JWT XIV: Exploitation part 2 in Ruby

Return to Exercise
image of exercise JWT XIV: Exploitation part 2 in Ruby

This video requires PentesterLab PRO

GO PRO
Spoiler
JWT XIV: Exploitation part 2 in Ruby

In this video, we continue exploiting JWT vulnerabilities in Ruby by testing public keys to log in as admin, modifying headers and payloads, and generating valid signatures.

video duration icon05:01 number of views icon52