amaterasu-sec.com
Open in
urlscan Pro
162.159.153.4
Public Scan
Submitted URL: https://amaterasu-sec.com/secrets-amaterasu-security-bd3a75449629
Effective URL: https://amaterasu-sec.com/secrets-amaterasu-security-bd3a75449629?gi=db5930d051de
Submission: On March 28 via manual from DE — Scanned from DE
Effective URL: https://amaterasu-sec.com/secrets-amaterasu-security-bd3a75449629?gi=db5930d051de
Submission: On March 28 via manual from DE — Scanned from DE
Form analysis
0 forms found in the DOMText Content
Open in app Sign up Sign In Write Sign up Sign In Amaterasu Security Follow Jan 16 · 3 min read · Listen Save SECRETS — AMATERASU SECURITY This challenge deals with JWT (Java Web Tokens) and the premise of the story below is that we were the ones that originally created the tokens and we have to prove ourselves on why we deserve to keep our position for creating such a malicious thing. Here are a list of resources used for this challenge: 1. Cyberchef (https://cyberchef.io/) 2. JWT Decoder (https://jwt.io/) 3. Hashcat-JWT (https://www.notion.so/amaterasu-sec/Hashcat-JWT-68c295641dc148258c47d3ce810330a7) You’re a senior cyber security engineer and during your shift, we have intercepted/noticed a high privilege actions from unknown source that could be identified as malicious. We have got you the ticket that made these actions. You are the one who created the secret for these tickets. Please fix this and submit the low privilege ticket so we can make sure that you deserve this position. Here is the ticket: eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJmbGFnIjoiQlRMe180X0V5ZXN9IiwiaWF0Ijo5MDAwMDAwMCwibmFtZSI6IkdyZWF0RXhwIiwiYWRtaW4iOnRydWV9.jbkZHll_W17BOALT95JQ17glHBj9nY-oWhT1uiahtv8 JSON Web Tokens (JWT) have become increasingly popular in recent years due to their efficiency and security in transmitting data between parties. In this article, we will be exploring the structure and usage of JWT tokens, and how to solve a cybersecurity challenge that involves these tokens. STRUCTURE OF JWT TOKENS JWT tokens are made up of three sections: header, payload, and signature. The header section contains information about how the JWT token is encoded, while the payload section contains the claims. Claims are statements about an entity, such as the entity’s name and the rights associated with it. The signature is used to verify that the sender of the JWT token is who it claims to be and to ensure that the message wasn’t changed along the way. SOLVING A CYBERSECURITY CHALLENGE WITH JWT TOKENS The challenge we will be exploring involves identifying a token, finding the structure of the token, and decoding it to find the secret and a new verified signature ticket. 1. Identifying the Token: The first step is to drop the token into a tool called Cyberchef, which will tell you what the token is decoding. In this case, the token is a JWT token. 2. Understanding the Structure: Using the JWT decoder in Cyberchef, the left panel will show each section of the token color-coded with a period (.) separating each section. The structure of the token is header.payload.signature. 3. Finding the Hint: To find the hint, focus on the “flag” section of the decoded token. In this case, the hint is “4_eyes”. 4. Finding the Secret: To find the secret, some OSINT (Open Source Intelligence) and bruteforcing techniques, such as Hashcat or John, may be used. In this case, the secret is “bT!0”. 5. Generating a New Verified Signature Ticket: To generate a new verified signature ticket with a low privilege, the decoded token’s “admin access” can be changed to false and the token can be taken. The resulting signature would look like this: “eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJmbGFnIjoiQlRMe180X0V5ZXN9IiwiaWF0Ijo5MDAwMDAwMCwibmFtZSI6IkdyZWF0RXhwIiwiYWRtaW4iOmZhbHNlfQ.nMXNFvttCvtDcpswOQA8u_LpURwv6ZrCJ-ftIXegtX4”. In conclusion, JWT tokens play a crucial role in secure data transmission and understanding their structure and usage is essential in solving cybersecurity challenges. By following the steps outlined in this article, you can successfully decode and manipulate JWT tokens. https://blueteamlabs.online/achievement/share/challenge/8095/35 