mirror of
https://github.com/carlospolop/hacktricks
synced 2024-11-22 04:33:28 +00:00
GitBook: [master] one page and one asset modified
This commit is contained in:
parent
5ebaa838cd
commit
5c3e3724ef
2 changed files with 19 additions and 1 deletions
BIN
.gitbook/assets/image (435).png
Normal file
BIN
.gitbook/assets/image (435).png
Normal file
Binary file not shown.
After Width: | Height: | Size: 6.7 KiB |
|
@ -1,7 +1,25 @@
|
|||
# JWT Vulnerabilities \(Json Web Tokens\)
|
||||
|
||||
**Part of this post was taken from:** [**https://github.com/ticarpi/jwt\_tool/wiki/Attack-Methodology**](https://github.com/ticarpi/jwt_tool/wiki/Attack-Methodology)
|
||||
**Author of the great tool to pentest JWT** [**https://github.com/ticarpi/jwt\_tool**](https://github.com/ticarpi/jwt_tool)\*\*\*\*
|
||||
**Author of the great tool to pentest JWTs** [**https://github.com/ticarpi/jwt\_tool**](https://github.com/ticarpi/jwt_tool)
|
||||
|
||||
## **Quick Wins**
|
||||
|
||||
Run [**jwt\_tool**](https://github.com/ticarpi/jwt_tool) ****with mode `All Tests!` and wait for green lines
|
||||
|
||||
```bash
|
||||
python3 jwt_tool.py -M at -t "https://api.example.com/api/v1/user/76bab5dd-9307-ab04-8123-fda81234245" -rh "Authorization: Bearer eyJhbG...<JWT Token>"
|
||||
```
|
||||
|
||||
If you are lucky the tool will find some case where the web application is correctly checking the JWT:
|
||||
|
||||
![](../.gitbook/assets/image%20%28435%29.png)
|
||||
|
||||
Then, you can search the request in your proxy or dump the used JWT for that request using jwt\_ tool:
|
||||
|
||||
```bash
|
||||
python3 jwt_tool.py -Q "jwttool_706649b802c9f5e41052062a3787b291"
|
||||
```
|
||||
|
||||
## Tamper data without modifying anything
|
||||
|
||||
|
|
Loading…
Reference in a new issue