🐼
Hacking APIs
search
Ctrlk
  • How web application works?
  • The Anatomy of Web API
  • API Insecurities
  • Setting up an API hacking system
  • API Targets
  • Discovering APIschevron-right
  • Endpoint analysis
  • Vulnerabilitieschevron-right
  • Attacking API authchevron-right
    • Types of auth
    • JWT Hackschevron-right
      • The JWT Crack Attack
      • Brute-force HMAC secret
      • The None Attack
      • Null Signature Attack (CVE-2020-28042)
      • The Algorithm Switch Attack / Algorithm confusion attacks
      • Obtain the server's public key
      • JWT Signature - Disclosure of a correct signature (CVE-2019-7644)
      • CVE-2018-0114
    • ASP.NET Core Cookie Authenticationchevron-right
    • Labs
  • Fuzzingchevron-right
  • Exploiting API Authchevron-right
  • Exploting Mass Assignmentchevron-right
  • API Injectionchevron-right
  • AWS
  • Writeupschevron-right
  • Miscchevron-right
  • Toolschevron-right
  • Resources
  • Wordpress APIchevron-right
  • Prevention
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Attacking API auth

JWT Hacks

hashtag
Remaining attacks

https://book.hacktricks.xyz/pentesting-web/hacking-jwt-json-web-tokensarrow-up-right https://www.youtube.com/watch?v=VA1g7YV8HkIarrow-up-right https://gowthamaraj-rajendran.medium.com/all-about-jwt-attacks-tools-included-8841c0a48b34arrow-up-right https://medium.com/@musab_alharany/10-ways-to-exploit-json-web-token-jwt-ac5f4efbc41barrow-up-right https://zerodayhacker.com/hacking-jwt-json-web-token-part-2/arrow-up-right https://portswigger.net/web-security/jwt/algorithm-confusionarrow-up-right https://github.com/ticarpi/jwt_tool/blob/master/README.mdarrow-up-right https://github.com/ticarpi/jwt_tool/wikiarrow-up-right https://github.com/ticarpi/jwt_tool/wiki/Using-jwt_toolarrow-up-right https://github.com/ticarpi/jwt_tool/wiki/Known-Exploits-and-Attacksarrow-up-right https://portswigger.net/web-security/jwtarrow-up-right https://github.com/ticarpi/jwt_tool/wiki/Known-Exploits-and-Attacksarrow-up-right https://nav7neeet.medium.com/jwt-key-confusion-attack-part1-556c2db4f148arrow-up-right

hashtag
Resources

https://blog.pentesteracademy.com/hacking-jwt-tokens-bruteforcing-weak-signing-key-johntheripper-89f0c7e6a87arrow-up-right Locktalk: https://crypto-cat.gitbook.io/ctf-writeups/2024/cyber_apocalypse_24/web/locktalkarrow-up-right https://ctftime.org/writeup/38742arrow-up-right

PreviousTypes of authchevron-leftNextThe JWT Crack Attackchevron-right

Last updated 1 year ago

  • Remaining attacks
  • Resources