How Hackers Hack JSON Web Tokens

แชร์
ฝัง
  • เผยแพร่เมื่อ 21 ต.ค. 2022
  • // Membership //
    Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: / @loiliangyang
    // Courses //
    Full Ethical Hacking Course: www.udemy.com/course/full-web...
    Full Web Ethical Hacking Course: www.udemy.com/course/full-web...
    Full Mobile Hacking Course: www.udemy.com/course/full-mob...
    // Books //
    Kali Linux Hacking: amzn.to/3IUXaJv
    Linux Basics for Hackers: amzn.to/3EzRPV6
    The Ultimate Kali Linux Book: amzn.to/3m7cutD
    // Social Links //
    Website: www.loiliangyang.com
    Facebook: / loiliangyang
    Instagram: / loiliangyang
    LinkedIn: / loiliangyang
    // Disclaimer //
    Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น • 261

  • @LoiLiangYang
    @LoiLiangYang  ปีที่แล้ว +31

    What does JSON stand for?

    • @nickpapaefthimiou4829
      @nickpapaefthimiou4829 ปีที่แล้ว +1

      Btw nice videos keep it up

    • @allshorts-a1661
      @allshorts-a1661 ปีที่แล้ว +12

      JavaScript Object Notation❤️

    • @JontheRippa
      @JontheRippa ปีที่แล้ว +2

      JavaScript Object Notation

    • @kerhabplays
      @kerhabplays ปีที่แล้ว +2

      Java's Son on Nite

    • @socksoff5th
      @socksoff5th ปีที่แล้ว +11

      Jesus Christ… that’s JSON Bourne!!

  • @aidenkwong2595
    @aidenkwong2595 ปีที่แล้ว +178

    this is a very vulnerable backend that won't exist in real world

    • @hussainbharmal5998
      @hussainbharmal5998 ปีที่แล้ว +19

      Thanks for the tip, i immediately stopped watching the video after reading your comment.

    • @RichardPhillips1066
      @RichardPhillips1066 ปีที่แล้ว +4

      Details needed if want you to oppose a video , otherwise it's just your word against his with no proof , In short no one will care

    • @SergeiKarimov
      @SergeiKarimov ปีที่แล้ว +29

      @@RichardPhillips1066 alg:none is not accepted by any real world website. Also storing password in JWT as MD5 hash is even more stupid

    • @alexwyner1919
      @alexwyner1919 ปีที่แล้ว +12

      Yes this site is intentionally vulnerable as a learning tool, but you'd be surprised what fuckery people do when they're lazy

    • @Andreas-gh6is
      @Andreas-gh6is ปีที่แล้ว +2

      @@SergeiKarimov both has happened a lot and may even still be happening. But this is a webgoat which is meant to demonstrate why it is not a good idea to forget about alg:none.

  • @joshuafountain
    @joshuafountain ปีที่แล้ว +54

    I've recently began using JWT tokens, after seeing the title I figured I'd better watch this. I then learned that no developer would ever make this mistake and gave up watching anymore

    • @ReligionAndMaterialismDebunked
      @ReligionAndMaterialismDebunked ปีที่แล้ว

      Lol. You're wrong then. Quick to judge, fool. Plus, you didn't end your last statement with any closing mark(s). 💀🤡

    • @ReligionAndMaterialismDebunked
      @ReligionAndMaterialismDebunked ปีที่แล้ว

      O.o Plenty of bounties rely on these API keys since API keys are barely looked at by most security people, and by most web developers, as plenty of successful ethical hackers explain they get paid a ton by these exploits. Many don't encrypt keys, leave them out in the wild, and then they're weak algorithms to begin. They're not encrypted, they're just hashed. So, you're just wrong on that.

