Preprint has been published in a journal as an article
DOI of the published article https://e-hakcipta.dgip.go.id/index.php/list
Preprint / Version 1

Review and Implementation of Clickjacking in Fake Link for Social Media Exploration


Review dan Implementasi Clickjacking pada Tautan Palsu untuk Eksplorasi Media Sosial

##article.authors##

DOI:

https://doi.org/10.21070/ups.5231

Keywords:

attack, link, hacking, security, Protection

Abstract

This research focuses on designing modified clickjacking links to investigate the phenomenon of clickjacking attacks aimed at obtaining user information from WhatsApp and Instagram. It aims to both implement these attacks and assess their effectiveness in gathering data on victims. Using fake clickjacking links as a conduit, the study successfully retrieves login credentials from WhatsApp and Instagram, highlighting common defense methods against such attacks and identifying modified websites vulnerable to clickjacking techniques. The study concludes by emphasizing the need for user education, particularly on social media platforms, and proactive measures to mitigate the impact of clickjacking incidents.

Downloads

Download data is not yet available.

References

H. Abusaimeh and Y. Alshareef, “Detecting the Phishing Website with the Highest Accuracy,” TEM J., vol. 10,

no. 2, pp. 947–953, 2021, doi: 10.18421/TEM102-58.

[2] M. Arshey and A. V. K. S, “Security of Web Browser : A Study on Attacks and Their Defences,” no. July,

[3] D. J. Liu, G. G. Geng, X. B. Jin, and W. Wang, “An efficient multistage phishing website detection model

based on the CASE feature framework: Aiming at the real web environment,” Comput. Secur., vol. 110, p.

, 2021, doi: 10.1016/j.cose.2021.102421.

[4] P. Kalaharsha and B. M. Mehtre, “Detecting Phishing Sites -- An Overview,” pp. 1–13, 2021, [Online].

Available: http://arxiv.org/abs/2103.12739

[5] A. O’Mara, I. Alsmadi, and A. Aleroud, “Generative Adverserial Analysis of Phishing Attacks on Static and

Dynamic Content of Webpages,” 19th IEEE Int. Symp. Parallel Distrib. Process. with Appl. 11th IEEE Int. Conf.

Big Data Cloud Comput. 14th IEEE Int. Conf. Soc. Comput. Netw. 11th IEEE Int., pp. 1657–1662, 2021, doi:

1109/ISPA-BDCloud-SocialCom-SustainCom52081.2021.00222.

[6] S. Agarwal and B. Stock, “First, Do No Harm: Studying the manipulation of security headers in browser

extensions,” no. February, 2021, doi: 10.14722/madweb.2021.23016.

Copyright © Universitas Muhammadiyah Sidoarjo. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY).

The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original

publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply

with these terms.

| Page

[7] A. Arote and U. Mandawkar, “Android Hacking in Kali Linux Using Metasploit Framework,” Int. J. Sci.

Res. Comput. Sci. Eng. Inf. Technol., vol. 3307, pp. 497–504, 2021, doi: 10.32628/cseit2173111.

[8] M. H. Alkawaz, S. J. Steven, and A. I. Hajamydeen, “Detecting Phishing Website Using Machine Learning,”

Proc. - 2020 16th IEEE Int. Colloq. Signal Process. its Appl. CSPA 2020, no. July, pp. 111–114, 2020, doi:

1109/CSPA48992.2020.9068728.

[9] A. Mishra and Fancy, “Efficient Detection of Phising Hyperlinks using Machine Learning,” Int. J. Cybern.

Informatics, vol. 10, no. 2, pp. 23–33, 2021, doi: 10.5121/ijci.2021.100204.

[10]

L. Johnson and L. Martensson, “Assessing HTTP Security Header Implementations (A study of

Swedish government agencies’ first line of defense against XSS and client-side supply chain attacks),” no. June,

, [Online]. Available: https://www.diva-portal.org/smash/get/diva2:1570054/FULLTEXT02

[11]

K. Hariram and V. Ayala-rivera, “Detection of Clickjacking using Convolutional Neural Network

MSc in Cybersecurity National College of Ireland Supervisor :,” 2022.

[12]

Machine

M. Ahmed et al., “PhishCatcher: Client-Side Defense Against Web Spoofing Attacks Using

Learning,”

IEEE Access, vol. 11, no. June, pp. 61249–61263, 2023, doi:

1109/ACCESS.2023.3287226.

[13]

Z. Alkhalil, C. Hewage, L. Nawaf, and I. Khan, “Phishing Attacks: A Recent Comprehensive Study

and a New Anatomy,” Front. Comput. Sci., vol. 3, no. March, pp. 1–23, 2021, doi: 10.3389/fcomp.2021.563060.

[14]

M. Sahin, T. Unlu, C. Hebert, L. A. Shepherd, N. Coull, and C. M. Lean, “Measuring Developers’

Web Security Awareness from Attack and Defense Perspectives,” Proc. - 43rd IEEE Symp. Secur. Priv. Work.

SPW 2022, pp. 31–43, 2022, doi: 10.1109/SPW54247.2022.9833858.

[15]

K. Puneet, “IRJET- A Review on Clickjacking Attack and its Defense Mechanism,” Irjet, vol. 8, no.

, pp. 1098–1101, 2021.

[16]

Z. Su and D. Evans, Perception Hacking for 2D Cursorjacking in Virtual Reality, vol. 1, no. 1.

Association for Computing Machinery, 2022.

Posted

2024-07-18