API Token Attacks
Using Burp Suite for Token Analysis
JWT Attacks
Components of JWTs:
Using JWT.io for Analysis:
Tools for JWT Analysis:
Common JWT Vulnerabilities:
JWT Attack Techniques
For More Attacks and Techniques about .jwt look at the jwt_Hacking Page.
Last updated