JWT IV - Exploitation
This video requires PentesterLab PRO
GO PRO
JWT IV - Exploitation
In this video, we cover the exploitation technique for JWT (JSON Web Token) vulnerabilities as part of the blue badge exercises. We explore how to manipulate the key ID in the JWT header to achieve command execution through improper use of Ruby's open function.