JWT Authentication Bypass via Algorithm Confusion with No Exposed Key

  Рет қаралды 4,410

Intigriti

Intigriti

Күн бұрын

Пікірлер: 10
@camelotenglishtuition6394
@camelotenglishtuition6394 Жыл бұрын
Great video! Also, poor Carlos.
@intigriti
@intigriti Жыл бұрын
ikr, he's always the victim 💀
@camelotenglishtuition6394
@camelotenglishtuition6394 Жыл бұрын
Question: i found an excessive data exposure on one of your programs (staff PII) how would I be able to submit that? It isn't massively clear. I have tried to enter a report but I think it's incorrect. Can someone advise me?
@intigriti
@intigriti Жыл бұрын
Hey, you can ask about this in our discord, either publicly or using a support ticket: discord.gg/intigriti-870275171938873395 The first thing I'd say is to carefully check the scope, e.g. leaked credentials/info of staff found on the dark web or data dumps is typically not in scope for bug bounty, see: kb.intigriti.com/en/articles/8128339-reporting-leaked-secrets-credentials
@camelotenglishtuition6394
@camelotenglishtuition6394 Жыл бұрын
@intigriti oh it wasn't from the deep Web.. it was some staff emails sat on a random endpoint with their user ids too.. also when one is tried on the site it re directs to their company login ..does that make sense? Do you think it's worth filing a report for?
@grassy-p12
@grassy-p12 Жыл бұрын
Q:what here is signing and verifying token/confused ; help me?
@intigriti
@intigriti Жыл бұрын
Sure! When the algorithm is using asymmetric key (RSA), the server signs the JWT using a private key, then the related public key (it's a public-private keypair) will be used to verify the signature. When the algorithm is symmetric (HS256) there's only one key, which is used to both sign and verify. If we can trick the server into using HS256 alg instead of RS256 and sign the token with the public key (assuming we can find it), the server will use that same public key to verify, allowing us to forge tokens! Hope that helps 🙂
@grassy-p12
@grassy-p12 Жыл бұрын
@@intigriti thank you so much; happy to get your attention ;
@jondo-vh8tx
@jondo-vh8tx 10 ай бұрын
sorry man nothing against you just so you know but t his is amazing: "dont worry to much about this"....sound like a realy good idea to teach out security
@intigriti
@intigriti 10 ай бұрын
It's been a while since I made this video so I miss the reference, can you timestamp the video / explain? edit: n/m I realised you are talking about the Portswigger material 😅 The reason it says "don't worry too much about what this means" is because the underlying technical details aren't relevant to the lab and if we deep-dived on related every tool/principle, every lab would take hours and go way off course. Instead it's best to focus on the goal at hand, if people want to learn more about the underlying tech, that's great! Just take a break from the lab and go and do some background research 😉
How to search for XSS (with blacklisted HTML tags)!
6:29
Intigriti
Рет қаралды 21 М.
JWT Authentication Bypass via jwk Header Injection
14:02
Intigriti
Рет қаралды 7 М.
Enceinte et en Bazard: Les Chroniques du Nettoyage ! 🚽✨
00:21
Two More French
Рет қаралды 42 МЛН
It works #beatbox #tiktok
00:34
BeatboxJCOP
Рет қаралды 41 МЛН
小丑女COCO的审判。#天使 #小丑 #超人不会飞
00:53
超人不会飞
Рет қаралды 16 МЛН
To Brawl AND BEYOND!
00:51
Brawl Stars
Рет қаралды 17 МЛН
JWT Authentication Bypass via Algorithm Confusion
12:24
Intigriti
Рет қаралды 7 М.
Multi-endpoint Race Conditions
19:06
Intigriti
Рет қаралды 4,3 М.
Cracking JSON Web Tokens
14:34
The Cyber Mentor
Рет қаралды 60 М.
Web Shell Upload via Content-Type Restriction Bypass
11:30
Intigriti
Рет қаралды 19 М.
Indirect Prompt Injection
11:32
Intigriti
Рет қаралды 3,2 М.
Introduction to JWT Attacks
16:33
Intigriti
Рет қаралды 10 М.
Bypassing Rate Limits via Race Conditions
16:54
Intigriti
Рет қаралды 7 М.
Finding and Exploiting an Unused API Endpoint
7:10
Intigriti
Рет қаралды 9 М.
JWT Authentication Bypass via kid Header Path Traversal
15:11
Intigriti
Рет қаралды 4,9 М.
Enceinte et en Bazard: Les Chroniques du Nettoyage ! 🚽✨
00:21
Two More French
Рет қаралды 42 МЛН