Writeup for picoCTF challenge “JAuth”
📰 Medium · Cybersecurity
Manipulate a JWT authentication token to escalate privileges and learn why the “none” algorithm should rarely be used Continue reading on Medium »
Manipulate a JWT authentication token to escalate privileges and learn why the “none” algorithm should rarely be used Continue reading on Medium »