    • @ReligionAndMaterialismDebunked
      @ReligionAndMaterialismDebunked ปีที่แล้ว

      A lot of haters in the comments, but plenty of us realize plenty of people do make their sites vulnerable with bad API keys. Lol. Just as many say they wouldn't use a default password, or fall for phishing, but many do. 💀💀💀🤣🤡😅

  • @mamenatech
    @mamenatech ปีที่แล้ว +68

    Nope if i wrote that backend.
    1. Never put password in payload.
    2. Password should be hash not encrypt
    3. if the algorithm does not exist in header of JWT then it returns 401
    Can still you beat that?
    Let me know

    • @IvanRandomDude
      @IvanRandomDude ปีที่แล้ว +12

      He also used md5 which was broken like 15 years ago. Even if you put password hash in JWT by mistake, if it was any decent hash like SHA256 he wouldn't be able to do anything

    • @mamenatech
      @mamenatech ปีที่แล้ว +4

      @@IvanRandomDude anyway, what kind JWT sistem does't verify incoming JWT, right?😂

    • @mamenatech
      @mamenatech ปีที่แล้ว +6

      @@IvanRandomDude looks like the video is just for entertainment

    • @weikealenphinjaya5837
      @weikealenphinjaya5837 ปีที่แล้ว +3

      yep, true.. always remember, never put password in JWT payload.. even if u already bcrypt the password, still, don't ever put it inside JWT payload..

    • @AMoktar
      @AMoktar ปีที่แล้ว +3

      Noone can, just targeting high rank keywords for hackers dumbs for views

  • @axelqt1
    @axelqt1 ปีที่แล้ว +42

    Good in theory but in practice, everyone would use a secret key with jwt so you wouldn't be able to decode it like that, then passwords would be hashed and not encrypted, and they shouldn't appear in the payload. It's like lockpicking an already opened safe

    • @Elte156
      @Elte156 ปีที่แล้ว +9

      The original JWT did have a secret key (using the RS256 type). He intercepted and sent over a perfectly valid JWT after modifying it. The real problem is that the backend server accepted the "typ: None" JWT. When it should ONLY be allowing and validating "typ: RS256" JWTs. The backend server is poorly misconfigured.

    • @LuomuKekkonen
      @LuomuKekkonen ปีที่แล้ว +4

      You would be able to decode it, but not to forge it like this. Any normal web backend would check the signature of the JWT and notice that it is forged, and that's where this attack would stop.

    • @pixelotetm
      @pixelotetm ปีที่แล้ว +1

      Exactly. only the jwt token without passwords and email. should appear on the payload. 👏👏👏

    • @alee_shehbaz
      @alee_shehbaz ปีที่แล้ว

      exactly

    • @piotrm795
      @piotrm795 ปีที่แล้ว

      @@pixelotetm and id should be a guid, not the number

  • @TheOriginalJohnDoe
    @TheOriginalJohnDoe ปีที่แล้ว +5

    No one will put passwords inside a JWT, because you use JWT as an encrypted personal token that holds basic user info that helps to simply identify that user, mostly through a user id (uid), uuid, username or email. It could happen obviously that there is a dev out there that will put the password in it, but then that guy will probably work for a company that isn't even worth mentioning in the first place, lol.

  • @Abdul786Munaf
    @Abdul786Munaf ปีที่แล้ว +2

    Sir awesome your explain....which year did you learn hacking course?

  • @kiran-nambiar
    @kiran-nambiar ปีที่แล้ว +6

    This is highly unlikely situation, but yeah a determined hacker and a foolish developer, anything is possible.

  • @slimoveis3751
    @slimoveis3751 ปีที่แล้ว +3

    Thanks! I've been searching how to get it and this is brilliant :D

  • @hemanacademyandsecurity
    @hemanacademyandsecurity ปีที่แล้ว +9

    You explain like a learner not a tutor and we understand as a master trainer ! Too good! From india

  • @HackerCifish
    @HackerCifish 4 หลายเดือนก่อน +1

    Video Suggestions:
    1. Video About wireshark And wifite
    2. Video on how to hack any pdf's password with "rockyou" wordlist
    3. Make a video about anonymity with kali "whoami"
    4. A video on how to dual boot Kali Linux
    5. A video a on BYOB Botnet
    6. Full tutorial about Burpsuite

  • @juliusrowe9374
    @juliusrowe9374 ปีที่แล้ว +1

    Awesome tutorial Loi! As always thanks for sharing!

