-
Notifications
You must be signed in to change notification settings - Fork 47
Open
Labels
enhancementNew feature or requestNew feature or request
Description
Hey, wanted to just suggest an addition to this project of implementing the algorithm confusion attack as detailed here. Essentially, given any two JWT hashes signed with RS256, you can derive the public key that was used to sign them. Based on that, if the code isn't verifying the set algorithm, you can arbitrarily sign your keys as HS256 by using the public key as the secret since that's what would be used as a key for verification of signatures.
Secondarily, I would prefer that bruteforce processes would be run from an internal instanced docker container when requested, as the current system isn't efficient enough to provide consistent results as opposed to using something such as gojwtcrack, or just hashcat.
dr34mhacks
Metadata
Metadata
Assignees
Labels
enhancementNew feature or requestNew feature or request