Introduction how to Exploit JWT
Introduction how to Exploit JWT Introduction Authentication and authorization make developer overthinking how to implement it correctly without any fear here came frameworks to recuse developer framework like Oauth and OpenID that control on both process (authentication & authorization) in these frameworks you could find new concept it’s JWT that is part of modern authentication frameworks used instead of cookies to keep track user session as we know http stateless protocol. JWT Json Web Token (JWT) is standardized validated and encrypted container format that is used to transfer information between parts. The container format in definition refer to JWT structure, jwt has parties of information that must send with each message , jwt it’s base64 encoding message consist of three parties Header , Payload and Signature each parts separated by dot ( . ) . Header this part use to describe cryptography algorithm use with jw...