jwt_tool: A toolkit for testing, tweaking and cracking JSON Web Tokens – Penetration Testing

The JSON Web Token Toolkit

jwt_tool.py is a toolkit for validating, forging and cracking JWTs (JSON Web Tokens).

Its functionality includes:

Checking the validity of a token

Testing for the RS/HS256 public key mismatch vulnerability

Testing for the alg=None signature-bypass vulnerability

Testing the validity of a secret/key

Identifying weak keys via a High-speed Dictionary Attack

Forging new token payload values and resigning with the key (for the HMAC-SHA family of algorithms)

Audience

This tool is written for pentesters, who need to check the strength of the tokens in use and their susceptibility to known attacks.
It may also be useful for developers who are using JWTs in projects but would like to test for stability and for known vulnerabilities when using forged tokens.

Requirements

This tool is written natively in Python 2.x using the common libraries.

Customized wordlists are recommended for the Dictionary Attack option.As a speed reference, an Intel i5 laptop can test ~1,000,000 passwords per second on HMAC-SHA256 signing. YMMV.

Installation

Installation is just a case of downloading the jwt_toolkit.py file (or git cloneing the repo).
(chmod the file too if you want to add it to your $PATH and call it from anywhere.)

Usage

$ python jwt_toolkit.py (wordlist_file)

The first argument should be the JWT itself, followed by a wordlist filename (if you are trying to crack the token).

For example:$ python jwt_toolkit.py eyJhbGciOiAiSFMyNTYiLCAidHlwIjogIkpXVCJ9.eyJhZG1pbiI6IHRydWUsICJuYW1lIjogInRpY2FycGkifQ.DRkDo/XFb/dJCZXiVOMORxq+gcpA7g50xpwfk3UPrJc rockyou.txt

The toolkit will validate the token and list the header and payload values.
It will then provide a menu of your available options.

Further Reading

A great intro to JWTs – http://ift.tt/1Jly9Vd

A lot of the inspiration for this tool comes from the vulnerabilities discovered by Tim McLean.Check out his blog on JWT weaknesses here: http://ift.tt/2b8NbRH

My introduction to using this toolkit, and a bit of the history behind it can be found on my blog – http://ift.tt/2tTkxfP

A couple of exercises for testing JWT vulnerabilities are provided by Pentesterlab. I’d highly recommend a PRO subscription if you are interested in Web App Pentesting.

JWT (alg=None vulnerability) exercise

JWT_II (RS/HS256 public key mismatch vulnerability) exercise

PLEASE NOTE: This toolkit will solve the Pentesterlab JWT exercises in a few seconds when used correctly, however I’d strongly encourage you to work through these exercises yourself, working out the structure and the weaknesses. After all, it’s all about learning…

Source: Github

The post jwt_tool: A toolkit for testing, tweaking and cracking JSON Web Tokens appeared first on Penetration Testing.

http://ift.tt/2tpGxeL http://ift.tt/2aM8QhC

Anúncios

Deixe um comentário

Preencha os seus dados abaixo ou clique em um ícone para log in:

Logotipo do WordPress.com

Você está comentando utilizando sua conta WordPress.com. Sair / Alterar )

Imagem do Twitter

Você está comentando utilizando sua conta Twitter. Sair / Alterar )

Foto do Facebook

Você está comentando utilizando sua conta Facebook. Sair / Alterar )

Foto do Google+

Você está comentando utilizando sua conta Google+. Sair / Alterar )

Conectando a %s