JWTXploiter is a tool to test security of JSON Web Tokens. Test a JWT against all known CVEs;
- Tamper with the token payload: changes claims and subclaims values.
- Exploit known vulnerable header claims (kid, jku, x5u)
- Verify a token
- Retrieve the public key of your target’s ssl connection and try to use it in a key confusion attack with one option only
- All JWAs supported
- Generates a JWK and insert it in the token header
- And much, much more!
Wiki
- Read the wiki! wiki
Installation
N.B. Cloning the repository should be avoided except for development purposes! N.B. Deb package has to be considered beta
- With rpm:
wget http://andreatedeschi.uno/jwtxploiter/jwtxploiter-1.2.1-1.noarch.rpm
sudo rpm –install jwtxploiter-1.2.1-1.noarch.rpm
or, if previous version is installed on your machine
sudo rpm –upgrade jwtxploiter-1.2.1-1.noarch.rpm
With pip
sudo pip install jwtxploiter
With deb:
wget http://andreatedeschi.uno/jwtxploiter/jwtxploiter_1.2.1-1_all.deb
sudo dpkg -i jwtxploiter_1.2.1-1_all.deb
Cloing the repo:
git clone https://github.com/DontPanicO/jwtXploiter.git
./install.sh
N.B. python3-pip package is required to install dependencies, be sure to have it installed.