JaWT Scratchpad
Last updated
Was this helpful?
Last updated
Was this helpful?
Check the admin scratchpad! or
Login as any user. I used john
.
Get the jwt token
from the jwt cookie
. Example token: eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJ1c2VyIjoiam9obiJ9._fAF3H23ckP4QtF1Po3epuZWxmbwpI8Q26hRPDTh32Y
Paste the jwt token
into a file called token.txt
Run this command with hashcat to crack the token: hashcat -a0 -m 16500 token.txt rockyou.txt
Run the same command but with --show
to get the password used: hashcat -a0 -m 16500 token.txt rockyou.txt --show
Paste original token into
Type password ilovepico
into the Signing Key
field and change user
in the payload to admin
Copy and paste the new token into the jwt cookie
Refresh the page to get the flag
picoCTF{jawt_was_just_what_you_thought_9de8e25511a8841ab9ade0aa092be116}