📄 Cyber Security Certification Notes & Cheat Sheets
https://buymeacoffee.com/notescatalog/extras
🚀(2nd link) Cyber Security Certification Notes & Cheat Sheets
https://shop.motasem-notes.net/collections/cyber-security-study-notes
💡Cyber Security Notes | Membership Access
https://buymeacoffee.com/notescatalog/membership
🧩Cybersecurity Direct Coaching & Mentoring
https://shop.motasem-notes.net/collections/coaching-and-mentoring-programs
🔥Download FREE Cyber Security 101 Study Notes
https://buymeacoffee.com/notescatalog/e/290985
🧠 Get Strategic cyber security and tech insights weekly to your email by joining my newsletter below
https://buymeacoffee.com/notescatalog/membership
📊Blog Writeups
https://www.motasem-notes.net
🔥 Writeup
https://motasem-notes.net/understanding-json-web-token-vulnerabilities-tryhackme/
*****
In this video walk-through, we covered JSON Web Tokens and its associated vulnerabilities. In JWT, the signature can be changed or the header to bypass authentication controls. This video is part of ZTH: Obscure Web Vulns room from TryHackMe.
#JSON
#infosec
****
Brand collaborations and sponsorships
https://motasem-notes.net/advertise/
****
Store
https://buymeacoffee.com/notescatalog/extras
Patreon
https://www.patreon.com/motasemhamdan
Instagram
https://www.instagram.com/motasem.hamdan.tech
LinkedIn
[1]: https://www.linkedin.com/in/motasem-hamdan-7673289b/
[2]: https://www.linkedin.com/in/motasem-eldad-ha-bb42481b2/
Twitter
https://twitter.com/ManMotasem
Facebook
https://www.facebook.com/motasemhamdantty/
TikTok
https://www.tiktok.com/@motasemhamdan0
****