Web Camera Exploit using Click Jacking Attack

Web Camera Exploit using Click Jacking Attack 

What is Click Jacking ?  

Clickjacking, also known as a "UI redress attack", is when an attacker uses multiple transparent or opaque layers to trick a user into clicking on a button or link on another page when they were intending to click on the the top level page. Thus, the attacker is "hijacking" clicks meant for their page and routing them to other another page, most likely owned by another application, domain, or both. 

Using a similar technique, keystrokes can also be hijacked. With a carefully crafted combination of stylesheets, iframes, and text boxes, a user can be led to believe they are typing in the password to their email or bank account, but are instead typing into an invisible frame controlled by the attacker.  - wiki 


Positioning via CSS (JS not required!)
Follow mouse cursor via JS

Clickjacking + XSS
Clickjacking + CSRF
Clickjacking + HTML5 Drag/Drop API
Clickjacking + Webcam Exploit

What is jQuery ?
jQuery is a multi-browser JavaScript library designed to simplify the client-side scripting of HTML.
jQuery is free, open source software, licensed under the MIT License

Google plus Man-in-the-middle Attack Vulnerability

Google plus Man-in-the-middle Attack Vulnerability 

As a security researcher from cyberinfosec , I spend my time on both application and web application security. During one of my researches while I was focusing on auditing Session hijacking attacks on internal networks. So I started working on twitter, Facebook, Yahoo and Google, Google Plus!! I just surprised I found few issues on all of them! And in this article I want to explain one of my cool findings on Google Plus! Which can be used to completely compromise an account?
According to Wikipedia1, Google mail has around 425 million users in June 2012 so any serious vulnerabilities puts millions of users in risk. Finding session hijacking in Google plus! is not a new thing and is not that so hard


Session hijacking is when a hacker takes over a session between two machines. Since most authentications only occur at the start of a session, this allows the hacker to gain access to a account.

Step I:

To find vulnerabilities you need a target and target selection is very important key in successful vulnerability discovery. Just place a proxy address on which we using on our company network (our connection will flow on the proxy then it connects to ISP).
So I placed my company proxy IP on the victim machine so then connection goes over proxy server

Step II:
On the proxy server running burp suite  to capture the cookies that includes all the session cookies of Google accounts in my case I got one my Gmail cookies that includes a session cookie of Gmail so that I got access to all Google accounts like Google plus , YouTube ,blogger ,Google docs etc ,

In this case I am targeting my friend’s Google plus account I got session cookies some of the  cookie was hided dude the security reason

Step III: 
Email ID  & Photo Disclosed
Email ID  & Photo of his friend disclosed of the victim’s Friends accounts

 Step IV:
Hijacking user accounts
After got the session cookies on from the victim accounts we can login into victim account the most important and serious issues are even when the victim account was signed out they can logged into the account any time there is no session termination on the server side that session is expiration only on the browser side.