JWT
JSON Web Token
What is JWT?
Vulnerability 1: decode() || verify()
decode() || verify()Vulnerability 2: The "None" Algorithm
Vulnerability 3: HS256 Weak Secret
Vulnerability 4: RSA || HMAC Confusion
Vulnerability 5: RSA || HMAC Confusion without Public Key
Lab
Reference
Last updated


