Lab 3 - Weak Signing Key

Some signing algorithms, such as HS256 (HMAC + SHA-256), use an arbitrary, standalone string as the secret key resulting in the key can be easily guess/brute-forced

Login with the given credentials

Grab the JWT Token from the session key

We will use the jwt_tool to crack the secret key using the -C and -d for the dictionary

The secret key is: secret1

Now we change the sub parameter to administrator and sign the JWT Token with the secret key with -S to specify the algorithm and -p to specify the key

Replace the session with the new generated Token and we can access /admin

Last updated