Malware Devil

Friday, November 6, 2020

Abusing JWT (JSON Web Tokens) – Sven Morgenroth – PSW #673

Learn how JWTs are implemented, both the correct way and the insecure way. Spoiler alert, most implement them insecurely. Sven will also show you some of the common attacks against JWTs, for use in your next penetration test, bug bounty, or conversation with your developers!

This segment is sponsored by Netsparker.

Visit https://securityweekly.com/netsparker to learn more about them!
Visit https://www.securityweekly.com/psw for all the latest episodes!
Show Notes: https://wiki.securityweekly.com/psw673

The post Abusing JWT (JSON Web Tokens) – Sven Morgenroth – PSW #673 appeared first on Malware Devil.



https://malwaredevil.com/2020/11/06/abusing-jwt-json-web-tokens-sven-morgenroth-psw-673/?utm_source=rss&utm_medium=rss&utm_campaign=abusing-jwt-json-web-tokens-sven-morgenroth-psw-673

No comments:

Post a Comment

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...