Это видео недоступно.
Сожалеем об этом.

BUG BOUNTY TUTORIAL: ACCOUNT TAKEOVER | JWT HACKING

Поделиться
HTML-код
  • Опубликовано: 30 окт 2022
  • Welcome to the Bug Bounty Tutorial Series! In this video, you will learn how to perform account takeover through jwt hacking. If you have any doubts or issues then please let me know in the comment section.
    Website: bepractical.tech
    Telegram: telegram.me/be...
    Labs: bepractical.te...
    Find Leaked Password: • Video
    Finding Hidden Parameter in WebApp: • BUG BOUNTY RECON #2: ...
    #cybersecurity #ethicalhacking #bugbounty #bugbountytips #bugbountyhunter #bugbountypoc

Комментарии • 21

  • @chayanguhathakurata5140
    @chayanguhathakurata5140 Год назад +7

    first of all....nobody just nobody exposes their web config values like this in their application......in small organizations they are defined within the environment variables..so even if you have intercepted the config file you will see key=${PRIVATE_KEY}...in case of large organizations these private keys are defined within a vault

    • @onlineghor
      @onlineghor 4 месяца назад

      right

    • @REDCULT-is-Live
      @REDCULT-is-Live 13 дней назад

      Correct. So what's your suggestion for an advanced approach?

    • @chayanguhathakurata5140
      @chayanguhathakurata5140 13 дней назад

      @@REDCULT-is-Live if you have the patience to read my previous then read it again

  • @Cossaw
    @Cossaw Год назад +2

    You should make playlists of your labs too. Loving them so far too!

  • @gamerz9129
    @gamerz9129 9 месяцев назад

    kind of confused it this account takeover or privilege escalation? program doesn't pad this type of bug am I right?

  • @ananthandaluri3128
    @ananthandaluri3128 2 месяца назад

    What kf we didnt find the key from the directory
    Any other method for key generation

  • @UCyohViaSVeHd2drDZVK2noQ
    @UCyohViaSVeHd2drDZVK2noQ Год назад

    Thanks for the video, i have one question in web.config file there is many keys so how we can identify which one is the secret key for decoding jwt token.

  • @gaurav3408008
    @gaurav3408008 Год назад

    So is there a way we can do fuzzing on jwt token ? Cause in your case you mentioned about dirbuster, so we are saying key is present in one of the file in some directory. Can we do something if we don't have the key, what other things can be applied ? Also great work ! looking forward to lab 2,3 and 4. I am trying to see the documentation for other labs, do share if you have.

    • @gaurav3408008
      @gaurav3408008 Год назад

      I can see waf has been applied on your website. Due to which fuff/dirbuster/gobuster returns 403 error. Is there a way we can bypass it and find web.config on our own ?

    • @samfisher8426
      @samfisher8426 9 месяцев назад

      its a mastery file lol ,i cant find it or any other file ,also cant crack the jwt for the secret key@@gaurav3408008

  • @REDCULT-is-Live
    @REDCULT-is-Live 13 дней назад

    Doesn't work in real scenarios anymore.

  • @keerthivasan1162
    @keerthivasan1162 Год назад

    I need to know do we need a professional version to do this practice because I have tried with the basic version it is not working? pls ans

    • @keerthivasan1162
      @keerthivasan1162 Год назад

      @@BePracticalTech tried multiple times but not getting he jwt tokens

  • @samfisher8426
    @samfisher8426 9 месяцев назад

    this lab is different now ,i tried to dir enum and cant find any file contain the secret key ?
    do i have to bruteforce for that jwt lab1 ?

    • @BePracticalTech
      @BePracticalTech  9 месяцев назад

      Yes

    • @samfisher8426
      @samfisher8426 9 месяцев назад

      well i already tried that using rockyou worlist and flask-unsign cant get the key@@BePracticalTech

  • @whateveritis0
    @whateveritis0 Год назад +1

    👍🏻👍🏻

  • @Hacker41822
    @Hacker41822 5 месяцев назад

    How is this hacking when you know exactly what the key for encryption is?

  • @ucheugbomah2228
    @ucheugbomah2228 4 месяца назад

    how to find this keys?

  • @jay-india
    @jay-india Год назад

    Bro wp-admin takeover video meke please