Cracking a JWT with MD5_HMAC Algorithm - Marmalade 5 [NahamCon CTF 2023]

Поделиться
HTML-код
  • Опубликовано: 23 сен 2024

Комментарии • 7

  • @davemonaco1
    @davemonaco1 Год назад +3

    Cool video. One note, you can use john with the mask you tried for hashcat plus md5hmac.

  • @kerbalette156
    @kerbalette156 Год назад

    Very cool. Nice to see how you got Chatgpt to code it up

    • @intigriti
      @intigriti  Год назад

      Cheers! I could of made a more efficient script myself but chatGPT did it soooo much quicker 😆

  • @TOn-fx2gr
    @TOn-fx2gr 7 месяцев назад

    Hi can you make another video trying to crack otp (totp) since it use the linux time since epoche and a secret key to generate the otp , if we have a list of previously generated valid otp and thier time (when they were generated) we can use that to crack the secret key then we can use it to generate new otp at the same time when requesting the targeted server to generate one , there is an otp mode on hashcat or if you want you can use a python script using the otp module