What is the name of the technique that hides target controls with opaque overlays which are removed briefly to register a click?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

What is the name of the technique that hides target controls with opaque overlays which are removed briefly to register a click?

Explanation:
Hiding the target controls behind an opaque overlay and then briefly removing it to register a click is a form of overlay-based deception used in clickjacking. The attacker masks the real UI with a layer, so the user’s click action appears to be on something legitimate, while it actually triggers the underlying element once the overlay is removed at the right moment. Among the given options, this best matches “hidden overlay” because it describes concealing the target with an overlay and the overlay’s presence influencing where the click ends up. The other choices don’t capture that conceal-and-reveal mechanism: rapid content replacement implies swapping content quickly, not using an overlay to hijack a click; click event dropping suggests intercepting rather than masking the UI; and a complete transparent overlay would be see-through, not opaque, so it wouldn’t visually hide the target. Understanding this helps you spot when a UI layer is being used maliciously and reinforces defenses like anti-clickjacking measures (frame-ancestors or equivalent policies), proper UI design to avoid overlapping controls, and requiring explicit user confirmation for critical actions.

Hiding the target controls behind an opaque overlay and then briefly removing it to register a click is a form of overlay-based deception used in clickjacking. The attacker masks the real UI with a layer, so the user’s click action appears to be on something legitimate, while it actually triggers the underlying element once the overlay is removed at the right moment. Among the given options, this best matches “hidden overlay” because it describes concealing the target with an overlay and the overlay’s presence influencing where the click ends up. The other choices don’t capture that conceal-and-reveal mechanism: rapid content replacement implies swapping content quickly, not using an overlay to hijack a click; click event dropping suggests intercepting rather than masking the UI; and a complete transparent overlay would be see-through, not opaque, so it wouldn’t visually hide the target. Understanding this helps you spot when a UI layer is being used maliciously and reinforces defenses like anti-clickjacking measures (frame-ancestors or equivalent policies), proper UI design to avoid overlapping controls, and requiring explicit user confirmation for critical actions.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy