JWT

Description

JWTs are widely used to help with authorization. They are quite safe, if the implementation is correct. JWTs are also interesting because sometimes they can hold useful information for extending our attack surface.

Commands

hashcat -a 0 -m 16500 <JWT> /usr/share/wordlists/rockyou.txt

Last updated