Tags: web 

Rating: 1.0

# free wifi part 4

so after running a dirsearch I found the dir `/jwtlogin`

and from examining the pcap file I found the cookie
```
Set-Cookie: JWT 'secret'="dawgCTF?heckin#bamboozle"; Path=/
```

so after playing around and analysing the pcap file
I crafted the following jwt token
![jwt.io](https://github.com/pop-eax/DawgCTF/raw/master/Web/free%20wifi%20part%204/img.png)
`eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpZGVudGl0eSI6MzEzMzcsInVzZXJuYW1lIjoidHJ1ZSIsImlhdCI6IjE1ODY2OTg2NDYiLCJleHAiOiIxNTg2Njk5NTE3IiwibmJmIjoiMTU4NjY5ODUxNyJ9.2C3UHzTJ21r1eNLyNIdXL14sNoXdexg2wMKjpuEd1X8`

the flag :P
`DawgCTF{y0u_d0wn_w!t#_JWT?}`

Original writeup (https://github.com/pop-eax/DawgCTF/blob/master/Web/free%20wifi%20part%204/README.md).