Course
In this exercise, you will learn how to exploit a signing oracle vulnerability to access sensitive information by reusing the same signing method and secret across different functionalities of a web application.
Skills covered
Authentication
Cryptography
Ready to practice?
Get access to this lab and 600+ hands-on exercises with a PRO subscription.