Flash File Overlay |
Attack Pattern ID: 181 (Standard Attack Pattern Completeness: Stub) | Typical Severity: Medium | Status: Draft |
Flash File Overlay |
Attack Pattern ID: 181 (Standard Attack Pattern Completeness: Stub) | Typical Severity: Medium | Status: Draft |
Summary
An attacker creates a transparent overlay using flash in order to intercept user actions for the purpose of performing a clickjacking attack. In this technique, the Flash file provides a transparent overlay over HTML content. Because the Flash application is on top of the content, user actions, such as clicks, are caught by the Flash application rather than the underlying HTML. The action is then interpreted by the overlay to perform the actions the attacker wishes.
The victim must be tricked into navigating to the attacker's decoy site and performing the actions on the decoy page.
The victim's browser must support invisible Flash overlays.
Nature | Type | ID | Name | Description | View(s) this relationship pertains to |
---|---|---|---|---|---|
ChildOf | Attack Pattern | 103 | Clickjacking | Mechanism of Attack (primary)1000 |
Security-Database help your corporation foresee and avoid any security risks that may impact your IT infrastructure and business applications.
28 June 2016