UI Redressing Attacks on Android Devices Revisited
地址: https://www.youtube.com/watch?v=QwqZLIEP2Gc&list=PLhUfFfySNmGXVikmiEWsw0iXBZ5IWOy8O&index=5
UI Redressing Attacks on Android Devices Revisited
Click Jacking (click hijacking): a subset of UI Redressing. Make the iframe transparent (or element transparent), the user cannot know what he is clicking. If he happens to click on a button, this button's event listener will be triggered and the click jacking succeeds.
Examples of click jacking: cursorjacking, filejacking, tabnabbing and tapjacking.
In general the victim has to use a web browser.
UI Redressing countermeasures: Frame buster; HTTP header: X-Frame-Options, CSP; NoScript
UI redressing: porting to android
Easily ported: Classic clickjacking, classjacking, strokejacking. (Browsers only have to support: Frames, CSS, Javascript); Nested clickjacking, filejacking (browser required features required, eg. HTML 5 attributes), tabbing, content extraction, event-recycling and SVG maskings.
Non-tranferable attacks: cursorjacking, double clickjacking, cookiejacking (only for IE)
New browsless attacks: 基本原理:当点击前面的app时,实际上点击的是后面的透明app。

右边为前面的app,电话是后面的透明app,点击go for it时实际上播出了电话。

mitigation technique: 当app被挡住时,点击按钮不触发事件 ,i.e. setFilterTouchesWhenObscured() 或者设置android:filterTouchesWhenObscured属性,在安卓2.2及更高版本有此属性,默认not enabled.
结论:
1.大部分传统UI redressing attack都可以在android设备上成功。
2. 在mobile phone上, 攻击者可以实现UI redressing with and without a browser
3. 措施: XFO, CSP, setFilterTouchesWhenObscured().
posted on 2015-05-30 11:33 CarrieSmile 阅读(262) 评论(0) 收藏 举报
浙公网安备 33010602011771号