This post explains the concept of JSON Web Tokens (JWT), specifically focusing on the explanation and exploitation of JWT header parameters such as JWK and JKU. It provides examples and discusses techniques for exploiting these parameters.

5m read timeFrom infosecwriteups.com
Post cover image
Table of contents
JWT [JSON WEB TOKENS] [EXPLANATION & EXPLOITATION] (0x02)JWT header parameter injections.SELF SIGNED JWT WITH JKU HEADER INJECTION:SELF SIGNED JWT WITH JWK PARAMETER.

Sort: