HOME > IT & Software > Hacking and Securing JSON Web Tokens (JWT)

Hacking and Securing JSON Web Tokens (JWT)

SynopsisHacking and Securing JSON Web Tokens (JWT , available at $54....
Hacking and Securing JSON Web Tokens (JWT)  No.1

Hacking and Securing JSON Web Tokens (JWT), available at $54.99, has an average rating of 4.3, with 31 lectures, based on 608 reviews, and has 4077 subscribers.

You will learn about Students will get Indepth knowledge about Json Web Tokens (JWT) Students will learn JWT Implementation Weaknesses Students will learn various practical JWT Attacks Students will learn how to securing JWT Implementations Students will learn how to do JWT based REST API Security testing Students will learn how HS256 and RS256 Algorithms work Students will learn how Hash Based Message Authentication Code (HMAC) works Students will learn how RSA Digital Signatures work Students will learn how to use openssl command line client to practice Cryptographic algorithms This course is ideal for individuals who are Penetration Testers or Web or API Developers or Mobile Application Developers or Security professionals who are interested in REST API Security or Security professionals who are interested in JWT Security or Anyone who is interested in ethical hacking and penetration testing or Anyone who is interested in information security concepts It is particularly useful for Penetration Testers or Web or API Developers or Mobile Application Developers or Security professionals who are interested in REST API Security or Security professionals who are interested in JWT Security or Anyone who is interested in ethical hacking and penetration testing or Anyone who is interested in information security concepts.

Enroll now: Hacking and Securing JSON Web Tokens (JWT)

Summary

Title: Hacking and Securing JSON Web Tokens (JWT)

Price: $54.99

Average Rating: 4.3

Number of Lectures: 31

Number of Published Lectures: 31

Number of Curriculum Items: 31

Number of Published Curriculum Objects: 31

Original Price: $199.99

Quality Status: approved

Status: Live

What You Will Learn

  • Students will get Indepth knowledge about Json Web Tokens (JWT)
  • Students will learn JWT Implementation Weaknesses
  • Students will learn various practical JWT Attacks
  • Students will learn how to securing JWT Implementations
  • Students will learn how to do JWT based REST API Security testing
  • Students will learn how HS256 and RS256 Algorithms work
  • Students will learn how Hash Based Message Authentication Code (HMAC) works
  • Students will learn how RSA Digital Signatures work
  • Students will learn how to use openssl command line client to practice Cryptographic algorithms
  • Who Should Attend

  • Penetration Testers
  • Web or API Developers
  • Mobile Application Developers
  • Security professionals who are interested in REST API Security
  • Security professionals who are interested in JWT Security
  • Anyone who is interested in ethical hacking and penetration testing
  • Anyone who is interested in information security concepts
  • Target Audiences

  • Penetration Testers
  • Web or API Developers
  • Mobile Application Developers
  • Security professionals who are interested in REST API Security
  • Security professionals who are interested in JWT Security
  • Anyone who is interested in ethical hacking and penetration testing
  • Anyone who is interested in information security concepts
  • This course teaches various insecure implementations of Json Web Token (JWT) based REST APIs. This course begins by introducing students to the fundamental Json Web Token concepts. Even though, this is an entry level to intermediate level course, we encourage you to take this course if you already have basic Web Security knowledge as this course is designed to provide knowledge specific to Json Web Tokens and it does not cover the fundamentals of Web Security Testing and REST API Security Testing. Do note that the course involves a lot of JWT fundamental concepts and only the last module covers the practical attacks against JWT. So, please get your expectation right before jumping on the course. Rest Assured, you will feel confident about Json Web Tokens and JWT Security testing after completing this course.

    As a bonus, a Virtual Machine is provided with all the source code used in the labs. So, you can change the code to have few more vulnerable implementations of JWT. 

    Course Curriculum

    Chapter 1: Course Introduction

    Lecture 1: Introduction

    Chapter 2: Introduction to JWT

    Lecture 1: Lab setup

    Lecture 2: Custom Vulnerable APIs – Download

    Lecture 3: What is JWT?

    Lecture 4: JWT Structure

    Lecture 5: Base64 vs Base64url encoding

    Lecture 6: A word about JWT Signature

    Lecture 7: How JWT works?

    Lecture 8: API Documentation – Download

    Lecture 9: JWT Demo

    Lecture 10: Summary

    Chapter 3: JWT indepth

    Lecture 1: JWT Headers

    Lecture 2: JWT Payload

    Lecture 3: JWT Signature

    Lecture 4: Understanding HS256

    Lecture 5: HS256 Demo

    Lecture 6: Understanding RS256

    Lecture 7: RS256 Demo

    Lecture 8: None Algorithm Demo

    Chapter 4: JWT – Command line Kung-Fu

    Lecture 1: Manually creating HS256 Signature

    Lecture 2: Generating RSA Keys using Openssl

    Lecture 3: Manually creating RS256 Signature

    Chapter 5: JWT Attacks and Defenses

    Lecture 1: Introduction

    Lecture 2: Abusing None Algorithm – Demo

    Lecture 3: Abusing None Algorithm using Burpsuite – Demo

    Lecture 4: Signature Stripping Attack – Demo

    Lecture 5: Bruteforcing HS256 Secret Key – Demo

    Lecture 6: Substitution Attack – Demo

    Lecture 7: Defenses

    Chapter 6: Conclusion

    Lecture 1: Conclusion

    Chapter 7: bonus section

    Lecture 1: Bonus lecture

    Instructors

  • Hacking and Securing JSON Web Tokens (JWT)  No.2
    Srinivas .
    Your instructor
  • Rating Distribution

  • 1 stars: 3 votes
  • 2 stars: 14 votes
  • 3 stars: 65 votes
  • 4 stars: 223 votes
  • 5 stars: 303 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!