  • @linux2698
    @linux2698 ปีที่แล้ว

    Hello, what is the way that we can get the details of the registrar of a website when the information is displayed secretly on the DNS collapsing websites? For example, the registrant's email or any other information? Because some hostings display this information secretly? Is there a way?

  • @zip-taw
    @zip-taw ปีที่แล้ว

    Wow your the real Mr.Robot with full explanation. Thank you for the video.

  • @PeterVerhas
    @PeterVerhas ปีที่แล้ว +1

    JWT are used for many years. Standard technology. If there was a flaw in this tech making it hackable would you first hear it on youtube? These are entertainment videos, if you fall for the style of this guy.

  • @user-jo4lp5ll4v
    @user-jo4lp5ll4v ปีที่แล้ว +2

    I learned a lot from you
    Thank you my beautiful teacher loi
    I wish I could shake hands with you in real life ❤️❤️🌹

  • @ecodersjo
    @ecodersjo 10 หลายเดือนก่อน

    what if there is only the user id stored in the token for eg i use that

  • @trevorsmith5991
    @trevorsmith5991 ปีที่แล้ว

    Thank you so much you really help me :)

  • @reancode4518
    @reancode4518 ปีที่แล้ว

    Great. I can prevent hacking by your video. Thank you.

    • @SergeiKarimov
      @SergeiKarimov ปีที่แล้ว

      He demonstrated the most basic alg:none exploit which you won't meet in a real world

  • @fatiuspau8l551
    @fatiuspau8l551 ปีที่แล้ว

    Given up on members only? Either way, excellent vid! Any chance you could do a tutorial on c2?

    • @hazed69
      @hazed69 ปีที่แล้ว

      wdym by tutorial on C2, its just command and control from server - client / client - server setup, idk what kind of tutorial you need in this 🤔

  • @marjmarj6407
    @marjmarj6407 ปีที่แล้ว +1

    Hi! A while ago, I tried applying for a job, and then this lady sent a link, saying it’s software that will be used in applying. So, I downloaded it to my PC and extracted it from the download folder. After installing it, a message popped up saying that my files were gone and I needed to pay to get them back. They are also threatening to sell it on DarkWeb. Is there any way to get my files back without paying? I can’t pay because I don’t have money and there’s no assurance that they will give back my files.

    • @rickifunk51
      @rickifunk51 ปีที่แล้ว +1

      Do a roll back if you are on windows, back to a previous saved point.

  • @zuza0006
    @zuza0006 ปีที่แล้ว

    I tried and it is installed thank u very much anda

  • @spacesketsh
    @spacesketsh ปีที่แล้ว

    explain about how we can exploit a camera over network

  • @akifbora
    @akifbora ปีที่แล้ว

    what kind of backend does not verify jwt?

  • @Decrypto01
    @Decrypto01 ปีที่แล้ว +1

    Have you ever thought about doing digital forensics? so you know what forensic investigators look for to catch hackers and you can know how to evade that detection.

    • @SergeiKarimov
      @SergeiKarimov ปีที่แล้ว

      he exploits very basic vulnerability alg:none which is virtually impossible to meet in a real world

    • @Decrypto01
      @Decrypto01 ปีที่แล้ว

      @@SergeiKarimov I was talking about the phase of covering tracks... similar to how you would disable auditing, delete logs and then use cipher.exe to overwrite the deleted files to cover tracks.

  • @mervinmarias9283
    @mervinmarias9283 ปีที่แล้ว

    LMAO!! I was rolling with that "super secure password"

  • @EzequielRegaldo
    @EzequielRegaldo ปีที่แล้ว +1

    Passwords never appears in JWT. Just ids or roles. And we verify the token with certs every request so its not a problem :P

  • @allshorts-a1661
    @allshorts-a1661 ปีที่แล้ว

    Please make a video on captive portal setup on router🙏❤️

  • @sebaperalta2001
    @sebaperalta2001 ปีที่แล้ว +6

    MD5 can't be decrypted unless you have a dictionary, so this wouldn't work in real life if the owner of the system is not that predictable, but I always watch your videos because you explain so well everything. Keep up the great work!

