Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Increase allowed JWT token size #3248

Open
pr0x1ma-byte opened this issue Mar 30, 2022 · 1 comment
Open

Increase allowed JWT token size #3248

pr0x1ma-byte opened this issue Mar 30, 2022 · 1 comment

Comments

@pr0x1ma-byte
Copy link

Feature: Increase allowed JWT token size.

Current Behavior: Small tokens are allowed, but larger ones get rejected with the following:

Hashfile 'jwt.txt' on line 1 (token...): Token length exception

Additional notes:
Developers are adding lots of information into tokens that exceed the allowed 2kb size limit.

I'm working with a token that is ~4KB in size.
If I can get clear direction on what changes need to be made, I can make them.

Hashcat version (please complete the following information):

  • OS: Windows
  • Distribution: 10
  • Version: 6.2.5
@realSnoopy
Copy link
Contributor

first simple workflow would be looking into your jwt.txt and deleting everything not needed by hashcat like comments and so on
when looking into the module 16500 you will see hashcat is supporting 3 kernels, JWT_HS256, JWT_HS384, JWT_HS512
token seperated by . max 2047, max 2047 . max68 in size, if jwt is now using lets say JWT_HS1024, you/hashcat will need a new kernel to support this

second, there were already in the past some modules changed due to things like increased iterations rounds where the old var or the size checkup failed

could you provide your jwt.txt? please alter different parts wit XXXXX, but let the overallcount intact, so delete 5 chars and add 5 X on the same spot, plz dont delete the .

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants