Cookie Consent by Free Privacy Policy Generator ๐Ÿ“Œ Jwtear - Modular Command-Line Tool To Parse, Create And Manipulate JWT Tokens For Hackers

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š Jwtear - Modular Command-Line Tool To Parse, Create And Manipulate JWT Tokens For Hackers


๐Ÿ’ก Newskategorie: IT Security Nachrichten
๐Ÿ”— Quelle: kitploit.com


A modular command-line tool to parse, create and manipulate JSON Web Token(JWT) tokens for security testing purposes.

Features

  • Complete modularity.
    • All commands are plugins.
    • Easy to add new plugins.
    • Support JWS and JWE tokens.
  • Easy interface for plugins. (follow the template example)
  • Flexible
  • token generation based on production-class libraries (e.g. json-jwt, jwe).

Available plugins

  • Parse: parses jwt tokens.
  • jws: manipulate and generate JWS tokens.
  • jwe: manipulate and generate JWE tokens.
  • bruteforce: brutefocing JWS signing key
  • wiki: contains offline information about JWT, attacks ideas, references.

Installation

install it yourself as:

$ gem install jwtear

Usage

  • Show the main menu
    888888 888       888 88888888888
"88b 888 o 888 888
888 888 d8b 888 888
888 888 d888b 888 888 .d88b. 8888b. 888d888
888 888d88888b888 888 d8P Y8b "88b 888P"
888 88888P Y88888 888 88888888 .d888888 888
88P 8888P Y8888 888 Y8b. 888 888 888
888 888P Y888 888 "Y8888 "Y888888 888
.d88P v1.0.0
.d88P"
888P"
NAME
jwtear - Parse, create and manipulate JWT tokens.

SYNOPSIS
jwtear [global options] command [command options] [arguments...]

GLOBAL OPTIONS
-v, --version - Check current and latest version
-h, --help - Show this help message

COMMANDS
help - Shows a list of commands or help for one command
bruteforce, bfs - plugin to offline bruteforce and crack token's signature.
jws, s - Generate signature-based JWT (JWS) token.
jwe, e - Generate encryption-based JWT (JWE) token.
parse - Parse JWT token (accepts JWS and JWE formats).
wiki, w - A JWT wiki for hackers.
  • Show a subcommand help, use -h COMMAND
$jwtear -h jws

NAME
jws - Generate signature-based JWT (JWS) token.

SYNOPSIS
jwtear [global options] jws [command options]

DESCRIPTION
Generate JWS and JWE tokens.

COMMAND OPTIONS
-h, --header=JSON - JWT header (JSON format). eg. {"typ":"JWT","alg":"HS256"}. Run 'jwtear gen -l' for supported algorithms. (required, default: none)
-p, --payload=JSON - JWT payload (JSON format). eg. {"login":"admin"} (required, default: none)
-k, --key=PASSWORD|PUB_KEY_FILE - Key as a password string or a file public key. eg. P@ssw0rd | eg. public_key.pem (default: none)
  • Use a plugin

plugins are defined as subcommands. Each subcommand may have one or more argument and/or switches.

$ jwtear parse -t eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiaWF0IjoxNTE2MjM5MDIyfQ.J8SS8VKlI2yV47C4BtfYukWPx_2welF34Mz7l-MNmkE
$ jwtear jws -h '{"alg":"HS256","typ":"JWT"}' -p '{"user":"admin"}' -k p@ss0rd123
$ jwtear jwe -header '{"enc":"A192GCM","typ":"JWT"}' --payload '{"user":"admin"}' --key public.pem
$ jwtear bruteforce -v -t eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJ1c2VyIjpudWxsfQ.Tr0VvdP6rVBGBGuI_luxGCOaz6BbhC6IxRTlKOW8UjM -l ~/tmp/pass.list

Add plugin

To add a new plugin, create a new ruby file under plugins directory with the following structure

module JWTear
module CLI
extend GLI::App
extend JWTear::Helpers::Extensions::Print
extend JWTear::Helpers::Utils

desc "Plugin short description"
long_desc "Plugin long description"
command [:template, :pt] do |c|
c.action do |global, options, arguments|
print_h1 "Plugin template"
print_good "Hi, I'm a template."
template = TemplatePlugin.new
end
end
end

module Plugin
class TemplatePlugin
include JWTear::Helpers::Extensions::Print
include JWTear::Helpers::Utils

def initialize
check_dependencies
# ..code...
end

# ..code...
end
end
end

Instead of including all dependencies for each plugin into jwtear, you can add these dependencies as a hash to check_dependencies method which will require the library and throw a gentle error to the user to install any missing gems.

The hash key is the gem name to install, the hash value is the require string

deps = {'async-io' => 'async/ip'}
check_dependencies(deps)

Once the missing dependencies are installed by the user, the check_dependencies will require them once the plugin class initiated.

Contributing

Bug reports and pull requests are welcome on GitHub at https://github.com/[USERNAME]/jwtear.

  1. Fork it ( https://github.com/KINGSABRI/jwtear/fork )
  2. Create your feature branch (git checkout -b my-new-feature)
  3. Commit your changes (git commit -am 'Add some feature')
  4. Push to the branch (git push origin my-new-feature)
  5. Create a new Pull Request

Areas to contribute

  • contribution by reporting bugs.
  • contribution by perfecting the current code.
  • contribution by adding new plugins.
  • contribution by enhancing the jwtear wiki.
  • contribution by requesting features and/or plugins.

License

The gem is available as open source under the terms of the MIT License.



...



๐Ÿ“Œ JWT-Hack - Tool To En/Decoding JWT, Generate Payload For JWT Attack And Very Fast Cracking(Dict/Brutefoce)


๐Ÿ“ˆ 57.63 Punkte

๐Ÿ“Œ How to Invalidate JWT Tokens Without Collecting Tokens


๐Ÿ“ˆ 45.95 Punkte

๐Ÿ“Œ Power of Tokens:Refresh Tokens and Access Tokens in Backend Development


๐Ÿ“ˆ 45.49 Punkte

๐Ÿ“Œ JWT Tool - A Toolkit For Testing, Tweaking And Cracking JSON Web Tokens


๐Ÿ“ˆ 38.55 Punkte

๐Ÿ“Œ Some-Tweak-To-Hide-Jwt-Payload-Values - A Handful Of Tweaks And Ideas To Safeguard The JWT Payload


๐Ÿ“ˆ 35.44 Punkte

๐Ÿ“Œ jwt-simple up to 0.3.0 on Node.js jwt.decode weak authentication


๐Ÿ“ˆ 33.64 Punkte

๐Ÿ“Œ Inversoft prime-jwt JWT Signature Validation privilege escalation


๐Ÿ“ˆ 33.64 Punkte

๐Ÿ“Œ Crypt::JWT up to 0.022 on Perl Access Control JWT.pm hmac weak authentication


๐Ÿ“ˆ 33.64 Punkte

๐Ÿ“Œ perl-CRYPT-JWT up to 0.022 Access Control JWT.pm _decode_jws() weak authentication


๐Ÿ“ˆ 33.64 Punkte

๐Ÿ“Œ CVE-2023-51774 | json-jwt Gem 1.16.3 on Ruby JSON::JWT.decode unknown vulnerability


๐Ÿ“ˆ 33.64 Punkte

๐Ÿ“Œ jwt-simple bis 0.3.0 jwt.decode schwache Authentisierung


๐Ÿ“ˆ 33.64 Punkte

๐Ÿ“Œ Inversoft prime-jwt JWT Signature Validation erweiterte Rechte


๐Ÿ“ˆ 33.64 Punkte

๐Ÿ“Œ JWT Key ID Injector - Simple Python Script To Check Against Hypothetical JWT Vulnerability


๐Ÿ“ˆ 33.64 Punkte

๐Ÿ“Œ Hacking JWT Tokens For Fun And Profit


๐Ÿ“ˆ 33.18 Punkte

๐Ÿ“Œ cpython up to 3.6.12/3.7.9/3.8.7/3.9.1 urllib.parse.parse_qsl/urllib.parse.parse_qs request smuggling


๐Ÿ“ˆ 32.58 Punkte

๐Ÿ“Œ Medium CVE-2021-23346: Html-parse-stringify project Html-parse-stringify


๐Ÿ“ˆ 32.58 Punkte

๐Ÿ“Œ Medium CVE-2021-29932: Parse duration project Parse duration


๐Ÿ“ˆ 32.58 Punkte

๐Ÿ“Œ Abusing JWT (JSON Web Tokens) - Sven Morgenroth - PSW #673


๐Ÿ“ˆ 31.39 Punkte

๐Ÿ“Œ User Authentication with JWT tokens in node js


๐Ÿ“ˆ 31.39 Punkte

๐Ÿ“Œ Implementing an Auth Guard with JWT tokens in Nest.js


๐Ÿ“ˆ 31.39 Punkte

๐Ÿ“Œ Understanding JSON Web Tokens (JWT)


๐Ÿ“ˆ 31.39 Punkte

๐Ÿ“Œ What is a Hard Token? Hardware Security Tokens Vs Soft Tokens | UpGuard


๐Ÿ“ˆ 29.13 Punkte

๐Ÿ“Œ Trust Tokens renamed Private State Tokens


๐Ÿ“ˆ 29.13 Punkte

๐Ÿ“Œ Maximizing Score with Tokens - 948 - Bag of Tokens in Go


๐Ÿ“ˆ 29.13 Punkte

๐Ÿ“Œ Forensics Tool Flaw Allows Hackers to Manipulate Evidence


๐Ÿ“ˆ 29.06 Punkte

๐Ÿ“Œ TAS - A Tiny Framework For Easily Manipulate The Tty And Create Fake Binaries


๐Ÿ“ˆ 27.53 Punkte

๐Ÿ“Œ How to Create and Manipulate Tables in a SQL Database Using Python


๐Ÿ“ˆ 27.53 Punkte

๐Ÿ“Œ How to Create and Manipulate JSON Objects in C#


๐Ÿ“ˆ 27.53 Punkte

๐Ÿ“Œ RDP Abuse and Swiss Army Knife Tool Used to Pillage, Encrypt and Manipulate Data


๐Ÿ“ˆ 27.2 Punkte

๐Ÿ“Œ VR Researchers Manipulate Human Visual System To Create An Infinite Corridor In a Fixed Space


๐Ÿ“ˆ 25.74 Punkte

๐Ÿ“Œ Linux Cat Command: How to Display and Manipulate Text


๐Ÿ“ˆ 25.62 Punkte

๐Ÿ“Œ Hackers Can Manipulate Media Files You Receive Via WhatsApp and Telegram


๐Ÿ“ˆ 25.48 Punkte

๐Ÿ“Œ Hackers can intercept and manipulate DNS queries, researchers warn


๐Ÿ“ˆ 25.48 Punkte

๐Ÿ“Œ Media File Jacking โ€“ New Flaw Let Hackers Manipulate WhatsApp and Telegram Media Files in Android


๐Ÿ“ˆ 25.48 Punkte

๐Ÿ“Œ Convert and Manipulate Images With โ€˜Converterโ€™ GUI Tool in Linux


๐Ÿ“ˆ 25.41 Punkte











matomo