Some signing algorithms, such as HS256 (HMAC + SHA-256), use an arbitrary, standalone string as the secret key resulting in the key can be easily guess/brute-forced
Login with the given credentials
Grab the JWT Token from the session key
We will use the jwt_tool to crack the secret key using the -C and -d for the dictionary
The secret key is: secret1
Now we change the sub parameter to administrator and sign the JWT Token with the secret key with -S to specify the algorithm and -p to specify the key
Replace the session with the new generated Token and we can access /admin