Capture The Flag (CTF) Challenge – Part 4
ATTACKING JWT’S WITH A CUSTOM SQLMAP TAMPER SCRIPT The Path of Attack After reading the documentation on JWT’s, I decided that this will be my next path of attack. There were a few hints to push me down this path. First, I looked up JWT vulnerabilities. Most attack techniques go after the algorithm for signing…