;&amp;gt;{{Cite web|url=http://blog.kotowicz.net/2011/04/how-to-make-file-server-from-your.html|title=Filejacking: How to make a file server from your browser (with HTML5 of course)|website=blog.kotowicz.net|access-date=2018-10-23}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;JueSm4&amp;quot;&amp;gt;{{cite web|title=Password Managers: Attacks and Defenses|url=https://www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper-silver.pdf|access-date=26 July 2015}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039;Password manager attack:&amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039; clickjacking that utilizes a vulnerability in the autofill capability of browsers&amp;#039;&amp;#039;&amp;lt;ref name=&amp;quot;OurEtg&amp;quot; /&amp;gt;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
=== Classic ===&lt;br /&gt;
Classic clickjacking refers to a situation when an [[Security hacker|attacker]] uses hidden layers on [[web page]]s to manipulate the actions a user&amp;#039;s cursor does, resulting in misleading the user about what truly is being clicked on.&amp;lt;ref&amp;gt;{{Cite journal |last1=Sahani |first1=Rishabh |last2=Randhawa |first2=Sukhchandan |date=2021-12-01 |title=Clickjacking: Beware of Clicking |url=https://link.springer.com/10.1007/s11277-021-08852-y |journal=Wireless Personal Communications |language=en |volume=121 |issue=4 |pages=2845–2855 |doi=10.1007/s11277-021-08852-y |s2cid=239691334 |issn=0929-6212|url-access=subscription }}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A user might receive an email with a link to a video about a news item, but another webpage, say a product page on [[Amazon (company)|Amazon]], can be &amp;quot;hidden&amp;quot; on top or underneath the &amp;quot;PLAY&amp;quot; button of the news video. The user tries to &amp;quot;play&amp;quot; the video but actually &amp;quot;buys&amp;quot; the product from Amazon. The hacker can only send a single click, so they rely on the fact that the visitor is both logged into [[Amazon (company)|Amazon]] and has 1-click ordering enabled.&lt;br /&gt;
&lt;br /&gt;
While technical implementation of these attacks may be challenging due to cross-browser incompatibilities, a number of tools such as BeEF or [[Metasploit Project]] offer almost fully automated exploitation of clients on vulnerable websites. Clickjacking may be facilitated by – or may facilitate – other web attacks, such as [[Cross-site scripting|XSS]].&amp;lt;ref&amp;gt;{{cite web|url=http://www.exploit-db.com/papers/12987/|title=The Clickjacking meets XSS: a state of art|date=2008-12-26|publisher=Exploit DB|access-date=2015-03-31}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{cite web|url=http://blog.kotowicz.net/2011/03/exploiting-unexploitable-xss-with.html|title=Exploiting the unexploitable XSS with clickjacking|author=Krzysztof Kotowicz|access-date=2015-03-31}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Likejacking===&lt;br /&gt;
Likejacking is a [[Security hacker|malicious technique]] of tricking users viewing a website into &amp;quot;[[Facebook like button|liking]]&amp;quot; a [[Facebook]] page or other [[social media]] posts/accounts that they did not intentionally mean to &amp;quot;like&amp;quot;.