jwt_tool
Workflow
No
Step
Description
1
Recon
Decode the token to see what's in it
2
Scan
Run a Playbook Scan against the app to check for common misconfigurations
3
Exploit
Exploit any identified vulnerability
4
Fuzz
Check for unexpected values and claims to identify unexpected app behaviours
5
Review
Check the logs of any successful exploitation
jwt_tool.py <token>
Resources
Last updated
Was this helpful?