From 7d989441f5fbca150033a484534067a49c477751 Mon Sep 17 00:00:00 2001 From: CPol Date: Fri, 22 Jul 2022 12:41:11 +0000 Subject: [PATCH] GitBook: [#3333] No subject --- pentesting-web/hacking-jwt-json-web-tokens.md | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/pentesting-web/hacking-jwt-json-web-tokens.md b/pentesting-web/hacking-jwt-json-web-tokens.md index 1495fd2c..7d727b38 100644 --- a/pentesting-web/hacking-jwt-json-web-tokens.md +++ b/pentesting-web/hacking-jwt-json-web-tokens.md @@ -30,7 +30,9 @@ Get the [**official PEASS & HackTricks swag**](https://peass.creator-spring.com) Run [**jwt\_tool**](https://github.com/ticarpi/jwt\_tool) with mode `All Tests!` and wait for green lines ```bash -python3 jwt_tool.py -M at -t "https://api.example.com/api/v1/user/76bab5dd-9307-ab04-8123-fda81234245" -rh "Authorization: Bearer eyJhbG..." +python3 jwt_tool.py -M at \ + -t "https://api.example.com/api/v1/user/76bab5dd-9307-ab04-8123-fda81234245" \ + -rh "Authorization: Bearer eyJhbG..." ``` If you are lucky the tool will find some case where the web application is correctly checking the JWT: