Writeup for picoCTF challenge “JAuth”

📰 Medium · Cybersecurity

Manipulate a JWT authentication token to escalate privileges and learn why the “none” algorithm should rarely be used Continue reading on Medium »

Published 13 Apr 2026
Read full article → ← Back to Reads