    • @Andreas-gh6is
      @Andreas-gh6is ปีที่แล้ว +4

      Ever heard of rainbow tables? Also there are all sorts of MD5 decryption programs. And shitty password security is one of the most frequent vulnerabilities hackers use. But nowadays no framework/website will use MD5 by default. Or allow alg:none in JWT.

    • @kimgysen10
      @kimgysen10 ปีที่แล้ว +2

      LinkedIn got hacked in the past due to md5 hashing their passwords. I suggest not to do it ;)

    • @samrijijkot
      @samrijijkot ปีที่แล้ว +1

      @@kimgysen10 wait, seriously? they really used md5?

    • @sebaperalta2001
      @sebaperalta2001 ปีที่แล้ว +1

      @@Andreas-gh6is Yes, but at the same time if you salt your hash, the attacker may never crack it

    • @youraccountissuspended
      @youraccountissuspended ปีที่แล้ว

      how about bcrypt? is it better than md5?

  • @nikosfanour
    @nikosfanour ปีที่แล้ว +5

    You don't put passwords (even hashed) in JWTs

    • @nikosfanour
      @nikosfanour ปีที่แล้ว

      You check if the hashed passwords match and then you never use the password again. You use JWTs and you refresh them.

    • @IvanRandomDude
      @IvanRandomDude ปีที่แล้ว +2

      On top of that he used md5 hash that was broken like 15 years ago and it's easy to reverse.

    • @Jawssalamalecu
      @Jawssalamalecu ปีที่แล้ว

      @@IvanRandomDude you are confusing preimage resistance (which is still strong for md5) with collision resistance (which is the weak point of md5). While it is still not easy to reverse an md5 to the original value, you can find other values that will be hashed to the same encrypted sequence.

  • @nigampatel6383
    @nigampatel6383 2 หลายเดือนก่อน

    Loi Yang , I saw this video what if you change the role customer to admin ? Would it be more easy to bypass I guess ? Or I am wrong ?

  • @DEADCODE_
    @DEADCODE_ ปีที่แล้ว +2

    I'm learning about JWT and you explained it better

    • @mamenatech
      @mamenatech ปีที่แล้ว +5

      anyone who doesn't know how JWT works will say he's the best.
      that's tutorial for entertainment purposes only 🤣

    • @SuprousOxide
      @SuprousOxide ปีที่แล้ว

      He explained how not to use them.

  • @zmaxzmax4291
    @zmaxzmax4291 ปีที่แล้ว

    Does samsung knox protect the phone from hacking

  • @matiasmiraballes9240
    @matiasmiraballes9240 ปีที่แล้ว +3

    ok, ignoring what others have already pointed about displaying the password in the token payload and using insecure algorithms... Why is the password even there? you just sent a jwt with the admin username and your password, so either the admin password is the same as yours -and an important step of this video is forging a token for the user you are trying to impersonate- or the backend just doesn't check anything at all and you could just sent an empty jwt with role admin and call it a day.

  • @toanba3444
    @toanba3444 ปีที่แล้ว +5

    you deserve to be a comedian 😆

  • @katarzynajuraszek106
    @katarzynajuraszek106 ปีที่แล้ว

    Nice video, it works!

  • @farhanlatifgazi
    @farhanlatifgazi ปีที่แล้ว +2

    Usually the password is never contained in the jwt for security purposes....

    • @yurilsaps
      @yurilsaps ปีที่แล้ว

      The point of the video is not get the password in the jwt. Is forge it

  • @daddydoooo
    @daddydoooo ปีที่แล้ว +2

    So this website does not verify the token and its signature before processing any requests, right? 😅

    • @yoonahworld
      @yoonahworld ปีที่แล้ว

      Nahh u only have those info because ypu are logged in though...

    • @daddydoooo
      @daddydoooo ปีที่แล้ว +1

      @@yoonahworld Nah~ every systems I have developed, i will check that user and token signature match with data in cache (like Redis) at least.

  • @oliviers.3592
    @oliviers.3592 10 หลายเดือนก่อน

    How to gunzip a compressed payload?

  • @kolakeman-gpuro6916
    @kolakeman-gpuro6916 ปีที่แล้ว

    i think the only time the password will appear is if the developer set it as "1" in Controller....

  • @YamikaniKalinde
    @YamikaniKalinde ปีที่แล้ว

    That backend is bonkers

  • @johnpatrickmadrigal477
    @johnpatrickmadrigal477 ปีที่แล้ว

    Just make sure to use REDIS to validate the token.

  • @schlauadesmarti2292
    @schlauadesmarti2292 ปีที่แล้ว

    Hello
    Can you help me my microsoft account got hacked and you seem as you can get it back i already contacted microsoft but they said they cant access it either because he changed the security Informations so please help me and if you cant do you know someone who can ?

  • @algatra6942
    @algatra6942 ปีที่แล้ว

    well, thanks mr Loi

  • @spike666spike666
    @spike666spike666 6 หลายเดือนก่อน

    Nice video, but when I use the MD5 decoder it comes back as "Bad Format"... Doesn't work.

  • @simonhylander7489
    @simonhylander7489 ปีที่แล้ว

    how do you get past the secret

  • @manuelfrosi2799
    @manuelfrosi2799 ปีที่แล้ว

    JWT_Tool automates the task but most of the websites have protection against the None algorithm attack

  • @shimmy5477
    @shimmy5477 ปีที่แล้ว +1

    Thanks!

  • @hooyah
    @hooyah ปีที่แล้ว +1

    im junior web frontend, i use jwt in nextjs. but i create my backend(nestjs) app to set secret in jwt and never set password in the payload of jwt just set sub/id and ername/email. i think in the production people never set password in the payload and will set jwt secret. cmiiw

  • @razorjhon2622
    @razorjhon2622 ปีที่แล้ว +3

    This is if u try to hack a noob developer :D

  • @Andreas-gh6is
    @Andreas-gh6is ปีที่แล้ว

    Which is why no framework/library/website allows alg:none by default.

  • @obikenneth886
    @obikenneth886 ปีที่แล้ว

    Please I need your help someone is trying to hack my website by creating multiple user account what can I do

  • @harshraj6264
    @harshraj6264 ปีที่แล้ว

    Excellent video. I am now trying to hack my own API 😂😂.
    If we provide algorithm while decryption then we can avoid this attack

    • @watchiwafcwatson4509
      @watchiwafcwatson4509 ปีที่แล้ว

      What

    • @daddydoooo
      @daddydoooo ปีที่แล้ว

      Yes, just check the token algorithm and verify its signature for any requests

  • @Hugos68
    @Hugos68 ปีที่แล้ว +2

    This is a rather poor example of abusing JWT's, JWT's are never used raw like this, it's common practise to sign them with an algorithm + secret so that the API can verify it has not been tampered with.

  • @studiowebselect
    @studiowebselect ปีที่แล้ว +4

    Site who dont check for jwt signature deserve to be hacked

    • @mamenatech
      @mamenatech ปีที่แล้ว

      Thats tutorial only for entertainment purposes 🤣

  • @rouen768
    @rouen768 ปีที่แล้ว

    Yes Bro nice work and nice video

  • @tjaydk
    @tjaydk ปีที่แล้ว

    Hi Loi. Nice video - would you recommend sessions for API's that need more security ?

  • @rosyprakash
    @rosyprakash ปีที่แล้ว

    CAN YOU HELP MAKING VIDEO ON GETTING ACCESS TO SAVED PASSWORDS On ANDROID APPS OR PASSWORDS SAVED IN BROWSERS.

  • @DocMaggie
    @DocMaggie ปีที่แล้ว

    Everyone, don't be too harsh on him, he's doing this for the general public. Not for programmers. Of course no serious site uses this sort of plain data without salt etc.

  • @DanielNuske
    @DanielNuske ปีที่แล้ว +1

    hold on a second, who made that JWT? how would anybody add password there! that's nonsense. More than hacking this is just bad software development example on that website creator 🤔

  • @calisthenicarts312
    @calisthenicarts312 ปีที่แล้ว

    how does one hack slmail?

  • @sorrefly
    @sorrefly ปีที่แล้ว +2

    Why would the server respond as OK at 11:43 if the password in the json token for the admin account is possibly wrong?

