Skip to content

Commit

Permalink
Typos
Browse files Browse the repository at this point in the history
  • Loading branch information
frank-leitner committed May 22, 2022
1 parent 74ed7a2 commit 999c574
Showing 1 changed file with 3 additions and 3 deletions.
6 changes: 3 additions & 3 deletions 14_clickjacking/Multistep_clickjacking/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@ Craft some malicious HTML that

### Analysis

The lab application is the already well-known blog website. The targetted functionality is an authenticated one, so I log into the account of `wiener` to have a look.
The lab application is the already well-known blog website. The targeted functionality is an authenticated one, so I log into the account of `wiener` to have a look.

The account page features a prominent `Delete account` button.

Expand All @@ -41,7 +41,7 @@ The requests are very similar:

![both_delete_requests](img/both_delete_requests.png)

Two obvious possibilities are not possible here:
Two obvious options are not possible here:

- I cannot manipulate the form itself, otherwise, it would be easy to skip the second check by adding the `confirmed` value to the form.
- The CSRF token prevents me from trying to issue the `delete` requests directly in an iframe. Furthermore, the `/my-account/delete` endpoint is not accessible with GET requests so can't be directly loaded into an iframe.
Expand All @@ -50,7 +50,7 @@ So I need to convince the user to click twice. In real life, knowing common user

### Craft the malicious HTML

Here in the lab, I have the information that the user clicks on anything that tells him to click. My victum user even obeys the order I tell him to click.
Here in the lab, I have the information that the user clicks on anything that tells him to click. My victim user even obeys the order I tell him to click.

So that is exactly what I'll do:

Expand Down

0 comments on commit 999c574

Please sign in to comment.