#Black-Hat Hacking 1 - How Hackers trick you to click on hidden Malicious link ? Click jacking Attack? Accidental Dangerous cyber crime

Click jacking Attack,Cyber Security, Cyber crime, cyber security solutions, malicious link, hackers, hack, ConfessionsComputer, clickjacking attack, facebook likes,

Do you guys know : By 2020 there'll be roughly two hundred billion connected devices
The risk is real with IoT and its growing.

Today's topic is Related to All people in world :
 it happens with everone  LIKE if Anyone clicks on a link and it opens a very suspicious page :
 looks like sold things,drugs seller,torrent websites |




*What is click-jacking ?

Clickjacking could be a technique wont to trick a user 

into inadvertently clicking on one thing mistreatment multiple layers, sometimes a button or link,
 once aiming to click on the highest layer. this will be accomplished through the employment of hidden iframes, text boxes, or stylesheets.

 Click jacking, conjointly referred to as UI redressing, could be a portmanteau of the words click and hijacking. Thus, the assaulter is basically hijacking the clicks of the user to perform actions while not the user's data.

when the user clicks on the play button on the player,nothing happens.that's as a result of they very simply clicked a Facebook like button,posting the video web site to their wall and spreading this to their friends,all while not their data.




the page you wish to sneakily management is placed into iframe ,laid over the page you managementcreated clear by css.

by engaging a user to click a part on the page you management,you are very inflicting them to click on a part of the victim page

In recent years, Facebook "likes" are the target of this kind of attack and has come back to be referred to as Likejacking. Basically, unsuspecting users would be tricked into feeling Facebook pages that they did not mean to love.

*****Clickjacking attacks use CSS to form and manipulate layers. The aggressor incorporates the target web site as associate iframe layer overlaid on the decoy web site.

click jacking can be performed using clickbandit and mutillidie tools in kali linux penetration lab.



  1. Harvest login credentials, by rendering a pretend login box on prime of the $64000 one.
  2. Trick users into turning on their web-cam or electro-acoustic transducer, by rendering invisible components over the Adobe Flash settings page.
  3. Spread worms on social media sites like Twitter and MySpace.
  4. Promote on-line scams by tricking individuals into clicking on things they otherwise wouldn't.
  5. Spread malware by amusing users to malicious transfer links.




  • One of the best client-side defenses is to use associate degree extension like NoScript, that contains a feature to stop users from clicking on invisible or embedded objects.

  • to confirm that your website doesn’t get employed in a clickjacking attack, you wish to create positive it can not be wrapped in associate degree iframe by a malicious websitethis will be done by giving the browser directions directly via communications protocol headers, or in older browser by mistreatment client-side JavaScript (frame-killing).

Please do share the blog if you find it informatic.

Thank you very much for Reading till last this blog ! Too much Appreciation & please let me by Comment Below Please Dofollow Facebook page and twitter :)



