⚕️
Stuff
search
⌘Ctrlk
⚕️
Stuff
  • 🤝Greetings
  • 📘CTF writeups
    • TryHackMe
    • HackTheBox
    • SKR
    • 3108 CTF
    • EQCTF
    • UMCS CTF
    • BBCTF
  • 🕸️PortSwigger (Web Academy)
    • Prototype Pollution
    • JWT
      • Introduction
      • Lab 1 - Unverified Signature
      • Lab 2 - Flawed Signature Verification
      • Lab 3 - Weak Signing Key
      • JWT Header Parameter Injection
      • Lab 4 - Jwk Header Injection
      • Lab 5 - Injecting Self Signed JWT via jku parameter
      • Lab 6 - Injecting Self Signed JWT via kid parameter
      • Algorithm Confusion Attacks
      • Lab 7 - JWT bypass via algorithm confusion
      • Lab 8 - JWT bypass via algorithm confusion with no exposed key
    • XSS
  • 📱Mobile Hacking Lab
    • Strings
  • ☠️Binary Exploitation
    • Stack
    • GDB Plugins
    • pwntools
  • 📰Cheatsheets & Article links
    • All Rounder
    • Web
    • Reverse Engineering
    • Active Directory
    • Linux
    • Binary Exploitation
    • Forensics
    • Intigriti-Monthly-Challenges
    • Miscellaneous / General
  • 🖼️LEKIR Framework writeups
    • Backdoor Exploiting
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. 🕸️PortSwigger (Web Academy)

JWT

Introductionchevron-rightLab 1 - Unverified Signaturechevron-rightLab 2 - Flawed Signature Verificationchevron-rightLab 3 - Weak Signing Keychevron-rightJWT Header Parameter Injectionchevron-rightLab 4 - Jwk Header Injectionchevron-rightLab 5 - Injecting Self Signed JWT via jku parameterchevron-rightLab 6 - Injecting Self Signed JWT via kid parameterchevron-rightAlgorithm Confusion Attackschevron-rightLab 7 - JWT bypass via algorithm confusionchevron-rightLab 8 - JWT bypass via algorithm confusion with no exposed keychevron-right
PreviousLab 9 - Vim Technique & B64chevron-leftNextIntroductionchevron-right