JWT XIV: Exploitation part 2 in Ruby

image of exercise JWT XIV: Exploitation part 2 in Ruby
Access to videos for this exercise is only available with PentesterLab PRO GOPRO
Spoiler
JWT XIV: Exploitation part 2 in Ruby

In this video, we continue exploiting JWT vulnerabilities in Ruby by testing public keys to log in as admin, modifying headers and payloads, and generating valid signatures.

video duration icon05:01 number of views icon37