JWT Algorithm Confusion

Bookmarked!

This exercise covers the exploitation of an issue with some implementations of JWT

PRO Medium 1-2 Hrs. 3846 Yellow Badge
Course

This course covers the exploitation of a weakness in JSON Web Token (JWT) used for authentication. It focuses on tampering with the JWT algorithm to gain unauthorized admin access.

Skills covered
Authentication Cryptography
Topics
JWT
cwe-310
Included with PRO
Full course content 3 videos Takeaways

Ready to practice?

Get access to this lab and 600+ hands-on exercises with a PRO subscription.