🔐 *JWT Tampering: From Token to Admin Takeover* | PinewoodStore Demo 🧠💥
In this video, we dive into *JWT (JSON Web Token) security* and show you how insecure implementations can lead to *account takeover* and **admin access**. You'll learn how attackers manipulate tokens, bypass signature checks, and exploit weaknesses in real-world apps like our vulnerable demo — **PinewoodStore**. 😈
👇 Here's what we cover:
---
🧱 What is a JWT?
A JWT has three parts:
1️⃣ *Header* – describes the signing algorithm
2️⃣ *Payload* – contains user data (claims)
3️⃣ *Signature* – validates the token’s integrity
All parts are **Base64URL-encoded**, not encrypted. ⚠️
---
🛑 Common JWT Vulnerabilities
1️⃣ *alg: none* – signature bypass
2️⃣ *Algorithm Confusion* – switching RS256 to HS256
3️⃣ *Ignored Expiration* – reusing expired tokens
4️⃣ *No Signature Verification* – total trust in decoded data (used in PinewoodStore)
---
🧪 Live Demo: PinewoodStore
Watch as we:
✔️ Log in as a normal user
✔️ Decode the token and modify the payload
✔️ Craft a fake token with `roles: ["admin"]`
✔️ Send it and gain full *admin access* 😱
---
🔧 Tools We Use
🛠️ [jwt_tool](github.com/ticarpi/jwt_tool)
🧪 Burp Suite + JWT Extensions
🔍 jwt.io debugger
🧾 Postman for testing
---
✅ JWT Security Best Practices
🔒 Always validate the signature
🚫 Reject `alg: none`
⏱️ Check expiration (`exp`)
🙈 Never store sensitive info in payload
🔐 Use strong secrets or proper key handling
⚙️ Implement role-based access on the server side
---
💥 If you’re building apps or testing APIs — this is a must-watch!
🧠 **Ask yourself**: “What happens if someone tampers with the token?”
If the answer is “Nothing” — you’re doing it right. 🙌
---
Blog Post-techtalkpine.com/2025/04/jwt-tampering-demo/
#jwt #security #hacking #websecurity #pentesting #jwtbugs #ethicalhacking #infosec #bugbounty #pinewoodstore
コメント