JWT Authentication Bypass via jwk Header Injection

  Рет қаралды 6,608

Intigriti

Intigriti

Күн бұрын

Пікірлер
@logan0x
@logan0x Жыл бұрын
why the tempered jwt has the jwk parameter set with all it's claims but the original one does not have
@intigriti
@intigriti Жыл бұрын
Hey, can you timestamp the section of the video so I can review? 😁
@logan0x
@logan0x Жыл бұрын
@@intigriti at 5:15 when you decoded the jwt it shows that there is a "kid" claim in the header , but at 10:24 you embedded the whole "jwk" parameter not just the new "kid"
@melegritojoel
@melegritojoel Жыл бұрын
Nice work
@intigriti
@intigriti Жыл бұрын
Thank you! 😊
@bugbountyicodeidc981
@bugbountyicodeidc981 Жыл бұрын
good work
@intigriti
@intigriti Жыл бұрын
Thank you! 🙂
@anonymousvevo8697
@anonymousvevo8697 7 ай бұрын
nice video, just small remark if you may, the sound quality makes it a bit complicated to follow along with the explanations
@intigriti
@intigriti 7 ай бұрын
Thanks! Can you be more specific on the sound quality? This is the first comment I've seen to say it's bad, most comments talk about how clear and crisp it is 😕
@anonymousvevo8697
@anonymousvevo8697 7 ай бұрын
@@intigriti i never said your video is bad nor i meant a bad comment, it’s just when you start most of your sentences the first two-three words get cut, i don’t know if it’s just me ? But thanks for the efforts really appreciate it
@intigriti
@intigriti 7 ай бұрын
No problem! 🥰 I just want to try and confirm if there's an issue.. I haven't noticed that before or had any similar reports. Can you give me timestamp as an example so I can check? Maybe also test with another device if possible 🙏
@anonymousvevo8697
@anonymousvevo8697 7 ай бұрын
​@@intigriti Yes you are right i've tried using my phone , only on my laptop, it comes from me, idk why, Thanks anyway for the reply wish you best of luck
@felipesilva3862
@felipesilva3862 Жыл бұрын
Method with Burp this error for me , The signature key was not found, Please help me?i pad!
@intigriti
@intigriti Жыл бұрын
Hey, please double check the video - it was recorded recently so unlikely anything has changed!
@felipesilva3862
@felipesilva3862 Жыл бұрын
@@intigriti Could you give me a way to contact you directly, I'll pay!
@g30rgyth3d4rk
@g30rgyth3d4rk Жыл бұрын
Really cool 💥❤‍🔥 i didn't know of this attack. I have learned something to add to my thought process😊.
@intigriti
@intigriti Жыл бұрын
Awesome! 👏
@MichaelCooter
@MichaelCooter Жыл бұрын
Greet stuff
@intigriti
@intigriti Жыл бұрын
🙏🥰
@csstestusr
@csstestusr Жыл бұрын
Hi Sir, how to exploit php 8.2.0?
@intigriti
@intigriti Жыл бұрын
Hi there! Best thing is to check CVE databases and vuln scanners e.g. snyk to see what known vulnrabilities exist. Next, look at the specific details for those vulns to find out what the requirements are, and whether they are exploitable in your specific scenarios. Couple of links: www.tenable.com/plugins/nessus/168500 + vulners.com/nessus/WEB_APPLICATION_SCANNING_113581 but bare in mind that newer versions of PHP are less likely to be vulnerable, often you'll be better off focusing on application specific implementation, e.g. look for vulnerabilities in the code/features of the website, rather than the underlying libraries.
@csstestusr
@csstestusr Жыл бұрын
@@intigriti thanks 🙏
@mohmino4532
@mohmino4532 Жыл бұрын
nice work and can u give us that script plz 😊
@intigriti
@intigriti Жыл бұрын
Added the scripts here, so you can follow along 😉 github.com/Crypto-Cat/CTF/tree/main/web/WebSecurityAcademy/jwt
@mohmino4532
@mohmino4532 Жыл бұрын
@@intigriti thanks ❤
JWT Authentication Bypass via jku Header Injection
13:40
Intigriti
Рет қаралды 6 М.
JWT Authentication Bypass via kid Header Path Traversal
15:11
Intigriti
Рет қаралды 4,9 М.
The Best Band 😅 #toshleh #viralshort
00:11
Toshleh
Рет қаралды 22 МЛН
Сестра обхитрила!
00:17
Victoria Portfolio
Рет қаралды 958 М.
So Cute 🥰 who is better?
00:15
dednahype
Рет қаралды 19 МЛН
JWT Authentication Bypass via Algorithm Confusion
12:24
Intigriti
Рет қаралды 7 М.
JWT Authentication Bypass via Weak Signing Key
12:35
Intigriti
Рет қаралды 6 М.
Introduction to JWT Attacks
16:33
Intigriti
Рет қаралды 10 М.
JWT Authentication Bypass via Unverified Signature
9:37
Intigriti
Рет қаралды 10 М.
Bypassing Rate Limits via Race Conditions
16:54
Intigriti
Рет қаралды 7 М.
Cracking JSON Web Tokens
14:34
The Cyber Mentor
Рет қаралды 60 М.
Exploiting Server-side Parameter Pollution in a Query String
11:26
The Best Band 😅 #toshleh #viralshort
00:11
Toshleh
Рет қаралды 22 МЛН