Providing Free and Editor Tested Software Downloads
< HOME | TUTORIALS | GEEK-CADE| WEB TOOLS | YOUTUBE | NEWSLETTER | DEALS! | FORUMS | >

MajorGeeks.com - Got Geek?

Software Categories

All In One Tweaks
Android
Antivirus & Malware
Appearance
Back Up
Browsers
CD\DVD\Blu-Ray
Covert Ops
Drivers
Drives (SSD, HDD, USB)
Games
Graphics & Photos
Internet Tools
Linux Distros
MajorGeeks Windows Tweaks
Multimedia
Networking
Office & Productivity
System Tools

Other news

· How To and Tutorials
· Life Hacks and Reviews
· Way Off Base
· MajorGeeks Deals
· News
· Off Base
· Reviews




spread the word

· YouTube
· Facebook
· Instagram
· Twitter
· Pintrest
· RSS/XML Feeds
· News Blur
· Yahoo
· Symbaloo

about

· Top Freeware Picks
· Malware Removal
· Geektionary
· Useful Links
· About Us
· Copyright
· Privacy
· Terms of Service
· How to Uninstall

top downloads

1. GS Auto Clicker
2. Macrium Reflect FREE Edition
3. Smart Defrag
4. Visual C++ Redistributable Runtimes AIO Repack
5. Visual C++ Runtime Installer (All-In-One)
6. McAfee Removal Tool (MCPR)
7. MusicBee
8. Rufus
9. K-Lite Mega Codec Pack
10. Sergei Strelec's WinPE
More >>

top reads

Star How to Disable 1-Click Ordering on Amazon (and Avoid Surprise Charges)

Star How to Fix Shallow Paint Layer Depth in Bambu Studio

Star Aviator Betting Game Secrets: Unlock 97% RTP & Triple Your Wins

Star Windows Recall: What It Is, Why Hackers Will Love It, and How to Stay Safe

Star Star Trek Fleet Command Promo Codes: Redeem Codes for Free Shards, Blueprints And Resources

Star How To Use VLC Media Player to Trim Video Clips

Star What Is the $WinREAgent Folder and Can I Delete It?

Star Swear Your Way to Better Search Results

Star How to Get a Dark Start Menu and Taskbar in Windows 10 & 11

Star Enable, Disable, Manage, Delete or Create a System Restore Point


MajorGeeks.Com » News » March 2013 » The trick behind camouflaged links

The trick behind camouflaged links


Contributed by: Email on 03/22/2013 03:11 PM [ comments Comments ]


By using java script , links can be modified in such a way that even the most attentive user will not notice anything amiss. This can be exploited by attackers to poison links and lure users to web pages which they had no intention of visiting. Blogger and developer Bilawal Hameed, who discovered the vulnerability, describes it as a new tool for phishers.

Even the mouse-over test fails to uncover the subterfuge, as the link, which appears in the source code as continues to be displayed when the cursor hovers over it. Clicking on it however, triggers an onclick event, which utilizes java script  to divert the user to an alternative URL.

Just a few lines of code are required to implement this subterfuge:

var links = document.links;
for(i in links) {
links.onclick = function(){
this.href = 'http://bit.ly/141nisR';
};
}

Embedding the script is child's play. Hameed has therefore informed Mozilla (and other browser makers) of his discovery, but has yet to receive a response. Google is, according to "internet rumors", already working on a fix. Opera is currently the only browser where this trick doesn't work.

Hameed has suggested warning users when the location of a link changes to another domain after being clicked. Until the vulnerability has been fixed, users should check that they really do end up on the advertised domain. Hameed initially suggested that the W3C disable the ability for the href attribute to be changed after an onclick event, but as sites like Google and Facebook actually use the capability, he has since withdrawn that suggestion and gone with the idea of warning users of link changes.






« Experts Tell Congress Serious Deterrence Needed to Impede Foreign Cyber Attacks · The trick behind camouflaged links · Lenovo IdeaPad Y500 Review and more (8 Reviews) @ NT Compatible »




Comments
comments powered by Disqus

MajorGeeks.Com » News » March 2013 » The trick behind camouflaged links

© 2000-2025 MajorGeeks.com
Powered by Contentteller® Business Edition