Token Trouble: How Leaked JWTs Let Me Become Everyone on the Internet
作者通过扫描企业应用API发现JWT令牌泄露问题,并利用算法混淆攻击等技术实现权限提升和账户接管。文章详细记录了从意外发现到成功利用的全过程,并附带完整PoC示例。 2025-10-4 07:37:47 Author: infosecwriteups.com(查看原文) 阅读量:68 收藏

Iski

Free link 🎈

Hey there!😁

Press enter or click to view image in full size

Image by AI

From discovering JWT tokens in logs to algorithm confusion attacks, privilege escalation, and full account takeover. Join my journey of exploiting authentication tokens with advanced techniques. Full PoC included. ☕

My amma always said “Don’t share your secrets with strangers!” but these applications were sharing JWT tokens with anyone who would look! 😂 There I was, like Shin-chan finding a treasure map… “Action Kamen! Token hunting mission!” 🦸♂️

It all started when I was scanning api.enterprise-app.com and noticed something strange in the server responses. "Enna da idhu? Oru JWT token response la thaniya varudhu?" (What is this? A JWT token coming alone in the response?)

🎯 Phase 1: The Accidental Token Discovery

Shin-chan mode: “Buru buru pai! Let’s find where these tokens are hiding!”


文章来源: https://infosecwriteups.com/token-trouble-how-leaked-jwts-let-me-become-everyone-on-the-internet-cb02acde43f2?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh