This lab extends the basic clickjacking example in Lab: Basic clickjacking with CSRF token protection. The goal of the lab is to change the email address of the user by prepopulating a form using a URL parameter and enticing the user to click on a "update email" button without the user's knowledge.
To solve the lab, craft some HTML that frames the account page and fools the user into changing their email address. The account is solved when the email address is changed.
You have an account on the application that you can use to help design your attack. The credentials are: carlos / montoya.
The victim will be using Chrome so test your exploit on that browser.
Login to the account on the target website.
Use the following HTML template and provide the details as follows:
Go to the exploit server, paste your exploit HTML into the "Body text" box, and click "Store".
Click "View stored response".
Hover over "Test me" and ensure the cursor changes to a hand indicating that the div element is positioned correctly. If not, adjust the position of the div element by modifying the top and left properties of the style sheet.
Once you have the div element lined up correctly, change "Test me" to "Click me" and click "Store".
The simulated victim now clicks on the div element and the lab should be solved.
If you reload the account page then you will observe that you have successfully completed the lab.