&amp;lt;ref&amp;gt;{{cite web|url=http://www.sophos.com/blogs/sophoslabs/?p=9783|title=Facebook Work – &amp;quot;Likejacking&amp;quot;|last=Cohen|first=Richard|date=31 May 2010|publisher=[[Sophos]]|access-date=2010-06-05|archive-url=https://web.archive.org/web/20100604193905/http://www.sophos.com/blogs/sophoslabs/?p=9783|archive-date=4 June 2010|url-status=dead}}&amp;lt;/ref&amp;gt; The term &amp;quot;likejacking&amp;quot; came from a comment posted by Corey Ballou in the article &amp;#039;&amp;#039;How to &amp;quot;Like&amp;quot; Anything on the Web (Safely)&amp;#039;&amp;#039;,&amp;lt;ref name=&amp;quot;corey ballou2&amp;quot;&amp;gt;{{cite web|url=http://www.jqueryin.com/2010/06/02/likejacking-term-catches-on/|title=&amp;quot;Likejacking&amp;quot; Term Catches On|last=Ballou|first=Corey|date=2 June 2010|publisher=jqueryin.com|archive-url=https://web.archive.org/web/20100605073625/http://www.jqueryin.com/2010/06/02/likejacking-term-catches-on/|archive-date=5 June 2010|url-status=dead|access-date=2010-06-08}}&amp;lt;/ref&amp;gt; which is one of the first documented postings explaining the possibility of malicious activity regarding Facebook&amp;#039;s &amp;quot;like&amp;quot; button.&amp;lt;ref&amp;gt;{{cite web|url=http://www.readwriteweb.com/archives/likejacking_takes_off_on_facebook.php|title=&amp;quot;Likejacking&amp;quot; Takes Off on Facebook|last=Perez|first=Sarah|date=2 June 2010|publisher=ReadWriteWeb|access-date=2010-06-05|archive-url=https://web.archive.org/web/20110816223746/http://www.readwriteweb.com/archives/likejacking_takes_off_on_facebook.php|archive-date=16 August 2011|url-status=dead}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
According to an article in &amp;#039;&amp;#039;[[IEEE Spectrum]]&amp;#039;&amp;#039;, a solution to likejacking was developed at one of Facebook&amp;#039;s [[hackathon]]s.&amp;lt;ref&amp;gt;{{cite web|url=https://spectrum.ieee.org/at-work/innovation/facebook-philosophy-move-fast-and-break-things/2|archive-url=https://web.archive.org/web/20110607033033/http://spectrum.ieee.org/at-work/innovation/facebook-philosophy-move-fast-and-break-things/2|url-status=dead|archive-date=7 June 2011|title=Facebook Philosophy: Move Fast and Break Things|last=Kushner|first=David|date=June 2011|publisher=[[IEEE]]|access-date=2011-07-15}}&amp;lt;/ref&amp;gt; A &amp;quot;Like&amp;quot; [[bookmarklet]] is available that avoids the possibility of likejacking present in the [[Facebook like button]].&amp;lt;ref&amp;gt;{{cite news|url=https://readwrite.com/2010/04/22/how_to_like_anything_on_the_web_safely/|title=How to &amp;quot;Like&amp;quot; Anything on the Web (Safely)|last=Perez|first=Sarah|date=23 April 2010|work=ReadWriteWeb|access-date=24 August 2011}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Nested ===&lt;br /&gt;
Nested clickjacking, compared to classic clickjacking, works by embedding a malicious web frame between two frames of the original, harmless [[web page]]: that from the framed page and that which is displayed on the top window. This works due to a vulnerability in the HTTP header &amp;lt;code&amp;gt;X-Frame-Options&amp;lt;/code&amp;gt;, in which, when this element has the value &amp;lt;code&amp;gt;SAMEORIGIN&amp;lt;/code&amp;gt;, the [[web browser]] only checks the two aforementioned layers. The fact that additional frames can be added in between these two while remaining undetected means that [[Security hacker|attackers]] can use this for their benefit.&lt;br /&gt;
&lt;br /&gt;
In the past, with [[Google+]] and the faulty version of &amp;lt;code&amp;gt;X-Frame-Options&amp;lt;/code&amp;gt;, [[Security hacker|attackers]] were able to insert frames of their choice by using the vulnerability present in [[Google Images|Google&amp;#039;s Image Search engine]]. In between the image display frames, which were present in Google+ as well, these attacker-controlled frames were able to load and not be restricted, allowing for the [[Security hacker|attackers]] to mislead whomever came upon the image display page.&amp;lt;ref name=&amp;quot;MrsdKur&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Cursorjacking===&lt;br /&gt;
