Lab 2 - Flawed Signature Verification

Among other things, the JWT header contains an alg parameter. JWTs can be signed using a range of different algorithms, but can also be left unsigned. In this case, the alg parameter is set to none, which indicates a so-called "unsecured JWT".

Log in normally with the given credentials

The JWT Token is in the session cookie

We use the tool, jwt_tool to modify wiener to administrator and change the alg parameter value from RS256 to none

Use the tampered JWT Token and replace the cookie but we only take the header and payload part . The signature is removed (leaving the trailing period)

Last updated