JWT Vulnerabilities
What is JWT?
eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.
eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6Ikpv
biBEb2UiLCJhZG1pbiI6dHJ1ZX0.
SflKxwRJSMeKKF2QT4fwpMeJf36POk6yJV_adQssw5c
Find JWT tokens
1. Inspect HTTP Headers
2. Check Local Storage, Session Storage, and Cookies
3. Search in JavaScript Files
4. Analyze API Responses
5. Check Logs and Error Messages
6. Use Search Engines (Google Dorking)
Quick win
Common JWT Vulnerabilities and Exploitation Techniques
1. Algorithm Confusion Attack (None Algorithm Bypass)
2. Weak Secret Key (Brute-Force HS256 Secret Key)
3. Key Confusion in RS256 to HS256 Downgrade Attack
4. JWT Expiration and Replay Attacks
5. Sensitive Data Exposure in JWT Payloads
Tools for Penetration Testing JWTs
1. jwt_tool
2. jwt-cracker
3. Burp Suite with JWT Editor
4. John the Ripper & Hashcat
Last updated