CursorJacking is a UI redressing technique to change the cursor from the location the user perceives, discovered in 2010 by Eddy Bordi, a researcher at vulnerability.fr.&amp;lt;ref&amp;gt;{{cite web|url=http://podlipensky.com/2012/08/cursor-spoofing-cursorjacking/|title=Cursor Spoofing and Cursorjacking|last1=Podlipensky|first1=Paul|website=Podlipensky.com|publisher=Paul Podlipensky|access-date=22 November 2017|ref=podlipensky|archive-url=https://web.archive.org/web/20171122130512/http://podlipensky.com/2012/08/cursor-spoofing-cursorjacking/|archive-date=22 November 2017|url-status=dead}}&amp;lt;/ref&amp;gt; Marcus Niemietz demonstrated this with a custom cursor icon, and in 2012 Mario Heiderich did so by hiding the cursor.&amp;lt;ref name=&amp;quot;Kotowicz2&amp;quot;&amp;gt;{{cite web|url=http://blog.kotowicz.net/2012/01/cursorjacking-again.html|title=Cursorjacking Again|author=Krzysztof Kotowicz|date=18 January 2012|access-date=2012-01-31}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Jordi Chancel, a researcher at Alternativ-Testing.fr, discovered a CursorJacking vulnerability using Flash, HTML and JavaScript code in Mozilla Firefox on Mac OS X systems (fixed in Firefox 30.0) which can lead to arbitrary code execution and webcam spying.&amp;lt;ref&amp;gt;{{cite web|url=https://www.mozilla.org/security/announce/2014/mfsa2014-50.html|title=Mozilla Foundation Security Advisory 2014-50|publisher=Mozilla|access-date=17 August 2014}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A second CursorJacking vulnerability was again discovered by Jordi Chancel in [[Firefox|Mozilla Firefox]] on [[Mac OS X 10.0|Mac OS X]] systems (fixed in Firefox 37.0) using once again [[Adobe Flash|Flash]], [[HTML]] and [[JavaScript]] code which can also lead to spying via a webcam and the execution of a malicious addon, allowing the execution of malware on the affected user&amp;#039;s computer.&amp;lt;ref&amp;gt;{{cite web|url=https://www.mozilla.org/en-US/security/advisories/mfsa2015-35/|title=Mozilla Foundation Security Advisory 2015-35|publisher=Mozilla|access-date=25 October 2015}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===MouseJack===&lt;br /&gt;
Different from other clickjacking techniques that redress a UI, MouseJack is a wireless hardware-based UI vulnerability first reported by Marc Newlin of Bastille.net in 2016 which allows external keyboard input to be injected into vulnerable dongles.&amp;lt;ref&amp;gt;{{Cite web|url=https://www.bastille.net/research/vulnerabilities/mousejack|title=What is MouseJack!|website=Bastille|language=en-US|access-date=2020-01-03}}&amp;lt;/ref&amp;gt; [[Logitech]] supplied firmware patches but other manufacturers failed to respond to this vulnerability.&amp;lt;ref&amp;gt;{{Cite web|url=https://www.kb.cert.org/vuls/id/981271/|title=CERT VU#981271 Multiple wireless keyboard/mouse devices use an unsafe proprietary wireless protocol|website=kb.cert.org|access-date=2020-01-03}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Browserless ===&lt;br /&gt;
In Browserless clickjacking, [[Security hacker|attackers]] utilize vulnerabilities in programs to replicate classic clickjacking in them, without being required to use the presence of a web browser.&lt;br /&gt;
&lt;br /&gt;
This method of clickjacking is mainly prevalent among mobile devices, usually on [[Android devices]], especially due to the way in which [[Pop-up notification|toast notifications]] work. Because [[Pop-up notification|toast notifications]] have a small delay in between the moment the notification is requested and the moment the notification actually displays on-screen, [[Security hacker|attackers]] are capable of using that gap to create a dummy button that lies hidden underneath the notification and can still be clicked on.&amp;lt;ref name=&amp;quot;OurEtg&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== CookieJacking ===&lt;br /&gt;