    • @ahmedyehia1538
      @ahmedyehia1538 ปีที่แล้ว

      well you're right, but fun fact the admin password is 12345678 too.

    • @immor98
      @immor98 ปีที่แล้ว

      Why??

  • @dikaa2024
    @dikaa2024 ปีที่แล้ว

    can you beat Bjorka?

  • @chriss887
    @chriss887 ปีที่แล้ว

    Hello Mr yang are you available to hire

    • @user-iv2lc9vg4b
      @user-iv2lc9vg4b ปีที่แล้ว

      Hi Chriss, chat my telegram ☝️

  • @fairyroot1653
    @fairyroot1653 ปีที่แล้ว

    Make a video on Openbullet 2

  • @M_IZAN
    @M_IZAN ปีที่แล้ว

    💜💜sir plz your hacking lab setup please 💜💜

  • @mahtabali8284
    @mahtabali8284 ปีที่แล้ว +1

    you are awesome

  • @mohammedalissah7637
    @mohammedalissah7637 ปีที่แล้ว

    Which best to learn C or C++

  • @rajeshshah4651
    @rajeshshah4651 ปีที่แล้ว +4

    He's so good at what he does.

  • @auriliomike2199
    @auriliomike2199 ปีที่แล้ว

    Hi i’m new here how can i get membership ?

  • @johnniefujita
    @johnniefujita ปีที่แล้ว +1

    this is a bad implementation of the standard. Especially the password and the algorithm which we must enforce on the backend and never take it if it is none...

  • @kimgysen10
    @kimgysen10 ปีที่แล้ว +1

    Password in jwt is nuts. Then why use jwt at all, might as well use basic auth. On top you have TLS,. You can't really steal the jwt, unless you make some extremely complicated XSS attack that probably won't work after all when you're lucky enough to ever get a script into the site. Even then, you can't steal it unless the developer put it somewhere where you can reach it, which you probably can't. To hack a site with even just the most default measures, you have to be very, very motivated to hack it. For the majority of sites it's just not worth the time, and for those that are worth it, this isn't going to work.

    • @macctosh
      @macctosh ปีที่แล้ว

      Exactly! jwt is used in place of a password. It's like a password in a sense but only valid for short period of time. so if you do manage to get a user's jwt. you have to use it within a short period of time ( usually less than 4 hours ) before it becomes invalid and prompting you to login with the real password. Taking into account the effort and time needed to steal a valid jwt. You have to use it immediately which will alert the user to a breach! furthermore there is nothing you can do to extend the expiration date. absolutely not worth the effort. I would rather try to steal the real password instead.

  • @katendemusa5747
    @katendemusa5747 ปีที่แล้ว

    Hacker Loi this is great info. How do more of this kind

  • @esra_erimez
    @esra_erimez ปีที่แล้ว

    Jet Skis on Neptune

  • @nicolasticonavaldivia6509
    @nicolasticonavaldivia6509 ปีที่แล้ว

    backend devs are suposed to DO NOT send back the password.

  • @DevSecOpsAI
    @DevSecOpsAI ปีที่แล้ว

    I won't answer that for you Loi

  • @LeoMessi24Highlights
    @LeoMessi24Highlights ปีที่แล้ว

    Thanks

  • @blackhat5133
    @blackhat5133 ปีที่แล้ว +1

    OP ❤️

  • @AbdullahDataVerse
    @AbdullahDataVerse ปีที่แล้ว

    A way to talk with you 🥺

  • @srijan4622
    @srijan4622 ปีที่แล้ว +1

    what foolish developer would even put their passwords in the JWT claim?

  • @bestbotreview
    @bestbotreview ปีที่แล้ว

    could u maybe try to figure out a prevention for this.....ya know before you post this code tutorial that a criminal may use to steal from to the public internets???

    • @SuprousOxide
      @SuprousOxide ปีที่แล้ว

      1) Don't put the password, or anything intended to be secret, in the JWT
      2) On the backend, make sure the specified algorithm is the one you expect (and definitely not none), and that the signature is correct (which an attacker can't forge after modifying data unless they know the key, which should be a secret)

  • @samson1695
    @samson1695 ปีที่แล้ว

    Computer specs reveal plsss

  • @IsaacNewton80735
    @IsaacNewton80735 ปีที่แล้ว

    Lol is very vulnerable backend. Stores the password of the user in the JWT, it doesnt make any sense, cause this is the purpose of the JWT

  • @JacobKasperek
    @JacobKasperek ปีที่แล้ว +1

    This is basically "How Hackers Hack minecraft fanblog not updated since 2010 written by a teenager as a first website project". Plaese have some decency to provide information about how extremely insecure an api has to be for it to work. At least explain how JWTs work and how they are protected if you're "teaching".

  • @bandaopsi
    @bandaopsi ปีที่แล้ว +1

    haha
    there shouldn't be a password claim in the token

  • @macctosh
    @macctosh ปีที่แล้ว +1

    He lost me when he said " change the token to admin " doing so invalidates the token. The server will reject the token !!

    • @Elte156
      @Elte156 ปีที่แล้ว +1

      But the server didn't though! Changing the type to None made the token valid again because it doesn't need a signature anymore. The server is intentionally misconfigured to accept None typed tokens.

    • @macctosh
      @macctosh ปีที่แล้ว +1

      @@Elte156 Oh... why would any developer accept an unsigned token?

    • @Elte156
      @Elte156 ปีที่แล้ว +1

      @@macctosh they wouldn't intentionally. There was a few auth0 articles about notifying JWT library maintainers to check against this exploit back in 2020. Using "None" has an internal use case and it is valid according to spec.

    • @macctosh
      @macctosh ปีที่แล้ว

      @@Elte156 Wow... I didn't know... thanks.

  • @abdulhadiabbasi9147
    @abdulhadiabbasi9147 ปีที่แล้ว

    My Facebook account hacked not showing in Facebook help me to recover I don't have money plzz help

  • @ReligionAndMaterialismDebunked
    @ReligionAndMaterialismDebunked ปีที่แล้ว

    :3 Plenty of bounties rely on these API keys since API keys are barely looked at by most security people, and by most web developers, as plenty of successful ethical hackers explain they get paid a ton by these exploits. Many don't encrypt keys, leave them out in the wild, and then they're weak algorithms to begin. They're not encrypted, they're just hashed. So, you're just wrong on that.

  • @majsingh2362
    @majsingh2362 ปีที่แล้ว

    Now I know how to hack Jason's password. Didnt knw every was after him as well.

  • @HarvestHaven09
    @HarvestHaven09 ปีที่แล้ว

    Ultimate

  • @trendz14
    @trendz14 ปีที่แล้ว

    Hi sir! Please sir can you please help me. I've been scammed. I don't know what to do anymore. For the chance of taking my money back I ask for help of people i thought will help me but they just ask for money an they give my money back instead they got money from me. Please help me sir. I cant sleep anymore

  • @App_galaxy
    @App_galaxy ปีที่แล้ว +1

    On the first top ten people to comment

  • @jobemesser984
    @jobemesser984 ปีที่แล้ว

    this is tutorial "how to make JWT inside your app authentication hackable"

  • @joshuaheathcote2116
    @joshuaheathcote2116 ปีที่แล้ว

    Holy Moly.

  • @allanwamute735
    @allanwamute735 ปีที่แล้ว

    hey man I am from africa and I dont have the money to be an exclusive member so i was just asking if you could give me a pass to your membership

  • @BalkanLeaksArchive
    @BalkanLeaksArchive ปีที่แล้ว

    This is the problem for all web backends that are written in js

  • @SB-qm5wg
    @SB-qm5wg ปีที่แล้ว

    wow, crazy

  • @Hexadolf
    @Hexadolf ปีที่แล้ว

    Yeah, I'm using whitelist.
    Also the only thing I'm puting in my payload is user id which is in uuid, good luck finding the admin.

  • @anatolgrabski3407
    @anatolgrabski3407 ปีที่แล้ว

    It worked. Thanks a lot

  • @tekklov2646
    @tekklov2646 11 หลายเดือนก่อน

    Thanks, they helo me ❤