Course
This lab explores the exploitation of a vulnerability in JSON Web Token (JWT) used for authentication. By tampering with the token, you can gain administrative access to an application.
Skills covered
Authentication
Authorisation
Cryptography
Topics
JWT
CWE-345,CWE-347
Ready to practice?
Get access to this lab and 600+ hands-on exercises with a PRO subscription.