Question: You ve been informed that the system has a weak key vulnerability that can be decrypted using a brute - force attack. The weak key

Youve been informed that the system has a weak key vulnerability that can be decrypted using a brute-force attack. The weak key corresponds to the employee ID of one of the developers who developed the code, assuming that no one could guess the employee ID.
A friendly employee in the company has leaked the pattern for the employee ID number, which would consist of numeric digits and could be up to seven digits. Pass this weak key on to the flag6 API and you should get the flag.
To earn your flag you must perform the following actions.
Invoke the flag9token API to get the vulnerable token with a weak key. The token is provided below.
Once you have the jwt token, carefully analyze the token header and the contents and note it down.
Explore various possibilities to hack into the JWT token. Various open source tools can be used to decrypt a weak key. You are free to explore any of these tools or write your code to decrypt the token. John Ripper is the best tool for this one.
eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJleHAiOjQyMTY2MzIwMDAsImlhdCI6MTczMzMzODM5NX0.hIW7o9HewRDV5wKcDDykjm2raW-G6PwMKAqGGb39C4

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!