How to Steal a JWT and How to Protect From It

Tomáš Soukal
Security Consultant
Talsec

How to Steal a JWT and How to Protect From It

Tomáš Soukal
Security Consultant
Talsec

How to Steal a JWT and How to Protect From It

Tomáš Soukal
Security Consultant
Talsec

Video Infos
Author
Published
Topics
Author
Published
I will show you how a JWT can be stolen from within your app and used for user impersonation, billing fraud, fake registrations, and other API attacks. You will learn that TOFU is not only food and that there are various ways to establish secure E2E communication, like WAAP and certification pinning.

LATEST ANDROID JOBS

update your work life

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.

Menu