3 Videos for JWT Algorithm Confusion

PRO
Tier
Medium
Medium
3856 completed
Return to Exercise
image of exercise JWT II: Introduction

This video requires PentesterLab PRO

GO PRO
JWT II: Introduction

This video introduces the JWT II exercise on PentesterLab, focusing on the JWT (JSON Web Token) format and its components—Header, Payload, and Signature. It also explains the difference between encryption and signature, and demonstrates a practical attack on JWTs due to improper algorithm handling.

video duration icon05:15 number of views icon5583

 

image of exercise JWT II: Exploitation

This video requires PentesterLab PRO

GO PRO
Spoiler
JWT II: Exploitation

In this video, we delve into the exploitation of JSON Web Tokens (JWT) in a practical exercise. By manipulating JWTs, we demonstrate how to change user roles and gain unauthorized access using HMAC and RSA algorithms.

video duration icon11:40 number of views icon7530

 

image of exercise JWT II: Exploitation in Python 2 and 3

This video requires PentesterLab PRO

GO PRO
Spoiler
JWT II: Exploitation in Python 2 and 3

In this video, we explore the process of exploiting JWT tokens using Python 2 and 3. The exercise demonstrates how to manipulate JWT tokens to gain unauthorized access by altering the token's payload and re-signing it with a different algorithm.

video duration icon08:30 number of views icon4374