Writeup for picoCTF challenge “JAuth”
Share

Manipulate a JWT authentication token to escalate privileges and learn why the “none” algorithm should rarely be used

 

 Manipulate a JWT authentication token to escalate privileges and learn why the “none” algorithm should rarely be usedContinue reading on Medium » Read More Hacking on Medium 

#hacking

By ali

Leave a Reply