JWT III: Exploitation

Return to Exercise
image of exercise JWT III: Exploitation

This video requires PentesterLab PRO

GO PRO
Spoiler
JWT III: Exploitation

In this video, we explore the exploitation of JSON Web Tokens (JWT) by manipulating the key ID to inject data and bypass the signature verification process. This exercise demonstrates techniques to generate an exploit that leverages directory traversal and predictable file content to achieve unauthorized access.

video duration icon09:39 number of views icon4665