⌨️
Penetration testing & ethical hacking concepts
search
Ctrlk
  • Introductionchevron-right
  • 💿Virtual Machines
    • VirtualBoxchevron-right
    • VMware Workstationchevron-right
  • 🕵️OSINT
    • What is OSINT?
    • Google dorks
    • Metadata
    • Social mediachevron-right
  • Toolschevron-right
  • 😨Social Engineering
    • What is social engineering?
    • 7 tricks of social engineering
    • Email phishing
    • Typosquatting
    • Compiled resources
  • 😈MitM attack
    • What is MitM attack?
    • ARP spoof/poison
    • DNS spoof/poison
    • HTTP MitM attack
    • ICMP redirect attack
    • DHCP spoofing
    • Evil twin attack
    • Experiment (guest network)
    • Compiled resources
  • 🔌UPnP exploitation
    • What is UPnP?
    • What is SSDP?
    • IGD functions
    • LAN devices
    • Compiled resources
  • ethernetNetwork Reconnaissance & Attacks
    • What is network recon & attacks?
  • 1️⃣ Network live host discovery
    • What is network live host discovery?
    • nmap
    • arp-scan
    • masscan
  • 2️⃣ Network port scan/services enumeration
    • What is network port scan/services enumeration?
    • nmap
    • netcat
    • rustscan
  • 3️⃣ Network services vulnerability scanning & exploitation
    • What is network vulnerability scanning/exploitation?
    • 20/21 ~ FTP
    • 22 ~ SSH
    • 25 ~ SMTP
    • 53 ~ DNS
    • 80/443 ~ HTTP/HTTPS
    • 88 ~ Kerberos
    • 110 ~ POP3
    • 111/2049 ~ RPC/NFS
    • 139/445 ~ SMB
    • 143 ~ IMAP
    • 161 ~ SNMP
    • 3389 ~ RDP
  • bugVulnerability & exploitation
    • Database
    • Metasploitchevron-right
    • Msfvenom
  • Misconfigurationschevron-right
  • binaryReverse Engineering/Binary Exploitation
    • Readings
    • Resources
    • General knowledgechevron-right
    • Assemblychevron-right
    • Computer architecturechevron-right
    • Buffer Overflowchevron-right
    • Reverse Engineeringchevron-right
    • Toolschevron-right
  • microchipHardware Exploitation
    • Resourcechevron-right
    • Toolkit
    • Techniqueschevron-right
  • Other important skillschevron-right
  • Research ideas
  • Past experimentschevron-right
  • globe-pointerWeb Exploitation
    • Introduction
    • Injection attackschevron-right
    • Server-Side attackschevron-right
    • Client-Side attackschevron-right
    • HTTP Request Smugglingchevron-right
    • Web Content Discoverychevron-right
    • Authentication/session managementchevron-right
  • Webshell
  • Web API pentestingchevron-right
  • OWASPchevron-right
    • OWASP top 10 2021
    • OWASP API top 10 2023
    • Web Security Testing Guide (WSTG)chevron-right
      • WSTG-ATHZchevron-right
      • WSTG-SESSchevron-right
        • WSTG-SESS-10 ~ JWT
  • General web knowledgechevron-right
  • Framework specificchevron-right
  • Methodologychevron-right
  • 🛣️Attacks on routing protocols
    • What are attacks on routing protocols?
    • BGP hijacking
  • 🏕️To explore
    • MQTT
    • Routersploit
    • DNS rebinding attack
    • LLMNR/mDNS poisoning
  • 👤Anonymity
    • VPN
    • Proxychains
    • TOR
    • Obfuscation
  • binary-lockCredentials brute-force/cracking
    • Introduction
    • Windows SAM database
    • Dictionary attack
    • Rainbow attackchevron-right
    • Toolschevron-right
  • hand-fistPost-exploitation
    • Gaining shellchevron-right
    • Repository
    • Lateral movement & Pivotingchevron-right
  • person-arrow-up-from-linePrivilege escalation
    • Linuxchevron-right
    • Windowschevron-right
  • Ⓜ️MITRE ATT&CK
    • Introduction
    • OS Credential Dumping (T1003)chevron-right
  • 🧰Tools/services
    • Introduction
    • Web application pentestingchevron-right
    • Information gathering/reconnaissance
    • Network recon & attackschevron-right
    • Generalchevron-right
    • Wordlistschevron-right
  • file-chart-columnProfessional report writing
    • Report templatechevron-right
  • Tasks on-the-gochevron-right
  • Practicechevron-right
  • user-secretForensics
    • Steganographychevron-right
  • shield-checkOperational Security (OpSec)
    • Hardeningchevron-right
  • Safe document viewerchevron-right
  • pencilChallenge write-ups
    • CTFs/Labs/Challenges compilation
    • OverTheWirechevron-right
    • TryHackMechevron-right
    • PicoCTFchevron-right
    • HackTheBox
    • VulnHub
    • OWASPchevron-right
    • CSCV 2025chevron-right
  • brain-circuitAI prompt
    • ChatGPT
  • windowsWindows/Active Directory
    • Introductionchevron-right
    • Initial Accesschevron-right
    • Enumerationchevron-right
    • Lateral movement & Pivotingchevron-right
    • Exploitation techniqueschevron-right
    • Credentials harvestingchevron-right
    • Generalchevron-right
    • Toolschevron-right
    • Methodologychevron-right
    • Experimentationschevron-right
  • 🐉OSCP
    • Resources
    • Practice labschevron-right
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. OWASPchevron-right
  2. Web Security Testing Guide (WSTG)chevron-right
  3. WSTG-SESS

WSTG-SESS-10 ~ JWT

LogoOWASP WSTG-SESS-10 ~ JSON Web Token (JWT) | Penetration testing & ethical hacking conceptsjarrettgxz-sec.gitbook.iochevron-right

hashtag
Examples

  1. Exploiting kid header value:

LogoHammer | Penetration testing & ethical hacking conceptsjarrettgxz-sec.gitbook.iochevron-right

PreviousWSTG-SESSchevron-leftNextGeneral web knowledgechevron-right

Last updated 7 months ago