JWT IV - Exploitation

image of exercise JWT IV - Exploitation
Access to videos for this exercise is only available with PentesterLab PRO GOPRO
Spoiler
JWT IV - Exploitation

In this video, we cover the exploitation technique for JWT (JSON Web Token) vulnerabilities as part of the blue badge exercises. We explore how to manipulate the key ID in the JWT header to achieve command execution through improper use of Ruby's open function.

video duration icon08:39 number of views icon2121