JWT Tool(jwt_tool.py) is a toolkit for validating, forging and cracking JWTs (JSON Web Tokens). Its functionality includes:
Audience
This tool is written for pentesters, who need to check the strength of the tokens in use, and their susceptibility to known attacks.
It may also be useful for developers who are using JWTs in projects, but would like to test for stability and for known vulnerabilities, when using forged tokens.
Also Read – Ph0neutria : Malware Zoo Builder That Sources Samples Straight From The Wild
Requirements
This tool is written natively in Python 2.x using the common libraries. Customised wordlists are recommended for the Dictionary Attack option.
As a speed reference, an Intel i5 laptop can test ~1,000,000 passwords per second on HMAC-SHA256 signing. YMMV.
Installation
Installation is just a case of downloading the jwt_tool.py file (or git cloneing the repo). (chmod the file too if you want to add it to your $PATH and call it from anywhere.)
Usage
$ python jwt_tool.py (filename)
The first argument should be the JWT itself, followed by a filename/filepath (for cracking the token, or for use as a key file).
For example:
$ python jwt_tool.py eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJsb2dpbiI6InRpY2FycGkifQ.aqNCvShlNT9jBFTPBpHDbt2gBB1MyHiisSDdp8SQvgw /usr/share/wordlists/rockyou.txt
The toolkit will validate the token and list the header and payload values.
It will then provide a menu of your available options.
Note: signing the token is currently supported using HS256, HS384, HS512 algorithms
Input is in either standard or url-safe JWT format, and the resulting tokens are output in both formats for your ease of use.
Further Reading
Regex for finding JWTs in Burp Search
(make sure ‘Case sensitive’ and ‘Regex’ options are ticked)
[= ]ey[A-Za-z0-9_-]*\.[A-Za-z0-9._-]* – url-safe JWT version[= ]ey[A-Za-z0-9_\/+-]*\.[A-Za-z0-9._\/+-]* – all JWT versions (higher possibility of false positives)Artificial Intelligence (AI) is changing how industries operate, automating processes, and driving new innovations. However,…
Image credit:pexels.com If you think back to the early days of personal computing, you probably…
In an era defined by technological innovation, the way people handle and understand money has…
The online world becomes more visually driven with every passing year. Images spread across websites,…
General Working of a Web Application Firewall (WAF) A Web Application Firewall (WAF) acts as…
How to Send POST Requests Using curl in Linux If you work with APIs, servers,…