JWT VII

Bookmarked!

This exercise covers the exploitation of a website using JWT for session without verifying the signature

PRO Easy < 1 Hr. 3432 Blue Badge
Course

This course explores the exploitation of a common vulnerability in the usage of JSON Web Tokens (JWT) for authentication. Specifically, it focuses on the issue of not verifying the token's signature, allowing unauthorized access by tampering with the token's payload.

Skills covered
Authentication Authorisation Cryptography
Topics
JWT
cwe-310
Included with PRO
Full course content 2 videos

Ready to practice?

Get access to this lab and 600+ hands-on exercises with a PRO subscription.