CookieJacking is a form of clickjacking in which cookies are stolen from the victim&amp;#039;s [[web browser]]s. This is done by tricking the user into dragging an object which seemingly appears harmless but is in fact making the user select the entire content of the cookie being targeted. From there, the attacker can acquire the cookie and all of the data that it possesses.&amp;lt;ref name=&amp;quot;Valotta-2011&amp;quot; /&amp;gt;{{Clarify|reason=|date=December 2020}}&lt;br /&gt;
&lt;br /&gt;
=== FileJacking ===&lt;br /&gt;
In fileJacking, attackers use the web browser&amp;#039;s capability to navigate through the computer and access computer files in order to acquire personal data. It does so by tricking the user into establishing an active file server (through the file and folder selection window that browsers use). With this, attackers can now access and take files from their victims&amp;#039; computers.&amp;lt;ref name=&amp;quot;MtrDyr&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Password manager attack===&lt;br /&gt;
A 2014 paper from researcher at the [[Carnegie Mellon University]] found that while browsers refuse to autofill if the protocol on the current login page is different from the protocol at the time the password was saved, some [[password manager]]s would insecurely fill in passwords for the http version of https-saved passwords. Most managers did not protect against [[Framing (World Wide Web)|iFrame]]- and [[URL redirection|redirection]]-based [[Attack (computing)|attacks]] and exposed additional passwords where [[password synchronization]] had been used between multiple devices.&amp;lt;ref name=&amp;quot;JueSm4&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Prevention==&lt;br /&gt;
===Client-side===&lt;br /&gt;
====NoScript====&lt;br /&gt;
Protection against clickjacking (including likejacking) can be added to [[Mozilla Firefox]] desktop and mobile&amp;lt;ref&amp;gt;{{cite web|url=http://noscript.net/nsa/|title=NoScript Anywhere|author=Giorgio Maone|date=24 June 2011|publisher=hackademix.net|access-date=2011-06-30}}&amp;lt;/ref&amp;gt; versions by installing the [[NoScript]] add-on: its ClearClick feature, released on 8 October 2008, prevents users from clicking on invisible or &amp;quot;redressed&amp;quot; page elements of embedded documents or applets.&amp;lt;ref&amp;gt;{{cite web|url=http://hackademix.net/2008/10/08/hello-clearclick-goodbye-clickjacking/|title=Hello ClearClick, Goodbye Clickjacking|author=Giorgio Maone|date=8 October 2008|publisher=hackademix.net|access-date=2008-10-27}}&amp;lt;/ref&amp;gt; According to Google&amp;#039;s &amp;quot;Browser Security Handbook&amp;quot; from 2008, NoScript&amp;#039;s ClearClick is a &amp;quot;freely available product that offers a reasonable degree of protection&amp;quot; against Clickjacking.&amp;lt;ref name=&amp;quot;Zalevski2&amp;quot;&amp;gt;{{cite web|url=http://code.google.com/p/browsersec/wiki/Part2#Arbitrary_page_mashups_(UI_redressing)|title=Browser Security Handbook, Part 2, UI Redressing|author=Michal Zalevski|date=10 December 2008|publisher=Google Inc.|access-date=2008-10-27}}&amp;lt;/ref&amp;gt; Protection from the newer cursorjacking attack was added to NoScript 2.2.8 RC1.&amp;lt;ref name=&amp;quot;Kotowicz2&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====NoClickjack====&lt;br /&gt;
The &amp;quot;NoClickjack&amp;quot; web browser add-on ([[browser extension]]) adds client-side clickjack protection for users of [[Google Chrome]], [[Mozilla Firefox]], [[Opera (web browser)|Opera]] and [[Microsoft Edge]] without interfering with the operation of legitimate iFrames. NoClickjack is based on technology developed for GuardedID. The NoClickjack add-on is free of charge.&lt;br /&gt;
