jwt-tool
jwt_tool.py is a toolkit for validating, forging, scanning, and tampering JWTs (JSON Web Tokens).
Name:jwt-tool
Category:Vulnerabilities
Publisher:trickest-mhmdiaa
Created:2/5/2022
Container:
quay.io/trickest/jwt-tool:eb411ea
Output Type:
License:Unknown
Source:View Source
Parameters
The JWT to tinker with (no need to specify if in header/cookies)--bare
Return TOKENS ONLY--mode
Scanning mode: pb = playbook audit, er = fuzz existing claims to force errors, cc = fuzz common claims, at - All Tests!--sign
Sign the resulting token--crack
Crack key for an HMAC-SHA token--query
Query a token ID against the logfile to see the details of that request--tamper
Tamper with the JWT contents--cookies
Request cookies to send with the forged HTTP request--exploit
Exploit known vulnerabilities: a = alg:none, signature, b = blank password accepted in signature, s = spoof JWKS, k = key confusion (specify public key with -pk), i = inject inline JWKS--headers
Request headers to send with the forged HTTP request (can be used multiple times for additional headers)--noproxy
Disable proxy for current request--pubkey
Public Key for Asymmetric crypto--verbose
When parsing and printing, produce (slightly more) verbose output--jwksurl
URL location where you can host a spoofed JWKS--jwksfile
JSON Web Key Store for Asymmetric crypto--keyfile
Keyfile for cracking (when signed with 'kid' attacks)--postdata
Text string that contains all the data to be sent in a POST request--privkey
Private Key for Asymmetric crypto--targeturl
Target URL--verify
Verify the RSA signature against a Public Key--canaryvalue
Text string that appears in response for valid token (e.g. Welcome, ticarpi)--headerclaim
Header claim to tamper with--headervalue
Value (or file containing values) to inject into tampered header claim--injectclaims
Inject new claims and update existing claims with new values--payloadclaim
Payload claim to tamper with--payloadvalue
Value (or file containing values) to inject into tampered payload claim--dict
Dictionary file for cracking