This exercise covers the exploitation of a signature weakness in a JWT library.
The ISO for this exercise is only available with a "PentesterLab PRO" subscription.
You can access the course for this exercise by clicking here
More details on how to access the online version of this exercise can be found here
More details on how to access the videos for this exercise can be found here