Skip to content

Commit 5c3e372

Browse files
carlospolopgitbook-bot
authored andcommitted
GitBook: [master] one page and one asset modified
1 parent 5ebaa83 commit 5c3e372

File tree

2 files changed

+19
-1
lines changed

2 files changed

+19
-1
lines changed

.gitbook/assets/image (435).png

6.69 KB
Loading

pentesting-web/hacking-jwt-json-web-tokens.md

Lines changed: 19 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,25 @@
11
# JWT Vulnerabilities \(Json Web Tokens\)
22

33
**Part of this post was taken from:** [**https://github.com/ticarpi/jwt\_tool/wiki/Attack-Methodology**](https://github.com/ticarpi/jwt_tool/wiki/Attack-Methodology)
4-
**Author of the great tool to pentest JWT** [**https://github.com/ticarpi/jwt\_tool**](https://github.com/ticarpi/jwt_tool)\*\*\*\*
4+
**Author of the great tool to pentest JWTs** [**https://github.com/ticarpi/jwt\_tool**](https://github.com/ticarpi/jwt_tool)
5+
6+
## **Quick Wins**
7+
8+
Run [**jwt\_tool**](https://github.com/ticarpi/jwt_tool) ****with mode `All Tests!` and wait for green lines
9+
10+
```bash
11+
python3 jwt_tool.py -M at -t "https://api.example.com/api/v1/user/76bab5dd-9307-ab04-8123-fda81234245" -rh "Authorization: Bearer eyJhbG...<JWT Token>"
12+
```
13+
14+
If you are lucky the tool will find some case where the web application is correctly checking the JWT:
15+
16+
![](../.gitbook/assets/image%20%28435%29.png)
17+
18+
Then, you can search the request in your proxy or dump the used JWT for that request using jwt\_ tool:
19+
20+
```bash
21+
python3 jwt_tool.py -Q "jwttool_706649b802c9f5e41052062a3787b291"
22+
```
523

624
## Tamper data without modifying anything
725

0 commit comments

Comments
 (0)