Exploitability of allowed wildcard (*) CORS Origins with Bearer Token Authorization

I’m looking at the following setup. A web application uses a REST API to communicate with the server. All API responses include Origin: *. For authorization Authorization: Bearer <token> is used. Access-Control-Allow-He… Continue reading Exploitability of allowed wildcard (*) CORS Origins with Bearer Token Authorization

Is there a way to perform penetration testing on traffic coming into a specified port?

All pen testing applications I’ve been able to find so far seems to rely upon “hooking up” to a browser. The problem we have is that our automation tests simulate the browser since it’s only executing REST calls and we peel o… Continue reading Is there a way to perform penetration testing on traffic coming into a specified port?

what would be the best approach to generate JWT token for server to server communications?

I am planning to develop an authentication service which generates and validates the JWT token for incoming requests. What would be the best challenge mechanism which could be employed to generate the JWT token?

Since the re… Continue reading what would be the best approach to generate JWT token for server to server communications?