API - JWT Validation

JWT Token Validation.

1. Tamper the Username from alex to alex2. Tamper with the username value.

2. Verify the removal of the signature validation of the JWT token.

3. Modify the algorithm of JWT.

4. Verify the weak security algorithm.

5. Brute force the sensitive paths in the JWT path location. url/v1/


BFLA (Broken Function Level Authorization)

Step 1: Create the user name as Alex2 and log in as the Alex user.




Step 2: Modify the JWT token for Alex in the alex2 account and change the username from alex2 to Alex.



Step 3: Successfully placed the order in the Alex2 account using Alex's user details.



BOLA (Broken Object Level Authorization)

Step 1: Perform the directory enumeration using FFuF.


Step 2: Find the sensitive path location to grab a lot of users' orders details.


Step 3: Now log in as the Alex user and access the order details means accessing unauthorized user details in the application(IDOR).



Comments

Popular posts from this blog

Burp Suite – Automated Vulnerabilities Findings

SQL Injection Attacks | Shahul Hameed

To use emulator(Using NOX emulator): Open Appie Application | Shahul Hameed