Skip to content

Commit 34ed1c6

Browse files
authored
Update hacking-jwt-json-web-tokens.md
Typo
1 parent 8ef762b commit 34ed1c6

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

pentesting-web/hacking-jwt-json-web-tokens.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ The algorithm RS256 uses the private key to sign the message and uses the public
5151

5252
If you change the algorithm from RS256 to HS256, the back end code uses the public key as the secret key and then uses the HS256 algorithm to verify the signature.
5353

54-
Then, using the public key and changing SR256 to HS256 we could create a valid signature. You can retrieve the certificate of the web server executing this:
54+
Then, using the public key and changing RS256 to HS256 we could create a valid signature. You can retrieve the certificate of the web server executing this:
5555

5656
```bash
5757
openssl s_client -connect example.com:443 2>&1 < /dev/null | sed -n '/-----BEGIN/,/-----END/p' > certificatechain.pem #For this attack you can use the JOSEPH Burp extension. In the Repeater, select the JWS tab and select the Key confusion attack. Load the PEM, Update the request and send it. (This extension allows you to send the "non" algorithm attack also). It is also recommended to use the tool jwt_tool with the option 2 as the previous Burp Extension does not always works well.

0 commit comments

Comments
 (0)