Vickie Li
1 min readNov 6, 2019

--

Hi Jorge, details on how to build an exploit were left out intentionally. But if you want to experiment, you could build a vulnerable JWT application yourself, or try and break libraries that were found vulnerable in the past.

--

--

Vickie Li
Vickie Li

Written by Vickie Li

Professional investigator of nerdy stuff. Hacks and secures. Creates god awful infographics. https://twitter.com/vickieli7

No responses yet