Which technique overlays only certain controls, masking buttons with hyperlinks and misleading labels?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which technique overlays only certain controls, masking buttons with hyperlinks and misleading labels?

Explanation:
This relies on placing an element on top of the page’s UI to cover and replace only chosen controls. By using an overlay (often with absolute positioning and a high z-index), the attacker can make certain buttons appear unchanged while the actual interaction is redirected to hyperlinks or misleading labels underneath. The user thinks they’re clicking the real control, but the overlay handles the input, guiding them to a different action or page. This is why it’s described as a hidden overlay: the deception occurs without visibly altering the page’s appearance, just the behavior of specific controls. Cropping cuts parts of an image or element and doesn’t alter interactive behavior or layer controls, so it isn’t fitting here. DNS rebinding Attack and OWASP ZAP are unrelated to manipulating on-screen controls in this way. The technique that overlays only specific controls and masks them with deceptive links and labels is the hidden overlay attack.

This relies on placing an element on top of the page’s UI to cover and replace only chosen controls. By using an overlay (often with absolute positioning and a high z-index), the attacker can make certain buttons appear unchanged while the actual interaction is redirected to hyperlinks or misleading labels underneath. The user thinks they’re clicking the real control, but the overlay handles the input, guiding them to a different action or page. This is why it’s described as a hidden overlay: the deception occurs without visibly altering the page’s appearance, just the behavior of specific controls. Cropping cuts parts of an image or element and doesn’t alter interactive behavior or layer controls, so it isn’t fitting here. DNS rebinding Attack and OWASP ZAP are unrelated to manipulating on-screen controls in this way. The technique that overlays only specific controls and masks them with deceptive links and labels is the hidden overlay attack.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy