1 00:00:01,160 --> 00:00:09,110 Hello, everyone, and welcome to this video so long we have seen a couple of ways to identify click 2 00:00:09,110 --> 00:00:16,340 checking based vulnerabilities, so we started with manually writing the code from Not Be Real Quick 3 00:00:16,340 --> 00:00:20,420 Jack automated website, basically checking Testor. 4 00:00:20,990 --> 00:00:26,870 We have seen a couple of tools as well that we wrote and we used it to identify click checking based 5 00:00:26,870 --> 00:00:29,660 vulnerabilities with automated Busey's. 6 00:00:30,710 --> 00:00:39,070 So I hope you guys understood this, but it would be incomplete without showing you the power of persued 7 00:00:39,530 --> 00:00:47,150 box would also have awesome feature of ID of click tracking based vulnerability and creating a proof 8 00:00:47,150 --> 00:00:47,890 of concept. 9 00:00:48,470 --> 00:00:57,050 So let's quickly jump into this and let's see how can we utilize Bobzilla hidden feature of ID of click 10 00:00:57,050 --> 00:00:58,930 checking based vulnerabilities. 11 00:00:59,630 --> 00:01:02,240 So first of all, you have to start your bodysuit. 12 00:01:02,480 --> 00:01:06,230 So I'm on to the professional version one point seven point three four. 13 00:01:06,620 --> 00:01:11,420 I just need to click on Pop and I have to click on bop click banded. 14 00:01:12,080 --> 00:01:18,970 So BOP Click Banded is the feature which is used to simulate and create a click Jianqing based PEOC. 15 00:01:19,810 --> 00:01:24,850 All right, so we just need to click on copy click banded to clipboard. 16 00:01:25,220 --> 00:01:30,860 So after you have clicked this, it will automatically copy the code that we are going to use. 17 00:01:31,520 --> 00:01:33,680 Now you just need to go to your browser. 18 00:01:33,800 --> 00:01:36,230 So as you can see, I'm onto my browser right now. 19 00:01:36,560 --> 00:01:39,290 So let me just bring it over here. 20 00:01:39,380 --> 00:01:40,850 Let me reload this as well. 21 00:01:41,600 --> 00:01:47,030 So once you're onto your browser, you have to really click and go to inspect element. 22 00:01:47,510 --> 00:01:54,080 So once you're into the inspect element, go to your console tab and based what we have copied from 23 00:01:54,080 --> 00:01:55,640 there and hit enter. 24 00:01:57,020 --> 00:02:04,190 So once you hit enter, you can see orange glow message over to your screen with this Bob click banded 25 00:02:04,780 --> 00:02:05,470 Elegante. 26 00:02:05,510 --> 00:02:10,640 It is a start finish and on the right hand side it sets record mode. 27 00:02:11,150 --> 00:02:11,600 All right. 28 00:02:11,600 --> 00:02:15,710 So we are going to start you see for that you just need to hit on start. 29 00:02:16,490 --> 00:02:24,290 Once you click on start, it will automatically enable the application that you are going to test for 30 00:02:24,290 --> 00:02:26,390 click jacking based on the abilities. 31 00:02:26,900 --> 00:02:32,630 As you can see, it has successfully loaded into your iFrame, so we have identified it to be vulnerable. 32 00:02:33,440 --> 00:02:37,420 Now we are going to make a few clicks to make up, you see. 33 00:02:37,730 --> 00:02:45,380 So let's assume there is a button which is a delete button over here, which is a sensitive action. 34 00:02:45,380 --> 00:02:48,110 So let's say let's assume this is the delete button for now. 35 00:02:48,440 --> 00:02:54,680 So what we are going to do is we are going to create a PEOC with a sensitive action over here. 36 00:02:55,340 --> 00:02:59,270 So once we have started this, as you can see over here. 37 00:02:59,960 --> 00:03:05,120 So let's click on this so you can see we have been successfully logged out. 38 00:03:05,420 --> 00:03:09,410 Let's go back to your profile, click on user name, click on. 39 00:03:09,470 --> 00:03:10,790 Let's try to log in again. 40 00:03:12,990 --> 00:03:18,860 And again, log in, click on Will, click on login, and again, we have successfully logged in. 41 00:03:18,870 --> 00:03:20,880 And again, let me click on Log Test. 42 00:03:21,880 --> 00:03:28,330 All right, now let me click on finish and let's see our posse that has been successfully created so 43 00:03:28,330 --> 00:03:29,630 we can see or hear click. 44 00:03:29,650 --> 00:03:33,550 So let me just click over here second click on your profile. 45 00:03:34,060 --> 00:03:35,470 Totally over here. 46 00:03:35,620 --> 00:03:40,240 We have to fill the credentials that is test test and click on login. 47 00:03:40,240 --> 00:03:45,910 And then we get successfully logged in and we click on the logout button over here, which was assumed 48 00:03:45,910 --> 00:03:48,120 to be over delete button. 49 00:03:48,550 --> 00:03:55,090 And again, see if we got a successful message that says you have been clicked and now you just simply 50 00:03:55,090 --> 00:04:01,720 can click on toggle transparency and you cannot see what the application is hidden in the background. 51 00:04:01,930 --> 00:04:03,220 Let me just reset this. 52 00:04:05,150 --> 00:04:11,840 Now, when you reset, everything becomes back to normal, and now we can again start creating our posse. 53 00:04:12,050 --> 00:04:16,710 So to create the posse again, you have to base the code that we have copied over here. 54 00:04:16,730 --> 00:04:18,020 So let me be straight over here. 55 00:04:18,380 --> 00:04:19,970 Hit enter again. 56 00:04:19,970 --> 00:04:20,990 Click on start. 57 00:04:22,620 --> 00:04:27,990 Let's go to your profile, let's quickly logon because it was locked out. 58 00:04:30,460 --> 00:04:35,790 And let's assume this is the delete button, so let's clear this, all right, let's click on Finish 59 00:04:36,220 --> 00:04:40,360 and again, see, these are the clicks that we have made first here. 60 00:04:40,820 --> 00:04:47,050 Then we clicked on the login button and then we clicked over and logged in and then we clicked on the 61 00:04:47,410 --> 00:04:47,770 button. 62 00:04:48,250 --> 00:04:51,820 But we assumed as our delete button. 63 00:04:52,180 --> 00:04:55,550 So you can see you have been successfully clicked back. 64 00:04:56,170 --> 00:04:57,500 So you can see this as well. 65 00:04:57,520 --> 00:04:59,020 So let me just save this. 66 00:04:59,200 --> 00:05:06,730 So let's say we open this with Google Chrome and you can see these are the steps. 67 00:05:09,900 --> 00:05:12,510 And click on login. 68 00:05:13,570 --> 00:05:19,440 You can see this was the delete button that we created now for demonstration purposes, guys, your 69 00:05:19,440 --> 00:05:22,340 is the transparency, which is like this. 70 00:05:22,370 --> 00:05:26,080 So I can also toggle the transparency and save this now again. 71 00:05:26,490 --> 00:05:32,650 And now you can see we can break the victim in saying this is a game and click over here. 72 00:05:32,670 --> 00:05:39,600 So when the victim clicks over here, what will happen is he is unknowingly clicking on the delete button. 73 00:05:39,600 --> 00:05:46,460 And once he clicks on the delete button, there will be his account deleted from the application. 74 00:05:46,800 --> 00:05:49,270 As you can see, this was for demonstration purposes. 75 00:05:49,290 --> 00:05:52,540 That's why we can see you have been click, Jack. 76 00:05:52,920 --> 00:05:54,480 So I hope you guys understood this. 77 00:05:54,510 --> 00:05:55,080 Thank you.