- The Guide to Finding and Reporting Web Vulnerabilities
- About the Author
- About the Tech Reviewer
- Foreword
- Introduction
- Who This Book Is For
- What Is In This Book
- Happy Hacking!
- 1 Picking a Bug Bounty Program
- 2 Sustaining Your Success
- 3 How the Internet Works
- 4 Environmental Setup and Traffic Interception
- 5 Web Hacking Reconnaissance
- 6 Cross-Site Scripting
- 7 Open Redirects
- 8 Clickjacking
- 9 Cross-Site Request Forgery
- 10 Insecure Direct Object References
- 11 SQL Injection
- 12 Race Conditions
- 13 Server-Side Request Forgery
- 14 Insecure Deserialization
- 15 XML External Entity
- 16 Template Injection
- 17 Application Logic Errors and Broken Access Control
- 18 Remote Code Execution
- 19 Same-Origin Policy Vulnerabilities
- 20 Single-Sign-On Security Issues
- 21 Information Disclosure
- 22 Conducting Code Reviews
- 23 Hacking Android Apps
- 24 API Hacking
- 25 Automatic Vulnerability Discovery Using Fuzzers
A Note on Delivering the Clickjacking Payload
Often in bug bounty reports, you’ll need to show companies that real attackers could effectively exploit the vulnerability you found. That means you need to understand how attackers can exploit clickjacking bugs in the wild.
在漏洞赏金报告中,通常需要向公司展示真正的攻击者如何有效地利用您发现的漏洞。这意味着您需要了解攻击者如何在现实环境中利用点击劫持漏洞。
Clickjacking vulnerabilities rely on user interaction. For the attack to succeed, the attacker would have to construct a site that is convincing enough for users to click. This usually isn’t difficult, since users don’t often take precautions before clicking web pages. But if you want your attack to become more convincing, check out the Social-Engineer Toolkit ( https://github.com/trustedsec/social-engineer-toolkit/ ). This set of tools can, among other things, help you clone famous websites and use them for malicious purposes. You can then place the iframe on the cloned website.
点击劫持漏洞依赖于用户互动。要使攻击成功,攻击者必须构建一个足够令用户点击的网站。通常情况下这不困难,因为用户在点击网页前通常不会采取预防措施。但如果你想让攻击更具说服力,请查看 Social-Engineer Toolkit(https://github.com/trustedsec/social-engineer-toolkit/)。这套工具可以帮助你复制知名网站并将其用于恶意目的。然后,你可以在复制的网站上放置 iframe。
In my experience, the most effective location in which to place the hidden button is directly on top of a Please Accept That This Site Uses Cookies! pop-up. Users usually click this button to close the window without much thought.
根据我的经验,将隐藏的按钮放置在“请接受本网站使用 Cookies!”弹出窗口正上方的位置是最有效的。用户通常会不假思索地点击此按钮来关闭窗口。
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。
绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论