Originally published at https://www.amaterasu-sec.com. Btlo ENJOY THE READ? REWARD THE WRITER.BETA Your tip will go to Amaterasu Security through a third-party platform of their choice, letting them know you appreciate their story. Give a tip ELEVATE YOUR CYBERSECURITY SKILLS TODAY! Join my exclusive subscription and unlock the secrets of defensive and offensive security with cutting-edge tools and resources. BlueTeamLabsOnline and Flaws.cloud await! By signing up, you will create a Medium account if you don’t already have one. Review our Privacy Policy for more information about our privacy practices. Subscribe MORE FROM AMATERASU SECURITY Follow Security Hobbyist | Full-Time Purple Teamer | CompTIA A+, Network+, Security+, CySA+, Project+ | ISC(2) SSCP Feb 8 MALICIOUS POWERSHELL ANALYSIS Decoding the Encoded Powershell Script to Identify the Malware Responsible for the Attack Recently, a large company named GothamLegend was the victim of a cyber attack after an employee opened a phishing email containing malware. The network of the company was severely compromised, leading to a business-wide disruption. To resolve… Cyber Attack 6 min read Cyber Attack 6 min read -------------------------------------------------------------------------------- Share your ideas with millions of readers. Write on Medium -------------------------------------------------------------------------------- Feb 10 AUTOMATICALLY LOG YOUR POWERSHELL SESSIONS WITH EASE If you are new/still learning or an experienced PowerShell user but you forget what cmdlets you used during your last session. Fret no more! Today I will show you to log your PowerShell sessions automatically! Topics: PowerShell Registry Editor First thing we will need to do is check if a path… Powershell 2 min read Powershell 2 min read -------------------------------------------------------------------------------- Mar 2 “AWS S3 BUCKETS MISTAKES: DON’T LET THEM COST YOU” “Avoid common errors and protect your data with simple fixes. Keep your AWS S3 Bucket secure and your business safe.” In this series, we will we working with http://flaws.cloud. These are cloud security challenges that deals with AWS itself. flAWS _ ____ __ __ _____ | || | / || |__| |/ ___/ | __|| | | o || | | ( \_ | |_ | |___ | || | | |\__ | | _] | || _ || ` ' |/…flaws.cloud AWS 4 min read AWS 4 min read -------------------------------------------------------------------------------- Mar 19 THE CYBER SENTINELS CLUB Joining the Cyber Sentinels Club on Discord is an absolutely fantastic opportunity for anyone who is passionate about cybersecurity! In today’s rapidly evolving digital landscape, staying up-to-date on the latest security trends and solutions is more important than ever, and this club provides a platform where members can: Collaborate with… Cybersecurity 2 min read Cybersecurity 2 min read -------------------------------------------------------------------------------- Feb 7 NOTED — A ONENOTE ATTACHMENT MALWARE Scenario: Compromised Machines in the Finance Department A number of machines belonging to employees in the Finance department have been compromised. While other responders are containing the threat, you’ve identified that the employees all received the same email with an attachment. It’s time to take a closer look at the… Btlo 3 min read Btlo 3 min read -------------------------------------------------------------------------------- AboutHelpTermsPrivacy -------------------------------------------------------------------------------- GET THE MEDIUM APP AMATERASU SECURITY 16 Followers Security Hobbyist | Full-Time Purple Teamer | CompTIA A+, Network+, Security+, CySA+, Project+ | ISC(2) SSCP Follow MORE FROM MEDIUM SOCFortress PART 2. GRAYLOG INSTALL — LOG INGESTION Mark Ernest MITRE ATT&CK DEFENDER™ ATT&CK® SOC ASSESSMENTS TRAINING-RECOMMENDATIONS & REVIEW Mark Ernest MITRE ATT&CK DEFENDER™ CYBER THREAT INTELLIGENCE TRAINING — LEADERSHIP RECOMMENDATIONS & REVIEW Adam Goss THREAT HUNTING II: ENVIRONMENT SETUP Help Status Writers Blog Careers Privacy Terms About Text to speech To make Medium work, we log user data. By using Medium, you agree to our Privacy Policy, including cookie policy.