Posts

Showing posts from October, 2019

Introduction how to Exploit JWT

Image
Introduction how to Exploit JWT  Introduction Authentication and authorization make developer overthinking how to implement it correctly without any fear here came frameworks to recuse developer framework like Oauth and OpenID that control on both process (authentication & authorization) in these frameworks you could find new concept it’s JWT that is part of modern authentication frameworks used instead of cookies to keep track user session as we know http stateless protocol. JWT Json Web Token (JWT) is standardized validated and encrypted container format that is used to transfer information between parts. The container format in definition refer to JWT structure, jwt has parties of information that must send with each message    , jwt it’s base64 encoding message consist of three parties Header , Payload and Signature each parts separated   by dot ( . )   . Header this part use to describe cryptography algorithm use with jwt and encode as json and