🐼
Hacking APIs
search
Ctrlk
  • How web application works?
  • The Anatomy of Web API
  • API Insecurities
  • Setting up an API hacking system
  • API Targets
  • Discovering APIschevron-right
  • Endpoint analysis
  • Vulnerabilitieschevron-right
  • Attacking API authchevron-right
  • Fuzzingchevron-right
  • Exploiting API Authchevron-right
  • Exploting Mass Assignmentchevron-right
  • API Injectionchevron-right
  • AWS
  • Writeupschevron-right
  • Miscchevron-right
    • Auth type
    • Brute Force - CheatSheet
    • Cryptographychevron-right
      • JWT Handbook
      • Symmetric vs asymmetric algorithms
      • HS2562
      • RS256
    • Commands
    • XSS
  • Toolschevron-right
  • Resources
  • Wordpress APIchevron-right
  • Prevention
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Miscchevron-right
  2. Cryptography

JWT Handbook

file-pdf
2MB
jwt-handbook-v0_14_1.pdf
PDF
arrow-up-right-from-squareOpen

https://portswigger.net/web-security/jwt#what-are-jwt-attacksarrow-up-right

PreviousCryptographychevron-leftNextSymmetric vs asymmetric algorithmschevron-right

Last updated 1 year ago