JWT XIV: Exploitation part 2 in Ruby

Access to videos for this exercise is only available with PentesterLab PRO
GOPRO
JWT XIV: Exploitation part 2 in Ruby
In this video, we continue exploiting JWT vulnerabilities in Ruby by testing public keys to log in as admin, modifying headers and payloads, and generating valid signatures.