Course
This course explores the exploitation of a common vulnerability in the usage of JSON Web Tokens (JWT) for authentication. Specifically, it focuses on the issue of not verifying the token's signature, allowing unauthorized access by tampering with the token's payload.
Skills covered
Authentication
Authorisation
Cryptography
Topics
JWT
cwe-310
Included with PRO
Full course content
2 videos
Ready to practice?
Get access to this lab and 600+ hands-on exercises with a PRO subscription.