Webgoat – JWT tokens
In this walk through, we will be going through the JWT tokens vulnerability section from Webgoat Labs. We will be exploring and exploiting vulnerable JWT tokens and learn how application are affected because of it. So, let’s get started with the Hacking without any delay. 1. Decoding a JWT token 2. JWT signing 3. Code […]