&lt;br /&gt;
====GuardedID====&lt;br /&gt;
GuardedID (a commercial product) includes client-side clickjack protection for users of Internet Explorer without interfering with the operation of legitimate iFrames.&amp;lt;ref&amp;gt;{{cite web|url=http://ha.ckers.org/blog/20090204/clickjacking-and-guardedid/|title=Clickjacking and GuardedID ha.ckers.org web application security lab|author=Robert Hansen|date=4 February 2009|access-date=2011-11-30|archive-url=https://archive.today/20120711093803/http://ha.ckers.org/blog/20090204/clickjacking-and-guardedid/|archive-date=11 July 2012|url-status=dead}}&amp;lt;/ref&amp;gt; GuardedID clickjack protection forces all frames to become visible. GuardedID teams{{Clarify|reason=|date=December 2020}} with the add-on NoClickjack to add protection for [[Google Chrome]], [[Mozilla Firefox]], [[Opera (web browser)|Opera]] and [[Microsoft Edge]].&lt;br /&gt;
&lt;br /&gt;
====Gazelle====&lt;br /&gt;
[[Gazelle (web browser)|Gazelle]] is a [[Microsoft Research]] project secure web browser based on IE, that uses an [[Operating System|OS]]-like security model and has its own limited defenses against clickjacking.&amp;lt;ref&amp;gt;{{cite web|url=http://research.microsoft.com/en-us/um/people/helenw/papers/gazelleSecurity09.pdf|title=The Multi-Principal OS Construction of the Gazelle Web Browser|last1=Wang|first1=Helen J.|author-link=Helen J. Wang|last2=Grier|first2=Chris|date=August 2009|publisher=18th Usenix Security Symposium, Montreal, Canada|access-date=2010-01-26|last3=Moschchuk|first3=Alexander|last4=King|first4=Samuel T.|last5=Choudhury|first5=Piali|last6=Venter|first6=Herman}}&amp;lt;/ref&amp;gt; In Gazelle, a window of different origin may only draw dynamic content over another window&amp;#039;s screen space if the content it draws is opaque.&lt;br /&gt;
&lt;br /&gt;
====Intersection Observer v2====&lt;br /&gt;
The Intersection Observer v2 API&amp;lt;ref&amp;gt;{{cite web|url=https://w3c.github.io/IntersectionObserver/v2/|title=Intersection Observer – W3C Editor&amp;#039;s Draft}}&amp;lt;/ref&amp;gt; introduces the concept of tracking the actual &amp;quot;visibility&amp;quot; of a target element as a human being would define it.&amp;lt;ref&amp;gt;{{cite web|url=https://developers.google.com/web/updates/2019/02/intersectionobserver-v2|title=Trust is Good, Observation is Better}}&amp;lt;/ref&amp;gt; This allows a framed widget to detect when it&amp;#039;s being covered. The feature is enabled by default since [[Google Chrome]] 74, released in April 2019.&amp;lt;ref&amp;gt;{{cite web|url=https://m417z.com/De-anonymization-via-Clickjacking-in-2019/|title=De-anonymization via Clickjacking in 2019}}&amp;lt;/ref&amp;gt; The API is also implemented by other [[Chromium (web browser)|Chromium-based]] browsers, such as Microsoft Edge and Opera.&lt;br /&gt;
&lt;br /&gt;
===Server-side===&lt;br /&gt;
====[[Framekiller]]====&lt;br /&gt;
Web site owners can protect their users against UI redressing (frame based clickjacking) on the server side by including a [[framekiller]] JavaScript snippet in those pages they do not want to be included inside frames from different sources.&amp;lt;ref name=&amp;quot;Zalevski2&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Such JavaScript-based protection is not always reliable. This is especially true on Internet Explorer,&amp;lt;ref name=&amp;quot;Zalevski2&amp;quot; /&amp;gt; where this kind of countermeasure can be circumvented &amp;quot;by design&amp;quot; by including the targeted page inside an &amp;lt;syntaxhighlight lang=&amp;quot;HTML&amp;quot; inline&amp;gt;&amp;lt;IFRAME SECURITY=restricted&amp;gt;&amp;lt;/syntaxhighlight&amp;gt; element.&amp;lt;ref name=&amp;quot;hackademix22&amp;quot;&amp;gt;{{cite web|url=http://hackademix.net/2009/01/27/ehy-ie8-i-can-has-some-clickjacking-protection/|title=Hey IE8, I Can Has Some Clickjacking Protection|author=Giorgio Maone|date=27 October 2008|publisher=hackademix.net|access-date=2008-10-27}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====X-Frame-Options====&lt;br /&gt;
Introduced in 2009 in [[Internet Explorer]] 8 was a new HTTP header &amp;lt;code&amp;gt;X-Frame-Options&amp;lt;/code&amp;gt; which offered a partial protection against clickjacking&amp;lt;ref&amp;gt;{{cite web|url=http://blogs.msdn.com/ie/archive/2009/01/27/ie8-security-part-vii-clickjacking-defenses.aspx|title=IE8 Security Part VII: ClickJacking Defenses|author=Eric Lawrence|date=27 January 2009|access-date=2010-12-30}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{cite web|url=http://blogs.msdn.com/b/ieinternals/archive/2010/03/30/combating-clickjacking-with-x-frame-options.aspx|title=Combating ClickJacking With X-Frame-Options|author=Eric Lawrence|date=30 March 2010|access-date=2010-12-30}}&amp;lt;/ref&amp;gt; and was adopted by other browsers ([[Safari (web browser)|Safari]],&amp;lt;ref&amp;gt;{{cite web|url=http://blogs.zdnet.com/security/?p=3541|title=Apple Safari jumbo patch: 50+ vulnerabilities fixed|author=Ryan Naraine|date=8 June 2009|access-date=2009-06-10|archive-date=12 June 2009|archive-url=https://web.archive.org/web/20090612022948/http://blogs.zdnet.com/security/?p=3541|url-status=dead}}&amp;lt;/ref&amp;gt; [[Firefox]],&amp;lt;ref&amp;gt;https://developer.mozilla.org/en/The_X-FRAME-OPTIONS_response_header {{Webarchive|url=https://web.archive.org/web/20101007022651/https://developer.mozilla.org/en/The_X-FRAME-OPTIONS_response_header |date=7 October 2010 }} The X-Frame-Options response header&amp;amp;nbsp;— MDC&amp;lt;/ref&amp;gt; [[Google Chrome|Chrome]],&amp;lt;ref&amp;gt;{{cite web|url=https://blog.chromium.org/2010/01/security-in-depth-new-security-features.html|title=Security in Depth: New Security Features|author=Adam Barth|date=26 January 2010|access-date=2010-01-26}}&amp;lt;/ref&amp;gt; and [[Opera (web browser)|Opera]]&amp;lt;ref&amp;gt;{{cite web|url=http://www.opera.com/docs/specs/presto26/#network|title=Web specifications support in Opera Presto 2.6|date=12 October 2010|access-date=2012-01-22|archive-url=https://web.archive.org/web/20120114183627/http://www.opera.com/docs/specs/presto26/#network|archive-date=14 January 2012|url-status=dead}}&amp;lt;/ref&amp;gt;) shortly afterwards. The header, when set by website owner, declares its preferred framing policy: values of &amp;lt;code&amp;gt;DENY&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;ALLOW-FROM &amp;#039;&amp;#039;origin&amp;#039;&amp;#039;&amp;lt;/code&amp;gt;, or &amp;lt;code&amp;gt;SAMEORIGIN&amp;lt;/code&amp;gt; will prevent any framing, framing by external sites, or allow framing only by the specified site, respectively. In addition to that, some advertising sites return a non-standard &amp;lt;code&amp;gt;ALLOWALL&amp;lt;/code&amp;gt; value with the intention to allow framing their content on any page (equivalent of not setting X-Frame-Options at all).&lt;br /&gt;
&lt;br /&gt;
In 2013 the X-Frame-Options header has been officially published as RFC 7034,&amp;lt;ref&amp;gt;{{cite web|url=http://www.rfc-editor.org/rfc/rfc7034.txt|title=HTTP Header Field X-Frame-Options|year=2013|publisher=IETF}}&amp;lt;/ref&amp;gt; but is not an Internet standard. The document is provided for informational purposes only. The W3C&amp;#039;s Content Security Policy Level 2 Recommendation provides an alternative security directive, frame-ancestors, which is intended to obsolete the X-Frame-Options header.&amp;lt;ref&amp;gt;{{cite web|url=https://www.w3.org/TR/CSP2/#frame-ancestors-and-frame-options|title=Content Security Policy Level 2|year=2016|publisher=W3C}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A security header like X-Frame-Options will not protect users against clickjacking attacks that are not using a frame.&amp;lt;ref&amp;gt;{{cite web|url=https://lcamtuf.blogspot.com/2011/12/x-frame-options-or-solving-wrong.html|title=lcamtuf&amp;#039;s blog: X-Frame-Options, or solving the wrong problem|date=10 December 2011 }}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Content Security Policy====&lt;br /&gt;
