HackEDU has replicated a clickjacking vulnerability in Twitter that was found through HackerOne’s bug bounty program. Try this lesson to learn more about clickjacking and how this vulnerability can be exploited to create a worm. You will create a clickjacking attack that causes a user to post to their feed without their knowledge and then leverage this to create a worm.
Tweeter.com, much like Twitter, is a social media application where you can follow users, see your follower''s feeds, and tweet messages, including dynamic Tweeter cards.
Discover the clickjacking vulnerability in the Tweeter cards, explore the vulnerability, and exploit it. HackEDU's lesson will walk you through this vulnerability step by step teaching you about the clickjacking and exploitation along the way.