Keys to JWT Assessments - From a Cheat Sheet to a Deep Dive #1864
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
TrustedSec (Aaron James) provides a practical, tool-driven methodology for assessing JSON Web Tokens (JWTs) in real web applications, focusing on how JWT-based stateless session management works and how common JWT/JWS verification mistakes can be exploited to forge tokens (usually to escalate privileges by modifying payload claims like role, id, username, email, etc.). The post is structured as a quick-reference cheat sheet plus a deeper implementation walkthrough of each test/attack.
🔧 Technical Details
Scoping stateless session controls (bare-minimum token isolation): Pick a sensitive/user-specific endpoint (e.g., profile data) and remove cookies/tokens/headers one by one until access fails. The remaining value(s) are the true session/authorization mechanism(s), giving you a stable replay target for JWT tampering tests.
JWT discovery via Burp regex search: If extensions don’t highlight tokens, use Target > Site map > right-click host > Engagement tools > Search, enable regex, and search for JWT-like patterns such as [= ]eyJ[A-Za-z0-9_-]\.[A-Za-z0-9._-], eyJ[a-zA-Z0-9_-]+?\.[a-zA-Z0-9_-]+?\.[a-zA-Z0-9_-]+, and [= ]eyJ[A-Za-z0-9_\/+-]\.[A-Za-z0-9._\/+-]. Adjust filters because response-header-only searches tend to show issuance, not usage.
JWT reconnaissance (decode + pick targets): Decode JWT header/payload to identify (1) security controls like exp (lifetime) and alg (crypto choice) and (2) authorization-driving claims like role, id, username, email. Use Burp JWT Editor’s...
🤖 Agent Actions
Summary:
kidtraversal/JWK trick.No tests were run (not applicable).
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.