Course
This course details the exploitation of a weakness in JSON Web Tokens (JWT) used for authentication. The lab demonstrates how to manipulate the algorithm used for signing JWTs to gain unauthorized access.
Skills covered
Injection
Authentication
Cryptography
Topics
JWT
Ready to practice?
Get access to this lab and 600+ hands-on exercises with a PRO subscription.