Course Overview

JSON Web Token (JWT) has almost become an industry standard for securing REST APIs, and it is extremely useful for web applications, websites, and API developers as well as AppSec professionals as it helps with authorization and secure information exchange between parties. However, improper JWT implementation and flawed JWT handling can often lead to several vulnerabilities, such as flawed JWT signature verification, allowing the Non-algorithm, algorithm confusion, insecure shared or private keys, and others. This allows attackers to target JWT and bypass access control through several attacks, such as algorithm manipulation, brute-forcing weak secret keys, Key ID (KID) manipulation, parameter injections, and injecting arbitrary or no signatures Learning JWT exploitation helps penetration testers, ethical hackers, and security professionals improve their API and application pentesting skills.

The course will begin with a thorough introduction to JSON Web Tokens, where you’ll learn what exactly JWT is, as well as its importance and applications. You’ll then gain a deeper understanding of JWT, where you’ll explore its components and learn how is it applied and how it works. Moving ahead, you’ll then learn about the common vulnerabilities and attacks that affect JWT. Next, the course will illustrate how to set up the lab for JWT exploitation and how to manually create an RS256 Signature and HS256 Signature. You’ll then perform vulnerability scanning on applications using an open-source tool to find JWT vulnerabilities. Next, the course will shift its focus to performing attacks to gain access and carry out token manipulation. Here, you’ll start by learning how to brute-force secret keys, how to leak secret keys, and how to perform None algorithm Exploitation. The course will also illustrate how to perform weak HMAC algorithm exploitation, how to perform algorithm confusion, and how to inject tokens with Arbitrary Signatures. The course will also demonstrate how to carry out signature stripping attacks and how to perform header manipulation. You’ll then move on to understanding how to perform Key ID Manipulation and Injection attacks, starting with performing Key ID manipulation. This will be followed by an illustration of how to carry out directory traversal with Key ID abuse and how to perform SQL injection with Key ID abuse. You’ll also learn how to perform parameter injection and how to carry out command injection. Next, you’ll explore how to document your findings in a report, while you’ll also learn about a few best practices on how to ensure JWT security. The course will also provide a cheat sheet for JWT security testing. The course will end with a short guide for the learners on how they can further leverage what they learned in this course by pursuing EC-Council Certified Encryption Specialist (E|CES).

By the end of this course, you’ll have all the skills needed to test JWT implementations for Vulnerabilities.

What You Will Learn

  • Understand JSON Web Tokens from the ground up.
  • Understand how to discover and exploit JWT vulnerabilities effectively.
  • Gain hands-on experience in crafting and manipulating JWTs.
  • Learn to implement JWT security measures for real-world applications.
  • Strengthen security within JWT-based systems.

Program Curriculum

  • Overview of JSON Web Tokens (JWTs)
  • Use Cases and Advantages of JWTs
  • Anatomy of a JWT: Header, Payload, and Signature
  • Common Libraries and Tools
  • Chapter 1 Quiz

  • Security Goals and Principles of JWTs
  • Common Security Threats and Vulnerabilities
  • Real-world Examples of JWT-based Attacks
  • Best Practices for JWT Implementation
  • Chapter 2 Quiz

  • Setting Up a Test Environment (Web Application with JWT)
  • Obtaining and Decoding JWTs
  • Identifying Vulnerabilities Through JWT Analysis
  • Exploitation Methodology Overview
  • Chapter 3 Quiz

  • Brute-forcing JWT Secrets
  • Token Tampering and Payload Manipulation
  • Signature Bypass Attacks
  • Exploiting Insecure Token Validation Logic
  • JWT Vulnerabilities in Microservices Architectures
  • Case Studies of Real-world Vulnerabilities
  • Chapter 4 Quiz

  • Manually Creating a RS256 and HS256 Signature
  • Vulnerability Scanning of JWT Vulnerabilities (Using Open-Source Tools)
  • Leak Secret Keys
  • Performing Algorithm Confusion
  • Key ID Manipulation
  • Performing Directory Traversal with Key ID Abuse
  • SQL Injection with Key ID Abuse
  • Command Injection with Key ID Abuse
  • Parameter Injection
  • Chapter 5 Quiz

  • How to Secure JWT Implementations?
  • Implementing Proper Token Validation
  • JWT Best Practices and Security Measures
  • Real-world Case Studies of Secure JWT Implementations
  • Chapter 6 Quiz

  • How to Document and Report JWT Vulnerabilities?
  • Collaborating with Development Teams
  • Remediation Recommendations and Follow-up Testing
  • Continuous Security Monitoring and Improvement
  • Chapter 7 Quiz

  • Overview of Useful Tools for JWT Testing and Exploitation
  • Recommended Resources for Further Learning
  • Chapter 8 Quiz
Load more modules

Instructor

Denis Podgurskii

With over 25 years of experience in software development, project management, and application security, Denis is a passionate and skillful leader, researcher, and engineer who strives to deliver secure and reliable solutions for complex and challenging problems.

In addition, Denis is an active member of the application security community and the leader of the OWASP Belfast Chapter, where he organizes events, workshops, and talks to raise awareness and educate developers, testers, and managers on the best practices and latest trends in web security. He is also the owner and creator of the OWASP Penetration Testing Kit, an open-source project that provides a comprehensive and easy-to-use toolset for web application penetration testing.

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering extensive resources with 600+ courses and diverse Learning Paths to enhance your skills.

$ 499.00
Billed annually or $59.00 billed monthly

What is included

  • 700+ Premium Short Courses
  • 50+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs, CTF Challenges, and exclusive EC-Council certifications for comprehensive skill-building.

$ 599.00
Billed annually or $69.00 billed monthly

Everything in Pro and

  • 800+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month
  • 3 Official EC-Council Essentials Certifications¹ (retails at $897!)
    Exclusive Bonus with Annual Plans

¹This plan includes Digital Forensics Essentials (DFE), Ethical Hacking Essentials (EHE), and Network Defense Essentials (NDE) certifications. No other EC-Council certifications are included.

Related Courses

1 of 8