{"type":"video","version":"1.0","html":"<iframe src=\"https://www.loom.com/embed/15b29ab9a4f7466d9160cf2aae806b4f\" frameborder=\"0\" width=\"1920\" height=\"1440\" webkitallowfullscreen mozallowfullscreen allowfullscreen></iframe>","height":1440,"width":1920,"provider_name":"Loom","provider_url":"https://www.loom.com","thumbnail_height":1440,"thumbnail_width":1920,"thumbnail_url":"https://cdn.loom.com/sessions/thumbnails/15b29ab9a4f7466d9160cf2aae806b4f-ecea5c5b565400a0.gif","duration":323.2107,"title":"Evilginx Reverse Proxy Attack Demo","description":"In this video, I demonstrate the Evil Jinx Reverse Proxy attack, showing how it bypasses multi-factor authentication to compromise emails. The attack is cost-effective and can be set up quickly by anyone with basic technical skills. I walk through setting up the attack, capturing credentials, and accessing accounts, highlighting the dangers of phishing."}