filmov
tv
Learn How to Hack JWT Token | Multiple way to exploit JWT Token
![preview_player](https://i.ytimg.com/vi/E0s9SADie8M/maxresdefault.jpg)
Показать описание
100K $ bug
#JWTtoken #pentestingJWT #AppleBounty
POC Link :
JWT TOKEN (JSON WEB TOKENS)
2:00 JWT token identification
5:00 Ways to Attck JWT token
9:00 Bounty 100k$ issue analysis
JSON Web Token (JWT) is an open standard (RFC 7519) that defines a compact and self-contained way for securely transmitting information between parties as a JSON object. This information can be verified and trusted because it is digitally signed. JWTs can be signed using a secret (with the HMAC algorithm) or a public/private key pair using RSA or ECDSA.
Ways to attack
2.NONE algorithm
3.Changing the Algorithm from RS256 to HS256
4.Cracking the hs256
JWT brute tool
-----------------------
Authorization: Bearer token
KID
SQL injection, Directory Traversal
“kid”: "aaaaaaa' UNION SELECT 'key';--"
Example JWT Token:
Reference :
DISCLAIMER: This Channel Does NOT Promote or encourage Any illegal activities, all contents provided by This Channel is meant for EDUCATIONAL PURPOSE only.
Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational, or personal use tips the balance in favor of fair use.
#JWTtoken #pentestingJWT #AppleBounty
POC Link :
JWT TOKEN (JSON WEB TOKENS)
2:00 JWT token identification
5:00 Ways to Attck JWT token
9:00 Bounty 100k$ issue analysis
JSON Web Token (JWT) is an open standard (RFC 7519) that defines a compact and self-contained way for securely transmitting information between parties as a JSON object. This information can be verified and trusted because it is digitally signed. JWTs can be signed using a secret (with the HMAC algorithm) or a public/private key pair using RSA or ECDSA.
Ways to attack
2.NONE algorithm
3.Changing the Algorithm from RS256 to HS256
4.Cracking the hs256
JWT brute tool
-----------------------
Authorization: Bearer token
KID
SQL injection, Directory Traversal
“kid”: "aaaaaaa' UNION SELECT 'key';--"
Example JWT Token:
Reference :
DISCLAIMER: This Channel Does NOT Promote or encourage Any illegal activities, all contents provided by This Channel is meant for EDUCATIONAL PURPOSE only.
Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational, or personal use tips the balance in favor of fair use.
Комментарии