Abusing JWT (JSON Web Tokens) - Sven Morgenroth - PSW #673

published 6 months ago by Security Weekly

Learn how JWTs are implemented, both the correct way and the insecure way. Spoiler alert, most implement them insecurely. Sven will also show you some of the common attacks against JWTs, for use in your next penetration test, bug bounty, or conversation with your developers!   This segment is sponsored by Netsparker. Visit to learn more about them!   Visit for all the latest episodes! Show Notes:

more episodes from Paul's Security Weekly TV