# Portswigger JWT - Lab 1 ## Athentication bypass via unverified signature In this lab we need to bypass the implementation flaw of the JWT token to login as the admin user, we can login as the normal user with the credentials `wiener:peter` We are now logged in as wiener Visiting `/admin` we can see a username `administrator` To check the JWT token for this user we can go to developer tools, `storage` tab, we'll see the JWT in a `session` variable We can analyze this token on the site https://token.dev/ Although it shows `Signature Verification failed` we can still try to modify the username if the server doesn't check the verification of the JWT Now we need to replace the JWT with our forge JWT to become the administrator user We can now delete `Carlos` user to solve the lab