MetaMask - stealing ETH by exploiting clickjacking - $120,000 bug bounty


✉️ Sign up for the mailing list: https://bbre.dev/nl 📧 Subscribe to BBRE Premium: https://ift.tt/jZ2iIH0 📣 Follow me on twitter: https://bbre.dev/tw This video an explanation of a clickjacking bug in MetaMask that allowed the attacker to steal victim's Ethereum with a few clicks. Metamask paid $120,000 bug bounty for it. PoC code: https://bbre.dev/mm-poc 🖥 Get $100 in credits for Digital Ocean: https://bbre.dev/do Timestamps: 00:00 Intro 00:47 What is MetaMask and how it works? 02:07 What are Web Accessible Resources? 04:11 Clickjacking - what is the impact of iframing a website? 06:00 Proof of Concept 07:20 How to prevent clickjacking?

For more hacking info and tutorials visit: https://ift.tt/xcntUlv

Hello and welcome to the temple of cybersecurity. Now you are watching MetaMask - stealing ETH by exploiting clickjacking - $120,000 bug bounty published at June 28, 2022 at 08:03AM. If you are looking for tutorials and all the news about the world of hacking and computer security, you have come to the right place. We invite you to subscribe to our newsletter in the box at the top and to follow us on our social networks:

NFT store: https://mintable.app/u/cha0smagick
Twitter: https://twitter.com/freakbizarro
Facebook: https://web.facebook.com/sectempleblogspotcom/
Discord: https://discord.gg/5SmaP39rdM



Ignore tags:
#hacking,#infosec,#tutorial,#bugbounty,#threat,#hunting,#pentest,#hacked,#ethical,#hacker,#cyber,#learn,#security,#computer,#pc,#news

Comments