A CPU-based JSON Web Token (JWT) cracker and - to some extent - scanner.
APACHE-2.0 License
JWT
) cracker and - to some extent - scannerjwtcat
is a Python script
designed to detect and exploit well-known cryptographic flaws present in JSON Web Token (JWT
).
These vulnerabilities, if successfully exploited by an adversary could allow authentication bypass, information disclosure and could ultimately lead to the compromise of an entire information system.
More information about JWT
vulnerabilities can be found at:
JWT
signature bypass due to the use of None
hashing algorithm (alg=none
)JWT
private keys signed with the HS256
hashing algorithm:
jwtcat
is fully written in Python 3
and requires a minimum of Python 3.6
in addition to the following libraries:
Clone the repository:
git clone https://github.com/AresS31/jwtcat
cd jwtcat
(Optional but recommended) Create and activate a new Python
virtual environment:
Create the virtual environment:
python -m venv env
Activate the newly created environment:
On POSIX
:
source ./env/bin/activate
On Windows
:
./env/Scripts/Activate.ps1
Install dependencies:
python -m pip install -r requirements.txt
To list the available options:
python jwtcat.py -h
To list available options specific to brute force attacks:
python jwtcat.py brute-force -h
To list available options specific to wordlist attacks:
python jwtcat.py wordlist -h
To test a JWT
against CVE-2018-1000531 and HS256
brute-force attacks:
python jwtcat.py vulnerable -h
-tF, --token-file
swicth.TQDM
integration with the logger
.JWT
is signed with HS256
.JWT
is vulnerable to CVE-2018-1000531.potfile
options.python-colorlog
to coloredlogs
.If you want to support this project and appreciate the time invested in developping, maintening and extending it; consider donating toward my next cup of coffee. ☕
It is easy, all you got to do is press the Sponsor
button at the top of this page or alternatively click this link. 💸
Found a bug? I would love to squash it! 🐛
Please report all issues on the GitHub issues tracker.
You would like to contribute to better this project? 🤩
Please submit all PRs
on the GitHub pull requests tracker.
See LICENSE.