JWT II: Exploitation
This video requires PentesterLab PRO
GO PRO
JWT II: Exploitation
In this video, we delve into the exploitation of JSON Web Tokens (JWT) in a practical exercise. By manipulating JWTs, we demonstrate how to change user roles and gain unauthorized access using HMAC and RSA algorithms.