From a90cb7f2c7b91c355a54c08c32f49fbae28b900e Mon Sep 17 00:00:00 2001 From: Aadith Sukumar <62766172+aadi1011@users.noreply.github.com> Date: Mon, 9 Oct 2023 11:38:37 +0530 Subject: [PATCH] Clickjacking Challenge --- Clickjacking/README.md | 17 ++++++++++++++--- 1 file changed, 14 insertions(+), 3 deletions(-) diff --git a/Clickjacking/README.md b/Clickjacking/README.md index a55f425f..512a1177 100644 --- a/Clickjacking/README.md +++ b/Clickjacking/README.md @@ -20,7 +20,7 @@ * [XSS Filter](#xss-filter) * [IE8 XSS filter](#ie8-xss-filter) * [Chrome 4.0 XSSAuditor filter](#chrome-40-xssauditor-filter) -* [Challenge] +* [Challenge](#challenge) * [Practice Environments](#practice-environments) * [Reference](#references) @@ -149,13 +149,14 @@ Example in HTML meta tag: ``` * The previous technique requires the user interaction but, the same result, can be achieved without prompting the user. To do this the attacker have to automatically cancel the incoming navigation request in an onBeforeUnload event handler by repeatedly submitting (for example every millisecond) a navigation request to a web page that responds with a _"HTTP/1.1 204 No Content"_ header. -`204 page` + +
_204 page:_ ```php ``` -`Attacker's Page` +_Attacker's Page_ ```js