JWT: Exploitation

Return to Exercise
image of exercise JWT: Exploitation

This video requires PentesterLab PRO

GO PRO
Spoiler
JWT: Exploitation

In this exercise, we tamper with a JSON Web Token (JWT) to gain admin access in an application. By using Burp Suite to intercept and modify HTTP traffic, we exploit a vulnerability in the JWT library that allows us to bypass authentication.

video duration icon08:34 number of views icon15727