In this article, we will discuss the attacking part on JWT, which is the hacker’s favorite part. Abusing None algorithm is used to generate a JWToken. In that case, anyone can create a forge JWT Token and submit it to a resource server because there is no signature available in the token.

8m read timeFrom infosecwriteups.com
Post cover image
Table of contents
Attacks on JSON Web Token (JWT)Closing Notes🔈 🔈 Infosec Writeups is organizing its first-ever virtual conference and networking event. If you’re into Infosec, this is the coolest place to be, with 16 incredible speakers and 10+ hours of power-packed discussion sessions. Check more details and register here.
1 Comment

Sort: