JWT XIV: Exploitation part 1 in Ruby

Return to Exercise
image of exercise JWT XIV: Exploitation part 1 in Ruby

This video requires PentesterLab PRO

GO PRO
Spoiler
JWT XIV: Exploitation part 1 in Ruby

In this video, we tackle the JWT 14 challenge, demonstrating how to exploit algorithm confusion with ECDSA in Ruby. Using a JWT token, we recover the public key and sign a new token, gaining admin access.

video duration icon07:27 number of views icon86