Lab #1 JWT authentication bypass via unverified signature

In this video, we cover Lab #1 in the JWT Attacks module of the Web Security Academy. This lab uses a JWT-based mechanism for handling sessions. Due to implementation flaws, the server doesn't verify the signature of any JWTs that it receives.

To solve the lab, modify your session token to gain access to the admin panel at /admin, then delete the user carlos.

You can log in to your own account using the following credentials: wiener:peter.

▬ 🔗 Links 🔗 ▬▬▬▬▬▬▬▬▬▬

Notes.txt document: https://github.com/rkhal101/Web-Security-Academy-Series/blob/main/jwt-attacks/lab-01/notes.txt

Python Script: https://github.com/rkhal101/Web-Security-Academy-Series/blob/main/jwt-attacks/lab-01/jwt-attacks-lab-01.py

Web Security Academy Exercise Link: https://portswigger.net/web-security/jwt/lab-jwt-authentication-bypass-via-unverified-signature


Complete and Continue