ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 80 - PT0-002 discussion

Report
Export

A penetration tester who is conducting a web-application test discovers a clickjacking vulnerability associated with a login page to financial data. Which of the following should the tester do with this information to make this a successful exploit?

A.
Perform XSS.
Answers
A.
Perform XSS.
B.
Conduct a watering-hole attack.
Answers
B.
Conduct a watering-hole attack.
C.
Use BeEF.
Answers
C.
Use BeEF.
D.
Use browser autopwn.
Answers
D.
Use browser autopwn.
Suggested answer: B

Explanation:

A clickjacking vulnerability allows an attacker to trick a user into clicking on a hidden element on a web page, such as a login button or a link. A watering-hole attack is a technique where the attacker compromises a website that is frequently visited by the target users, and injects malicious code or content into the website. The attacker can then use the clickjacking vulnerability to redirect the users to a malicious website or perform unauthorized actions on their behalf.

A) Perform XSS. This is incorrect. XSS (cross-site scripting) is a vulnerability where an attacker injects malicious scripts into a web page that are executed by the browser of the victim. XSS can be used to steal cookies, session tokens, or other sensitive information, but it is not directly related to clickjacking.

C) Use BeEF. This is incorrect. BeEF (Browser Exploitation Framework) is a tool that allows an attacker to exploit various browser vulnerabilities and take control of the browser of the victim. BeEF can be used to launch clickjacking attacks, but it is not the only way to do so.

D) Use browser autopwn. This is incorrect. Browser autopwn is a feature of Metasploit that automatically exploits browser vulnerabilities and delivers a payload to the victim's system. Browser autopwn can be used to compromise the browser of the victim, but it is not directly related to clickjacking.

Reference:

1: OWASP Foundation, "Clickjacking", https://owasp.org/www-community/attacks/Clickjacking

2: PortSwigger, "What is clickjacking? Tutorial & Examples", https://portswigger.net/websecurity/clickjacking

4: Akto, "Clickjacking: Understanding vulnerability, attacks and prevention",

https://www.akto.io/blog/clickjacking-understanding-vulnerability-attacks-and-prevention

asked 02/10/2024
Andrew dela Cruz
35 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first