Course
This course details the exploitation of a weakness in applications that rely on JSON Web Encryption (JWE) for authentication. By understanding the structure and encryption methods of JWE tokens, you will learn how to forge tokens and gain unauthorized access.
Skills covered
Authentication
Authorisation
Cryptography
Ready to practice?
Get access to this lab and 600+ hands-on exercises with a PRO subscription.