The &amp;lt;code&amp;gt;frame-ancestors&amp;lt;/code&amp;gt; directive of [[Content Security Policy]] (introduced in version 1.1) can [[Whitelist|allow]] or disallow embedding of content by potentially hostile pages using iframe, object, etc. This directive obsoletes the X-Frame-Options directive. If a page is served with both headers, the frame-ancestors policy should be preferred by the browser.&amp;lt;ref name=&amp;quot;Content Security Policy Level 22&amp;quot;&amp;gt;{{cite web|url=http://www.w3.org/TR/CSP11/#frame-ancestors-and-frame-options|title=Content Security Policy Level 2|date=2014-07-02|website=w3.org|access-date=2015-01-29}}&amp;lt;/ref&amp;gt;—although some popular browsers disobey this requirement.&amp;lt;ref name=&amp;quot;Clickjacking Defense Cheat Sheet2&amp;quot;&amp;gt;{{cite web|url=https://www.owasp.org/index.php/Clickjacking_Defense_Cheat_Sheet|title=Clickjacking Defense Cheat Sheet|access-date=2016-01-15}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Example frame-ancestors policies:&lt;br /&gt;
 # Disallow embedding. All iframes etc. will be blank, or contain a browser specific error page.&lt;br /&gt;
 Content-Security-Policy: frame-ancestors &amp;#039;none&amp;#039;&lt;br /&gt;
&lt;br /&gt;
 # Allow embedding of [[Same-origin policy|own content]] only.&lt;br /&gt;
 Content-Security-Policy: frame-ancestors &amp;#039;self&amp;#039;&lt;br /&gt;
&lt;br /&gt;
 # Allow specific origins to embed this content&lt;br /&gt;
 Content-Security-Policy: frame-ancestors www.example.com www.wikipedia.org&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
{{Div col}}&lt;br /&gt;
* [[Mousetrapping]]&lt;br /&gt;
* [[Browser security]]&lt;br /&gt;
* [[Click fraud]]&lt;br /&gt;
* [[Cross-site scripting]]&lt;br /&gt;
* [[Internet safety]]&lt;br /&gt;
* [[Internet security]]&lt;br /&gt;
* [[Malvertising]]&lt;br /&gt;
* [[Phishing]]&lt;br /&gt;
* [[Security hacker]]&lt;br /&gt;
* [[Social jacking]]&lt;br /&gt;
{{div col end}}&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{reflist}}&lt;br /&gt;
{{Prone to spam|date=November 2014}}&amp;lt;!--     {{No more links}}&lt;br /&gt;
&lt;br /&gt;
       Please be cautious adding more external links.&lt;br /&gt;
&lt;br /&gt;
Wikipedia is not a collection of links and should not be used for advertising.&lt;br /&gt;
&lt;br /&gt;
     Excessive or inappropriate links will be removed.&lt;br /&gt;
&lt;br /&gt;
 See [[Wikipedia:External links]] and [[Wikipedia:Spam]] for details.&lt;br /&gt;
&lt;br /&gt;
If there are already suitable links, propose additions or replacements on&lt;br /&gt;
the article&amp;#039;s talk page, or submit your link to the relevant category at&lt;br /&gt;
DMOZ (dmoz.org) and link there using {{Dmoz}}.&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;{{Scams and confidence tricks}}{{Malware}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Hacking (computer security)]]&lt;br /&gt;
[[Category:Computing culture]]&lt;br /&gt;
[[Category:Web security exploits]]&lt;br /&gt;
[[Category:Social engineering (security)]]&lt;br /&gt;
[[Category:Client-side web security exploits]]&lt;/div&gt;</summary>
		<author><name>imported&gt;Maxeto0910</name></author>
	</entry>
</feed>