April 10, 2023, 9:29 a.m. | Hashar Mujahid

InfoSec Write-ups - Medium infosecwriteups.com

Hi! My name is Hashar Mujahid. I am a security researcher and a penetration tester. This blog is part 3 of the comprehensive exploitation of JSON web tokens. I recommend you read the first part and 2nd of this series as well.

HEADER

Part 1:

JWT [JSON WEB TOKENS] [EXPLANATION & EXPLOITATION] (0x01)

Part 2:

JWT [JSON WEB TOKENS] [EXPLANATION & EXPLOITATION] (0x02)

In the previous series of JSON web tokens, we discuss all the attack possibilities. Let's now discuss …

algorithm attack bug bounty cybersecurity json jwt jwt token penetration testing tokens web

Sr. Product Manager

@ MixMode | Remote, US

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Security Analysis Senior Specialist

@ NTT DATA | singapore, 01, SG

Information Assurance Analyst - Security Architecture / Vulnerability Management

@ Hawaiian Electric | Honolulu, Hawaii (HI), US, 96840