Course
This course covers the exploitation of a weakness in JSON Web Token (JWT) used for authentication. It focuses on tampering with the JWT algorithm to gain unauthorized admin access.
Skills covered
Authentication
Cryptography
Topics
JWT
cwe-310
Ready to practice?
Get access to this lab and 600+ hands-on exercises with a PRO subscription.