DOI of the published article https://e-hakcipta.dgip.go.id/index.php/list
Review and Implementation of Clickjacking in Fake Link for Social Media Exploration
Review dan Implementasi Clickjacking pada Tautan Palsu untuk Eksplorasi Media Sosial
DOI:
https://doi.org/10.21070/ups.5231Keywords:
attack, link, hacking, security, ProtectionAbstract
This research focuses on designing modified clickjacking links to investigate the phenomenon of clickjacking attacks aimed at obtaining user information from WhatsApp and Instagram. It aims to both implement these attacks and assess their effectiveness in gathering data on victims. Using fake clickjacking links as a conduit, the study successfully retrieves login credentials from WhatsApp and Instagram, highlighting common defense methods against such attacks and identifying modified websites vulnerable to clickjacking techniques. The study concludes by emphasizing the need for user education, particularly on social media platforms, and proactive measures to mitigate the impact of clickjacking incidents.
Downloads
References
H. Abusaimeh and Y. Alshareef, “Detecting the Phishing Website with the Highest Accuracy,” TEM J., vol. 10,
no. 2, pp. 947–953, 2021, doi: 10.18421/TEM102-58.
[2] M. Arshey and A. V. K. S, “Security of Web Browser : A Study on Attacks and Their Defences,” no. July,
[3] D. J. Liu, G. G. Geng, X. B. Jin, and W. Wang, “An efficient multistage phishing website detection model
based on the CASE feature framework: Aiming at the real web environment,” Comput. Secur., vol. 110, p.
, 2021, doi: 10.1016/j.cose.2021.102421.
[4] P. Kalaharsha and B. M. Mehtre, “Detecting Phishing Sites -- An Overview,” pp. 1–13, 2021, [Online].
Available: http://arxiv.org/abs/2103.12739
[5] A. O’Mara, I. Alsmadi, and A. Aleroud, “Generative Adverserial Analysis of Phishing Attacks on Static and
Dynamic Content of Webpages,” 19th IEEE Int. Symp. Parallel Distrib. Process. with Appl. 11th IEEE Int. Conf.
Big Data Cloud Comput. 14th IEEE Int. Conf. Soc. Comput. Netw. 11th IEEE Int., pp. 1657–1662, 2021, doi:
1109/ISPA-BDCloud-SocialCom-SustainCom52081.2021.00222.
[6] S. Agarwal and B. Stock, “First, Do No Harm: Studying the manipulation of security headers in browser
extensions,” no. February, 2021, doi: 10.14722/madweb.2021.23016.
Copyright © Universitas Muhammadiyah Sidoarjo. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY).
The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original
publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply
with these terms.
| Page
[7] A. Arote and U. Mandawkar, “Android Hacking in Kali Linux Using Metasploit Framework,” Int. J. Sci.
Res. Comput. Sci. Eng. Inf. Technol., vol. 3307, pp. 497–504, 2021, doi: 10.32628/cseit2173111.
[8] M. H. Alkawaz, S. J. Steven, and A. I. Hajamydeen, “Detecting Phishing Website Using Machine Learning,”
Proc. - 2020 16th IEEE Int. Colloq. Signal Process. its Appl. CSPA 2020, no. July, pp. 111–114, 2020, doi:
1109/CSPA48992.2020.9068728.
[9] A. Mishra and Fancy, “Efficient Detection of Phising Hyperlinks using Machine Learning,” Int. J. Cybern.
Informatics, vol. 10, no. 2, pp. 23–33, 2021, doi: 10.5121/ijci.2021.100204.
[10]
L. Johnson and L. Martensson, “Assessing HTTP Security Header Implementations (A study of
Swedish government agencies’ first line of defense against XSS and client-side supply chain attacks),” no. June,
, [Online]. Available: https://www.diva-portal.org/smash/get/diva2:1570054/FULLTEXT02
[11]
K. Hariram and V. Ayala-rivera, “Detection of Clickjacking using Convolutional Neural Network
MSc in Cybersecurity National College of Ireland Supervisor :,” 2022.
[12]
Machine
M. Ahmed et al., “PhishCatcher: Client-Side Defense Against Web Spoofing Attacks Using
Learning,”
IEEE Access, vol. 11, no. June, pp. 61249–61263, 2023, doi:
1109/ACCESS.2023.3287226.
[13]
Z. Alkhalil, C. Hewage, L. Nawaf, and I. Khan, “Phishing Attacks: A Recent Comprehensive Study
and a New Anatomy,” Front. Comput. Sci., vol. 3, no. March, pp. 1–23, 2021, doi: 10.3389/fcomp.2021.563060.
[14]
M. Sahin, T. Unlu, C. Hebert, L. A. Shepherd, N. Coull, and C. M. Lean, “Measuring Developers’
Web Security Awareness from Attack and Defense Perspectives,” Proc. - 43rd IEEE Symp. Secur. Priv. Work.
SPW 2022, pp. 31–43, 2022, doi: 10.1109/SPW54247.2022.9833858.
[15]
K. Puneet, “IRJET- A Review on Clickjacking Attack and its Defense Mechanism,” Irjet, vol. 8, no.
, pp. 1098–1101, 2021.
[16]
Z. Su and D. Evans, Perception Hacking for 2D Cursorjacking in Virtual Reality, vol. 1, no. 1.
Association for Computing Machinery, 2022.
Downloads
Additional Files
Posted
License
Copyright (c) 2024 UMSIDA Preprints Server
This work is licensed under a Creative Commons Attribution 4.0 International License.