JWT (JSON Web Token) Attacks
JWTs are widely used for authentication. They consist of Header.Payload.Signature. If the signature is not validated correctly, attackers can forge tokens and impersonate any user - including admins.
JWT Token
eyJhbGciOiJIUzI1NiJ9.eyJzdWIiOiIxMjM0In0.SflKxwRJSMeKKF2QT4fwpMeJf36POk
Header .
Payload .
Signature
Attack Status
Algorithm
-
Sig Valid
-
Role Claimed
-
Outcome
-
JWT Claims
sub
-
username
-
role
-
exp
-
Event Log