100Gbps,1,1337x.st,1,2019,1,550000 $,2,7 signs,1,a blogger is always a blogger,1,adsense,1,an anonymous girl,2,Android Malware,1,Android phone,2,Android smartphone lock,7,Android Update,1,ankit faida fake hacker,3,anonymous,5,anonymous email,4,anonymous group,1,anonymous hackers,6,anonymous online,3,antivirus,2,authentication,2,Backlink,4,Banking Trojan,2,Black hat hackers,3,BLACK HAT HACKING 4,1,Black Hat Hacking 6,1,Black market,2,Black-Hat Hacking,6,Blog,9,Blogger,3,blogging,2,Blogspot,7,CAA,1,CAB,1,Calls Spy,5,Calls Trace,2,Camera,2,Career Path,12,CCTV,1,Chaos of computer Club,1,clickjacking attack,1,Computer,18,computer Hacking,16,Computer tricks,10,computer tricks and tips,13,Confessions,11,ConfessionsComputer,13,confessionscomputer.online,5,content,1,Cookiethief malware,2,Corona Virus,1,cyber,1,Cyber crime,35,Cyber Security,63,cyber security solutions,31,cyber security threats,2,cyber security trends,1,cyber war,1,Cyberghost,1,cybersecurity,1,Dangerous,1,dangerous hacking,4,Dangerous Risk,2,Dark-web,1,Darknet,2,Darkweb,2,Deep web,2,desktop support engineer,1,desktop troubleshooting,1,digital marketing,3,DNS,1,dns spoofing hack facebook dns spoofing fb hack dns spoofing in ethical hacking,1,Dns-spoof hack,1,Domain Name syste,1,donation,1,download tor,1,drugs,1,easiest technique,7,EC COUNCIL,1,Email,2,Emotet Malware,2,encryption,1,Expectations vs Reality,4,Exploiting Android smartphone,2,facebook,2,facebook accounts,6,facebook file against NSC group,1,facebook hack,6,facebook likes,1,facebook page,5,facebook phishing Attack,2,fb lite Hack,5,followes,1,fool you,6,free,1,General Ways and Most Dangerous Techniques,1,Gmai Hack,1,Gmail,1,google ads,1,Google Forum,7,Google LLC,3,google my bussiness,2,Google Rank,1,Google trends,2,guidebloggng,1,Hack,12,Hack Android Smartphone,1,Hack CCTV Camera,3,hacker,5,hacker anonymous,1,hackers,2,Hacking,8,hacking facbook,1,Hacking method,2,hacking methods,1,Hacking news,1,Hacks,2,Hard disk wiping,1,hard work,1,hardware,1,Hide Your Private file in Audio and image files,1,Hotspotshield,1,How ? Cyber Security,1,how to,8,how to blog,1,how to capture keystrokes/passwords,1,how to crack pegasus spyware,1,How to do it,2,How to Hack Bank Accounts,1,how to hack website easily,2,how to hack wifi,5,how to pegasus github,1,how to start a successfull blog,1,how to use tor,1,imprisonment,1,INCREDIBLE BLOG,6,india news,1,Instagram Followers,2,Instagram hack,3,instagram hacking easiest technique,1,internet,1,IoT Devices,1,Iphone Lock,1,It,1,it security,1,It's not hacking,1,jail,1,JARVIS,1,kali linux,1,keyword,1,keyword reasearch,1,link,1,live cam sites,1,live Security Cameras,1,live streaming cameras online,1,live web cameras around the world,1,live web cams,1,long-tail keyword,1,Low orbit ion cannon,1,lulzsec,1,MAC Addresses,1,make money,1,malicious link,1,Malware,8,malware attack,6,malware payload,6,malware scan,1,malware spyware,1,malware virus malware in hindi malware attack,2,Malwarebytes,1,Malwarebytes Anti-Malware,1,Man in the middle attacj,1,Man in the Middle Attack,2,MFA,2,minutes facebook accounts,3,MITM,2,Most dangerous Hack,2,Most easily,1,Most Hidden Web Search Engine,1,Multi-factor Authentication,1,Near field Communication,1,necurs,1,Network,1,neverquest,1,Neverquest Banking Trojan,1,new cyber security,2,NEW MALWARE,1,New tech update,1,new tik tok,1,new tiktok filter,1,NOC,1,NRC,1,onion websites,1,OSINT,1,park seo joon,1,passwords,1,pegasus github,1,pegasus spyware,2,Pen drive key,1,pendrive,1,Phishing method,2,PHONE HACK,6,phone number Hack,1,police,1,prison,1,privacy,1,program,1,proxy,2,Quiz,1,RANSOMWARE ATTACKS,1,ransomware fight,1,ransomware mitigation checklist,1,real hack series,1,Search Engine Optimisation,5,Search Engine optimization Digital Marketing course,2,secure key,1,Secure your Accounts with Hacking,1,Security,4,seo,7,SEO 2020,3,seo kang joon,1,SIM HACK,5,sim swapping,1,Social Engineering HAcking,1,social media account hacking,1,social news,1,spy,1,Spy on Phonne number,1,tech,9,technical,6,TECHNICAL BLOG,6,Technology,9,tik tok,1,title,1,TOP 7 Signs of Cyber security will be more drastic in 2020,1,tor,2,tor browser,2,torrent,1,Trace,1,Traffic,4,trends,2,twitter Hack,1,two arrested for cyber crime,1,Two-factor Authentication,2,Unknown facts,1,Unlimited,1,virus,3,voice program,1,vpn,7,Vulnerability,1,web hacking,3,Web in depth,1,web search engine,2,website hack,1,Website packets,1,website traffic so much,4,whatisseo,1,whatsapp bug,1,whatsapp hack,3,Whatsapp Hack easily,1,whatsapp web,2,wifi,3,wifi hacking,1,Wifi hackingBlog,1,Wifi Password,1,wifihack,1,wikipedia External Links,2,win 7,2,windows 10,2,Windows Password Hack : SO EASY-PEASY METHOD ? Cyber Security,1,worst cyber attack,1,Youtube video,1,YouTube video. Shree dev dev Maharaj,55,Zerocleare,1,
Confessions of A Computer Freak: #Black-Hat Hacking 1 - How Hackers trick you to click on hidden Malicious link ? Click jacking Attack? Accidental Dangerous cyber crime
#Black-Hat Hacking 1 - How Hackers trick you to click on hidden Malicious link ? Click jacking Attack? Accidental Dangerous cyber crime
Click jacking Attack,Cyber Security, Cyber crime, cyber security solutions, malicious link, hackers, hack, ConfessionsComputer, clickjacking attack, facebook likes,
Confessions of A Computer Freak
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS CONTENT IS PREMIUM Please share to unlock Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy