Loading...
「ツール」は右上に移動しました。
利用したサーバー: natural-voltaic-titanium
0いいね 24回再生

🔐 JWT Tampering From Token to Admin Takeover with PinewoodStore Demo

🔐 *JWT Tampering: From Token to Admin Takeover* | PinewoodStore Demo 🧠💥

In this video, we dive into *JWT (JSON Web Token) security* and show you how insecure implementations can lead to *account takeover* and **admin access**. You'll learn how attackers manipulate tokens, bypass signature checks, and exploit weaknesses in real-world apps like our vulnerable demo — **PinewoodStore**. 😈

👇 Here's what we cover:

---

🧱 What is a JWT?

A JWT has three parts:

1️⃣ *Header* – describes the signing algorithm
2️⃣ *Payload* – contains user data (claims)
3️⃣ *Signature* – validates the token’s integrity

All parts are **Base64URL-encoded**, not encrypted. ⚠️

---

🛑 Common JWT Vulnerabilities

1️⃣ *alg: none* – signature bypass
2️⃣ *Algorithm Confusion* – switching RS256 to HS256
3️⃣ *Ignored Expiration* – reusing expired tokens
4️⃣ *No Signature Verification* – total trust in decoded data (used in PinewoodStore)

---

🧪 Live Demo: PinewoodStore

Watch as we:

✔️ Log in as a normal user
✔️ Decode the token and modify the payload
✔️ Craft a fake token with `roles: ["admin"]`
✔️ Send it and gain full *admin access* 😱

---

🔧 Tools We Use

🛠️ [jwt_tool](github.com/ticarpi/jwt_tool)
🧪 Burp Suite + JWT Extensions
🔍 jwt.io debugger
🧾 Postman for testing

---

✅ JWT Security Best Practices

🔒 Always validate the signature
🚫 Reject `alg: none`
⏱️ Check expiration (`exp`)
🙈 Never store sensitive info in payload
🔐 Use strong secrets or proper key handling
⚙️ Implement role-based access on the server side

---

💥 If you’re building apps or testing APIs — this is a must-watch!

🧠 **Ask yourself**: “What happens if someone tampers with the token?”
If the answer is “Nothing” — you’re doing it right. 🙌

---

Blog Post-techtalkpine.com/2025/04/jwt-tampering-demo/

#jwt #security #hacking #websecurity #pentesting #jwtbugs #ethicalhacking #infosec #bugbounty #pinewoodstore

コメント