
Modern Webapp Pentesting: How to Attack a JWT
In this video, BB King discusses the security implications and vulnerabilities associated with JSON Web Tokens (JWTs) in web applications. They delve into various attack methods, including the misuse of the ‘none’ algorithm and the potential dangers of poor JWT implementation.