JWT II: Exploitation

Return to Exercise
image of exercise JWT II: Exploitation

This video requires PentesterLab PRO

GO PRO
Spoiler
JWT II: Exploitation

In this video, we delve into the exploitation of JSON Web Tokens (JWT) in a practical exercise. By manipulating JWTs, we demonstrate how to change user roles and gain unauthorized access using HMAC and RSA algorithms.

video duration icon11:40 number of views icon7526