<s>
Social	B-Protocol
jacking	I-Protocol
is	O
malicious	O
technique	O
tricking	O
the	O
users	O
for	O
clicking	O
vulnerable	O
buttons	O
or	O
compromise	O
them	O
by	O
showing	O
false	O
appearing	O
pages	O
,	O
it	O
is	O
a	O
mixture	O
of	O
click	O
jacking	O
technique	O
to	O
breach	O
browser	B-Protocol
security	I-Protocol
and	O
social	O
engineering	O
.	O
</s>
<s>
Suppose	O
the	O
user	O
has	O
logged	O
into	O
his	O
web	B-Protocol
based	I-Protocol
email	I-Protocol
,	O
now	O
we	O
send	O
a	O
link	O
to	O
the	O
user	O
for	O
the	O
tricked	O
webpage	O
,	O
the	O
user	O
clicks	O
the	O
link	O
and	O
the	O
tricked	O
or	O
specially	O
crafted	O
webpage	O
is	O
loaded	O
,	O
the	O
loaded	O
webpage	O
has	O
an	O
iframe	O
tag	O
through	O
which	O
the	O
users	O
web	B-Protocol
based	I-Protocol
email	I-Protocol
inbox	O
is	O
loaded	O
and	O
we	O
hide	O
all	O
the	O
unnecessary	O
information	O
in	O
the	O
loaded	O
webpage	O
and	O
make	O
only	O
the	O
"	O
delete	O
all	O
"	O
button	O
in	O
the	O
inbox	O
page	O
to	O
be	O
visible	O
,	O
now	O
we	O
add	O
the	O
text	O
above	O
iframe	O
saying	O
some	O
messages	O
which	O
makes	O
the	O
user	O
to	O
click	O
the	O
delete	O
all	O
button	O
,	O
now	O
when	O
the	O
user	O
clicks	O
the	O
delete	O
all	O
button	O
his	O
all	O
mails	O
got	O
deleted	O
.	O
</s>
<s>
Social	B-Protocol
jacking	I-Protocol
can	O
be	O
easily	O
implemented	O
using	O
Google	B-Language
Web	I-Language
Toolkit	I-Language
,	O
where	O
we	O
can	O
design	O
the	O
webpage	O
using	O
wysiwyg	B-Application
GUI	O
builder	O
and	O
drag	O
white	O
background	O
colored	O
panel	O
over	O
the	O
iframe	O
window	O
thus	O
hiding	O
the	O
unnecessary	O
information	O
,	O
while	O
revealing	O
the	O
vulnerable	O
buttons	O
alone	O
.	O
</s>
