JWT Token
JWT misconfiguration and attacks


Usefull Burp Extensions

Entropy

Start Live Capture

Viewing the token
Tampering with the token
Known HMAC secrets or RSA private keys
Checks JWTs for known HMAC secrets or RSA private keys
JWT Null Signature
Java JDKs 15 to 18 allowing to bypass signature checks
Signature not verified
jwtXploiter
jwt-pwn - unisigned JWT
None algorithm attack – CVE-2015-9235
Also Try with JWTweak
RS256 to HS256 Key Confusion Attack – CVE-2016-5431
Also Try with JWTweak - Change to multiple Algorithme
Crack Weak Signing Key - HS256, HS384 & HS512
HS256
Small list
Big list
Get Key From SSL Certs
Sometimes JWTs are signed using the server ssl connection private key. With the --auto-try option, passing the server domain as argument, the tool will grab the ssl server cert and will extract the public key from it.
Multiple Payloads
JWK Header Injection
JKU header injection
Kid Attacks
Kid injection - Path Traversal
-I: injection mode
-pc field: Field (in the payload) to modify
-pv new_value: Sets the new value of the field
-S: Signature algorithm
https://www.youtube.com/watch?v=78FIFrOi4Os
Kid Out of Band
Forge Signed Tokens
SignSaboteur - Burp Extension
All tests
JWTLens
JWTools
-t : target
-rh: Headers
-pd: Payload Data (in this example IP adresses)
-M pb: Playbook scan
-np: no pause
-M at: All Tests
Tools
JWTtool
jwtXploiter - jwtxpl
JWTcat
jwt-pwn
jwt-hack
JWTweak
Confusional
Resources
Interesting Books
Interesting BooksThe Web Application Hacker’s Handbook The go-to manual for web app pentesters. Covers XSS, SQLi, logic flaws, and more
Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities Learn how to perform reconnaissance on a target, how to identify vulnerabilities, and how to exploit them
Real-World Bug Hunting: A Field Guide to Web Hacking Learn about the most common types of bugs like cross-site scripting, insecure direct object references, and server-side request forgery.
Support this Gitbook
I hope it helps you as much as it has helped me. If you can support me in any way, I would deeply appreciate it.
Last updated

