Attacks on JSON Web Token (JWT)
In this article, we will discuss the attacking part on JWT, which is the hacker’s favorite part. Abusing None algorithm is used to generate a JWToken. In that case, anyone can create a forge JWT Token and submit it to a resource server because there is no signature available in the token.