Which technique uses a 1×1 pixel iframe under the mouse cursor to register clicks on the malicious page?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which technique uses a 1×1 pixel iframe under the mouse cursor to register clicks on the malicious page?

Explanation:
This relies on clickjacking using a hidden overlay. The attacker places an invisible element—often a transparent or near-invisible 1×1 pixel iframe—right under the user’s cursor. When the user thinks they’re clicking a control on the malicious page, the click actually goes to the content inside that tiny iframe, which can trigger actions on another site or on a trusted page without the user realizing it. The overlay is hidden from view, so the user remains unaware of the real target of their click. This fits because a hidden overlay is exactly the technique of using an unseen frame to intercept clicks. The other options aren’t about deceiving user clicks with an invisible frame: rapid content replacement isn’t about overlaying clicks, DNS rebinding targets DNS and network boundaries, and a load balancer is an infrastructure component, not a UI-based deception technique. Defenses include preventing framing (X-Frame-Options or CSP frame-ancestors) and user awareness to mitigate clickjacking.

This relies on clickjacking using a hidden overlay. The attacker places an invisible element—often a transparent or near-invisible 1×1 pixel iframe—right under the user’s cursor. When the user thinks they’re clicking a control on the malicious page, the click actually goes to the content inside that tiny iframe, which can trigger actions on another site or on a trusted page without the user realizing it. The overlay is hidden from view, so the user remains unaware of the real target of their click.

This fits because a hidden overlay is exactly the technique of using an unseen frame to intercept clicks. The other options aren’t about deceiving user clicks with an invisible frame: rapid content replacement isn’t about overlaying clicks, DNS rebinding targets DNS and network boundaries, and a load balancer is an infrastructure component, not a UI-based deception technique. Defenses include preventing framing (X-Frame-Options or CSP frame-ancestors) and user awareness to mitigate clickjacking.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy