Full disclosure: I know little to nothing about hacking. Using these hacks on sites (also your other video on JSON), wouldn't they be able to find you once you try to send a product bought on a site and send it to yourself? Hopefully you aren't sending it to your house.
@aksn15153 жыл бұрын
Hi 'Loi Liang Yang' Please You Can Do a Help For Me Please Please
@anormalguy25293 жыл бұрын
Hi hacker loi sir,kindly make a video on kon boot please
@DurgaPrasad-we1yn3 жыл бұрын
Tom
@devesh17213 жыл бұрын
I prefer myself 🤔
@redmatrice4709 Жыл бұрын
Correct me if i'm wrong! but the main reason for using the JWT is to verify the user without the need to connect a database and compare the values? and also changing the values of the payload misses completely the signature , which already encrypted with secret key and should be rejected in the first place, if someone uses the JWT without verifying it somehow in their website he shouldn't use JWT at all, it's like giving access to everyone and trusting blindly every user!! Steps as far as i know : 1 - get the JWT 2 - verify the signature by decrypting it using the secret key (the most important), exp ... 3 - proceed to the next step (perform any action you need) if 1 fails, reject everything if 1 doesn't fail and 2 fails reject everything if 1 and 2 doesn't fail now you can go to the step three and perform the action
@JanRautiainen3 жыл бұрын
Interesting technique, another scenario to add to my vuln checking, thanks for sharing
@VineetYadav3 жыл бұрын
While this is good one, it very much depends on dal layer which is by default prevented by dal fw. Also someone using jwt must be using some sort of lib, and not.directly doing jwt implementation. So might not be taht much practical in real world.... Not sure if there is some one that idiot in real world.who queries SQL directly.
@COLMANRYAN62 Жыл бұрын
Brother, I love all your videos. They are concise, quick, no bullshit, no music and you could not have done a better job.
@rainfallen10643 жыл бұрын
I'm a bit confused. I thought the whole purpose of the JWT being secure is that the token CAN'T be manipulated (without knowing the private key). When the KID property, EXP property, etc. was changed, I would assume the the server will immediately reject it because the signature would no longer match. Or is the JWT token being used differently in this example?
@aquaman88703 жыл бұрын
yea this wont happen why would you ever run or check something against the database if the Token isn't even verified. The first step is to always check the token signature and if that's invalid you just return. Why would you trust a token that isn't even verified?
@Unhacker2 жыл бұрын
The signature check just never happened, it swallowed the SQL injection while looking up the key id, before it even got to verifying it. However, I'm skeptical that this reflects the order of those operations in real-world implementations, as others have noted.
@flymoracer Жыл бұрын
The point is that in order to check the signature is valid, you must handle and process the supplied header and payload. If that processing code isn’t written securely, you leave open the risk of an injection attack.
@rainfallen1064 Жыл бұрын
@@flymoracer because the ones listening to him are beginners and don’t know actual details?
@flymoracer Жыл бұрын
@@rainfallen1064 not sure I understand you’re point here. The difference is subtle, but the important thing to realise is that there’s nothing to prevent a JWT being changed, the security comes from being able to detect that it’s changed.
@lakshaynz2 жыл бұрын
how did you know which table you needed to insert into ?
@ousseynoungom9937 Жыл бұрын
Good question !!!
@vishal43383 жыл бұрын
from a developers perspective highly unlikely to happen that someone will query a set of keys to just verify a token usually, the public keys are stored in some form of cache for a lower response time, and the "unsafe headers" are not usually passed down directly to any query. if the key is not found in the cache the authentication fails
@SirAppSec2 жыл бұрын
From an Application security Enginer pespective. It happens a lot in the wild, devs make mistakes, even when they are not aware. I saw tokens being only decoded(not verified at all), I saw exploits that occure when the Algorithm changes, heck I even saw sqlinjection from a jwt key(the actual key, not the value). You don't always have to actually reach full authentication to exploit a web server.
@moazsayed7246 Жыл бұрын
me who was just thinking to save the secure key of the tokens in the database :🙄🙄🙄
@dmitriylevy78652 жыл бұрын
how did key-id with sql query from some table that gives you no useful information, give you the authorization to delete user? server side key id targets nothing and server does not throw an error so then it authenticates you?
@md.riyasathossain5903 жыл бұрын
Sir Loi, it was a great hacking tutorial! But now the thing is, how can "we" secure our JWT tokens and the websites using JWT?
@abura1han Жыл бұрын
Is it possible to hack if MongoDB is being used?
@sto2779 Жыл бұрын
1:18 - "We're trying to remove the cats account"... That sounds so wrong lmao
@anooppk23413 жыл бұрын
But the jwt tokens are created using a secret key in server . So if we change the payload then the server will not verify the token. Because the secret will be changed..So will this method work?
@lighty2623 жыл бұрын
He forgot to mention that the jwt token from his example are unsigned. I'm not sure why is he not mentioning this important part with jwt.
@henryofozor16023 жыл бұрын
@@lighty262 not a serious hack just for video sake
@oentrepreneur5 ай бұрын
Ok but what if the secret key is exposed in the JSON web token? Will that make this hack possible?
@codasnotif4815 Жыл бұрын
Did you really read those books thoroughly ?
@Uneke3 жыл бұрын
How did you know the location? Usually I’ve had to run sql multiple times to escalate ad find location names.
@SirAppSec2 жыл бұрын
He's familiar with the database scheme/ structure via writeup or earlier challenges. What you can do is route the request via sqlmap with a tamper script that would decode the token, change a parameter to the sqlmap payload, and sign the payload token to the website. that way you can use sqlmap and fuzz the server. try it with every parameter. and you'd cover a lot of potential entry points.
@Uneke2 жыл бұрын
@@SirAppSec I’m not familiar with fuzzing, but I have some man pages I can read on my kali distro. If I can get a grasp, I’ll give it a shot. Thanks for the advice. Seems like it would make things easier
@Abasalt_Yar3 жыл бұрын
Hello, Thanks for the video. How can we prevent this ?
@S0nxc_13 жыл бұрын
Hey how did you learn to hack , like any courses or like college ?
@il902 жыл бұрын
I didn't understand how you knew the key?
@zzsql Жыл бұрын
Good brief, Loi. Thanks. I touch on this subject for the PenTest+ class I teach. Useful content here.
@hackerxploit73 жыл бұрын
U always have good vids! 👏 Keep going!
@benjaminargueta37773 жыл бұрын
How would you protect against this attack?
@mr.RAND55843 ай бұрын
We must have a long random key. Am I right?
@ritmeelegan3 жыл бұрын
Where telegram group for basic hacking step by step thanks you so much🤔
@prodbydramatic3 жыл бұрын
lol
@ritmeelegan3 жыл бұрын
@@prodbydramatic 😆😆😆😆😆
@FabulousFitsFantasy3 жыл бұрын
is it mean you have to know the server containing the key first?
@amritpandya4434 ай бұрын
how yo get a m3u8 link with only the token data which expire in 10 second interval and a new token data arrives ?
@ramlal-kq1qr3 жыл бұрын
Make a video in sql injection
@Peterb2002953 жыл бұрын
I've also done this once in a CTF by setting the algorithm to none :D
@anormalguy25293 жыл бұрын
Hi hacker loi sir,kindly make a video on kon boot please
@MuhammadAli-zg2nw3 жыл бұрын
every website encrypt token different with different algorithms. I tried that website and it didnt tell me token information.
@snowieow78423 жыл бұрын
Loi, I swear you're stalking me. I've just been doing labs all weekend on JWT and it was exploding my brain. Now you come along and make videos about this topic? Don't know if a coincidence or if you've hacked me
@massiveblackwood Жыл бұрын
Are you able to hack now?
@littleguardian4213 жыл бұрын
Sir, How do i watch member only content?
@НиколайКол-е2и3 жыл бұрын
yah, no properly encrypted tokens and no csrf... what could go wrong?
@tunisiaFANS3 жыл бұрын
same question I don't know jwt too much But are'nt they supposed to be encrypted based on some algorithms and secret key's 🤔🤔 Can someone explain to a noob please how this is possible...
@tunisiaFANS3 жыл бұрын
And what is the purpose of jwt anyway If anyone could miss around with it 😓🤔🤔
@k1dprogaming1083 жыл бұрын
I run linux but i can’t use anything because it’s telling me to remove Kali-menu when i try i get an error can anyone help me please?? 🙏🏻🙏🏻
@baadrqaaba95293 жыл бұрын
So how can i protect my jwt from being hacked ?
@erenyt-f7y3 жыл бұрын
Sir pls can you tell me how to join your telegram
@ayoubomari13473 жыл бұрын
So How can we use JWT safely?
@chevlonmacguinstudios3 жыл бұрын
Not all accounts have a delete button, they do have a encrypted password, or Gmail handles the password handling
@junaidanser71823 жыл бұрын
Hello, How can I join your KZbin channel from Pakistan? Warm Regards.
@macbook65073 жыл бұрын
Thank you Teacher Loi liang for the educative tutorials 🤝🏾.
@mohan___0704___ Жыл бұрын
Bro ...Any Other Possible to find signature (Key)...Explain Bro
@sto2779 Жыл бұрын
How do you prevent this type of hack?
@sto2779 Жыл бұрын
@@dotnet9830 yes, however after doing research. JSON is not a good tokenization protocol. Example: The token does not expire instantly, hence when you log out, you really don’t log out. The server has no clue about the factual state of the token. Therefore JSON token is not safe. Security protocol is non-binary it is either safe or not safe, not both or in between. Good security is my preferred implementation, therefore using Redis cookies/tokenization is much faster and safer. However setting up Redis is much more tricky.
@Deadly_Warth5 ай бұрын
wait how did he know the name of the table?
@rehmankhan60813 жыл бұрын
What if pub or pvt key in place..? 😒
@vinayaklakhotiya29643 жыл бұрын
How to hack RS256 Json web token? Can u please make a video on that
@darwinmanalo54366 ай бұрын
This is bullshit. Just for contents sake.
@Jeridi Жыл бұрын
Yehe , Exact , so how i can safe this in my web ?
@the.anonymous.comment3 жыл бұрын
Love all your videos dude... instead of hijacking an account I used it to turn my accounts into paid sub....
@teeyaar3 жыл бұрын
Ur awesome, thank you for sharing😊😊
@alucardtech2136 Жыл бұрын
Everything on KZbin about hacking is already exploited and patched
@iqbalaramyco57593 жыл бұрын
How to creat apk like open slot?
@hocinemhz86103 жыл бұрын
1 comment ur good men ❤️
@loveUbleach4ever3 жыл бұрын
Bro you scared me to death, my entire career is messed up because i use jwt token auth for users all the time
@jasonc62419929 ай бұрын
Holy crap.. my app depends entirely on the claims in the jwt :')
@mohammedalthamy3673 жыл бұрын
HI can anyone know how to watch video protected with pass word video master app
@leighton1383 жыл бұрын
i want my playstation account back i have nto been able to log in in years and stupid sony wont give me it back sense i dont got a 4 year old payment option i have no access to even thought ihave proof on bank statements and i have no access to a old email it might be on that or my account for sony got hacked .
@blendersovann51233 жыл бұрын
Sir can you me how to hack random android password ?
@johnwayne80593 жыл бұрын
Yeah man, thanks for your vids!
@christiancurtcruz39793 жыл бұрын
Is hacking a sin?
@dangerouslystupid29123 жыл бұрын
You can use your power for good or you can use your power for bad. The choice is yours but don't forget consequences are real.
@SonidoScoobyDoo11 ай бұрын
there's tons of videos about this, but none about PREVENTION
@never_ask_my_name4 ай бұрын
Just use orm, or sanitize ur query before sending to db
@atlonrg3 жыл бұрын
Woooww Loi Liang Please, please friend activate the subtitles (es) to be able to follow you more clearly.
