Course
This course focuses on exploiting a vulnerability in JSON Web Token (JWT) used for authentication. It demonstrates how to manipulate the JWT's signature algorithm to gain unauthorized access.
Topics
JWT
cwe-310
Ready to practice?
Get access to this lab and 600+ hands-on exercises with a PRO subscription.