Course
This course covers the exploitation of weaknesses in the usage of JSON Web Tokens (JWTs) for authentication, inspired by challenges from BitcoinCTF. The exercise demonstrates how to gain admin access by tampering with JWTs through automation and discovering vulnerabilities.
Skills covered
Injection
Authentication
Cryptography
Topics
JWT
cwe-310
Ready to practice?
Get access to this lab and 600+ hands-on exercises with a PRO subscription.