@bocabersuit3 жыл бұрын
x2
@natzen770 Жыл бұрын
you can help me for hack token?
@b391i3 жыл бұрын
Keep Going 😇👌
@alkasahani96363 жыл бұрын
Is adguard DNS safe
@neverreality51503 жыл бұрын
Bro create video your roadmap in hacking
@swonghobby3 жыл бұрын
Hi, here's a quick question if I may. New Formatted Win 10 system, install a few applications, suddenly I seen the mouse move and one of the desktop icon has been duplicated. I quickly shut down my machine, and rebooted it. Is that a way to try to steal the login id and access to an account? Should I reformat the computer again? thank you
@shortkalam3 жыл бұрын
Tnx what u did. Pls can u upload video how to hack wifi pass with termux app??
@aminemunire36052 жыл бұрын
Termux ضعيف و تحتاج الى بطاقة ويفي تسمح بالحقن تربطها مع مخرج usbو تطبق نفس الخطوات في كالي aircrack n-g moon-Wlan0 من الافضل استعمل كالي لأن الهاتف سيسخن بسرعة و البطارية تنفد و الهاتف يضيع
@TruthSeekerClub3 жыл бұрын
You making it looks like a toy.
@aksn15153 жыл бұрын
Hi 'Loi Liang Yang' Please You Can Do a Help For Me Please Please
@audiosmarts6753 жыл бұрын
Thanks for the informative video!
@mohammedalimedo56329 ай бұрын
There is no translation available into Arabic
@nextpage57073 жыл бұрын
That's why I add en encryption layer. To make it "harder"
@itsmeagain03 жыл бұрын
Can you do a tutorial about what involves in a online game hacking?
@bilalsuleman77413 жыл бұрын
I think all technique on youtube block soon
@RATUSUKUNA3 жыл бұрын
How to shutdown other peoples computer?
@bahahamdi5033 жыл бұрын
start with reading your name
@mr.smartech3 жыл бұрын
@@bahahamdi503 🤣
@RATUSUKUNA3 жыл бұрын
@@bahahamdi503 lmao i had no other name
@RATUSUKUNA3 жыл бұрын
@@bahahamdi503 baha ha hahahahha
@PASTRAMIKick3 жыл бұрын
go to their home/office and click shutdown
@liamsoccerpro30403 жыл бұрын
Love your videos
@richietech23983 жыл бұрын
Can you provide a video on how to install Kali Linux on PC 64bit
@vilius15323 жыл бұрын
Can you play a game Grey Hack
@HamidHamid-ds9uy3 жыл бұрын
Keep up bro
@jissjose13823 жыл бұрын
Now that's i call real hacking
@dadogwitdabignose Жыл бұрын
i love hacker loi to death but he’s starting to become a script kiddie
@tekklov26465 ай бұрын
I prefer Jerry
@melvinpatomendoza3 жыл бұрын
Yes.
@SonaliSingh-ri6jq10 ай бұрын
Amazing
@sumitchahal39723 жыл бұрын
Super cool
@nrahman17453 жыл бұрын
1st view
@jonttan033 жыл бұрын
I don't remember asking tho.
@bahahamdi5033 жыл бұрын
@@jonttan03 easy bro 😂
@deadwarrior49813 жыл бұрын
sir do video on mitmf installing in new kali release 2021 we are getting many errors while installing pls do a video of installing mitmf without getting any errors pls pls pls sir
@thunderx30053 жыл бұрын
Jesus Saves, John 14:6 amen 🙏🏾
@nabeelgulzar2693 жыл бұрын
❤️
@jaeger8093 жыл бұрын
Pink panther
@tuuguu14383 жыл бұрын
Huh
@Dahlah.FightMe3 жыл бұрын
OMG
@snofy9722 жыл бұрын
Hi, may I ask what kind of token is this? And how to decode and encode this kind of token. FYAmWWi2cCtjIqwYtCllSGz-ZV3mZ5yRWQ_PK4RQR3A