Burp Clickbandit is a tool for generating clickjacking attacks. When you have found a web page that may be vulnerable to clickjacking, you can use Burp Clickbandit to create an attack, and confirm that the vulnerability can be successfully exploited.
This documentation covers the following areas:
Running Burp Clickbandit
To run Clickbandit, go to the Burp menu and select "Burp Clickbandit". Then use the following steps:
- Click the "Copy Clickbandit to clipboard" button. This will copy the Clickbandit script to your clipboard.
- In your browser, visit the web page that you want to test, in the usual way.
- Paste the Clickbandit script into the web developer console, and press enter.
The Burp Clickbandit banner will appear at the top of the browser window and the original page will be reloaded within a frame, ready for the attack to be performed.
Burp Clickbandit first loads in record mode. Perform one or more mouse clicks to record your clickjacking attack. Typically, this will involve performing the mouse clicks that the victim user needs to perform to carry out some desired action.
By default, as clicks are recorded, they are also handled in the normal way by the target page. You can use the "disable click actions" checkbox to record clicks without the target page handling them.
When you have finished recording, click the "Finish" button to enter review mode.
When you have finished recording your attack, Burp Clickbandit enters review mode. This lets you review the generated attack, with the attack UI overlaid on the original page UI. You can click the buttons on the attack UI to verify that the attack works.
The following commands are available in review mode:
- The + and - buttons can be used to zoom in and out.
- The "toggle transparency" button lets you show or hide the original page UI.
- The "reset" button restores the generated attack, as it was before any further clicks were made.
- The "save" button saves an HTML file containing the attack. This can be used as a real-world exploit of the clickjacking vulnerability.
- You can use the keyboard arrow keys to reposition the attack UI if is not correctly aligned with the original page UI.