Pentest List Wiki
  • What is Pentest List Wiki?
  • OFFENSIVE SECURITY
    • External Infrastructure
      • Discovery
        • Email Address Discovery
        • Subdomain Discovery
        • Data Discovery
        • Port & Service Discovery
      • Exploitation
        • Password Spraying
        • Vulnerability Scanning
    • Internal Infrastructure
      • General Discovery
        • AD Attack Path Discovery
        • Port & Service Discovery
      • Credential Discovery
        • Passwords and NetNTLM
        • SAM & LSA secrets
        • NTDS.dit secrets
        • LSASS secrets
        • DCSync
        • DPAPI secrets
      • Movement
        • Credential Spraying
        • SMB Relaying
        • Pass The Hash
      • Infiltration/Exfiltration
        • Pivoting (Proxying)
    • Web Application
      • Discovery
        • Testing API Keys
        • Vulnerability Scan
        • Web Content Discovery
        • Parameter Discovery
        • VHOST Discovery
        • CMS Scanners
      • Exploitation
        • Authentication
          • Email Address Forms
          • AWS Cognito
        • JSON Web Tokens
        • Injection Attacks
          • SQL Injection
          • Cross-Site Scripting
          • HTTP Headers
      • Bypasses
        • Cloudflare Bypass
        • HTTP 403 Bypass
    • Mobile (iOS/Android)
      • iOS
        • IPA Decryption
        • Filesystem Analysis
        • Static Analysis
    • Cloud
      • AWS
        • Vulnerability Scanners
        • S3 Buckets
      • Azure
        • Vulnerability Scanners
        • m365 & Entra ID
  • DEFENSIVE SECURITY
    • Forged Kerberos Tickets
    • Logon Event Visualisation
Powered by GitBook
On this page
  • JWT Tool
  • Cracking with Hashcat
  1. OFFENSIVE SECURITY
  2. Web Application
  3. Exploitation

JSON Web Tokens

How to exploit JSON Web Tokens.

PreviousAWS CognitoNextInjection Attacks

Last updated 11 months ago

JWT Tool

JWT Tool is great for finding issues in JSON Web Tokens. It will help to identify the following issues:

  • JWT uses HS256 signing algorithm

  • JWT contains sensitive data

  • JWT does not expire

  • JWT permits a NULL signature

  • RS256 to HS256

python jwt_tool.py <JWT> -X a

Cracking with Hashcat

Use the following command to crack JWTs.

hashcat.exe -m 16500 /JWT.txt rockyou.txt --backend-ignore-cuda

JWT.txt should contain your JWT.

Various password wordlists can be used. rockyou.txt is one example.

https://github.com/ticarpi/jwt_tool/
https://hashcat.net/hashcat/