From cf720a260a9f87e3f12165da456a0a3b93beb6b8 Mon Sep 17 00:00:00 2001 From: Kathan Patel Date: Wed, 25 Nov 2020 18:07:02 +0530 Subject: [PATCH] Delete Easy_JWT_Methods.md --- JWT/Easy_JWT_Methods.md | 17 ----------------- 1 file changed, 17 deletions(-) delete mode 100644 JWT/Easy_JWT_Methods.md diff --git a/JWT/Easy_JWT_Methods.md b/JWT/Easy_JWT_Methods.md deleted file mode 100644 index 6143dc6d..00000000 --- a/JWT/Easy_JWT_Methods.md +++ /dev/null @@ -1,17 +0,0 @@ -# JWT -### Steps -``` -1) Create a account -2) Inspect the token -3) Base64 decode the header -4) If any Kid= parameter are there so you can find some bugs -5) Using that parameter you can also find directory traversal , i tell you how -6) Change that kid= parameter with you directory traversal payload -7) Change payload {"user":"admin"} -8) Create a python script that generate a exploit token. (If you want that script so dm me in Twitter ) -9) Put that token and reload the page -10) Done -``` - -### Author -* [@kAshhadali10](https://twitter.com/kAshhadali10)