Skip to content

Commit bbaab18

Browse files
authored
v2.1.0
[+] NEW exploit: null signature (`-X n`) [+] NEW scanner mode: Inject Common Claims (`-M cc`) [+] additional checks in 'Playbook' scan mode (`-M pb`) [+] multiple custom headers now supported (`-rh`) [+] reflective JWKS URL created automatically in config file - for JKU/Spoof JWKS attacks (`-X s`) [+] checks added for old/incompatible config files [+] report on long HTTP response times Bugfixes: * fixed colours not working in Windows cmd/Powershell * fixed capitalisation issue in config file * fixed broken null signed kid attacks in ScanModePlaybook()
1 parent 6dc2a07 commit bbaab18

File tree

4 files changed

+308
-89
lines changed

4 files changed

+308
-89
lines changed

README.md

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -46,6 +46,13 @@ On first run the tool will generate a config file, some utility files, logfile,
4646
* In order to capture external service interactions - such as DNS lookups and HTTP requests - put your unique address for Burp Collaborator (or other alternative tools such as RequestBin) into the config file as the "httplistener" value.
4747
***Review the other options in the config file to customise your experience.***
4848

49+
### Colour bug in Windows
50+
To fix broken colours in Windows cmd/Powershell: uncomment the below two lines in `jwt_tool.py` (remove the "# " from the beginning of each line)
51+
You will also need to install colorama: `python3 -m pip install colorama`
52+
```
53+
# import colorama
54+
# colorama.init()
55+
```
4956
---
5057

5158
## Usage
@@ -130,6 +137,21 @@ Head over to the [JWT Attack Playbook](https://github.com/ticarpi/jwt_tool/wiki)
130137

131138
## Version History/Changelog
132139

140+
### v2.1.0
141+
* November 2020
142+
* Python 3.x
143+
* [+] NEW exploit: null signature (`-X n`)
144+
* [+] NEW scanner mode: Inject Common Claims (`-M cc`)
145+
* [+] additional checks in 'Playbook' scan mode (`-M pb`)
146+
* [+] multiple custom headers now supported (`-rh`)
147+
* [+] reflective JWKS URL created automatically in config file - for JKU/Spoof JWKS attacks (`-X s`)
148+
* [+] checks added for old/incompatible config files
149+
* [+] report on long HTTP response times
150+
* Bugfixes:
151+
* fixed colours not working in Windows cmd/Powershell
152+
* fixed capitalisation issue in config file
153+
* fixed broken null signed kid attacks in ScanModePlaybook()
154+
133155
### v2.0
134156
* October 2020
135157
* Python 3.x

common-headers.txt

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
typ
2+
jku
3+
kid
4+
x5u
5+
x5t

common-payloads.txt

Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,60 @@
1+
iss
2+
sub
3+
aud
4+
exp
5+
nbf
6+
iat
7+
jti
8+
name
9+
given_name
10+
family_name
11+
middle_name
12+
nickname
13+
preferred_username
14+
profile
15+
picture
16+
website
17+
email
18+
email_verified
19+
gender
20+
birthdate
21+
zoneinfo
22+
locale
23+
phone_number
24+
phone_number_verified
25+
address
26+
updated_at
27+
azp
28+
nonce
29+
auth_time
30+
at_hash
31+
c_hash
32+
acr
33+
amr
34+
sub_jwk
35+
cnf
36+
sip_from_tag
37+
sip_date
38+
sip_callid
39+
sip_cseq_num
40+
sip_via_branch
41+
orig
42+
dest
43+
mky
44+
events
45+
toe
46+
txn
47+
rph
48+
sid
49+
vot
50+
vtm
51+
attest
52+
origid
53+
act
54+
scope
55+
client_id
56+
may_act
57+
jcard
58+
at_use_nbr
59+
div
60+
opt

0 commit comments

Comments
 (0)