JWT II: Exploitation

image of exercise JWT II: Exploitation
Access to videos for this exercise is only available with PentesterLab PRO GOPRO
Spoiler
JWT II: Exploitation

In this video, we delve into the exploitation of JSON Web Tokens (JWT) in a practical exercise. By manipulating JWTs, we demonstrate how to change user roles and gain unauthorized access using HMAC and RSA algorithms.

video duration icon11:40 number of views icon7254