Language:
⚠️ Educational Purpose Only - This is a simulation of a X OAuth phishing attack using DoubleClickjacking ⚠️

X (X) OAuth Phishing with DoubleClickjacking

Challenge: Identify the DoubleClickjacking Attack

Educational Purpose Only - Phishing Simulation

Scenario Description

You receive an email claiming you've won a X Blue subscription for a year. The email contains a link to claim your prize. When you click on it, you're taken to what appears to be a X OAuth authorization page.

This simulation demonstrates a sophisticated phishing technique called DoubleClickjacking, which can bypass X-Frame-Options protection that normally prevents clickjacking attacks.

DoubleClickjacking is an advanced clickjacking technique that can bypass standard protections like X-Frame-Options, SameSite cookies, or CSP. Here's how it works:

The DoubleClickjacking technique, discovered by Paulo Syibelo in 2024, uses a double-click event to bypass frame busting and X-Frame-Options protections.

1
Authorization
2
More Permissions
3
Success
🔒 https://xx.com/i/oauth2/authorize
🔒 https://xx.com/i/oauth2/authorize
🔒 https://xx.com/premium/confirmation

Congratulations!

You have successfully obtained X Premium.

Your account will be upgraded within one week.

Premium Features Include:

  • Blue verification badge
  • Priority in replies and search
  • Fewer ads
  • Longer posts
  • Edit button
Flag: X_DOUBLECLICKJACKING_2025
Back to Challenges