Rating:
# Skylark Capsule - Tokenz
## Introduction
![Description_challenge](https://raw.githubusercontent.com/IAgonYI/CTF---Space-Race-2021/main/Web/Skylark%20Capsule%20-%20Tokenz/Description_challenge.PNG)
"Get your capsule now. Can you gain access to the capsule of 'admin' ?" That's the goal of this challenge. So let's get on board !
![Website starting page](https://raw.githubusercontent.com/IAgonYI/CTF---Space-Race-2021/main/Web/Skylark%20Capsule%20-%20Tokenz/Acceuil_du_site.PNG)
We quickly understand that we have to create an account to see what's happend when we are connected, to look at our capsule's specs.
So we go on the register page and create a fake account like : id -> Test email -> [email protected] password -> 12345
![Account Creation](https://raw.githubusercontent.com/IAgonYI/CTF---Space-Race-2021/main/Web/Skylark%20Capsule%20-%20Tokenz/Register.PNG)
Came back on the website starting page, we see that now we can get our capsule's specs.
## Web traffic analysis
![Get specs](https://raw.githubusercontent.com/IAgonYI/CTF---Space-Race-2021/main/Web/Skylark%20Capsule%20-%20Tokenz/Get_Specs.PNG)
Let's start Burp suit to catch out which informations go trough the network when we click on that button.
![Burp catch](https://raw.githubusercontent.com/IAgonYI/CTF---Space-Race-2021/main/Web/Skylark%20Capsule%20-%20Tokenz/Burp.PNG)
So redirecting the query to the Burp's proxy, we find out something quite interesting !
The label "Authorization" contain something that look exactly like a JSON Web Token (Like the title of this challenge, what a surprise)
Ok so now we got the JWT of our account, let's decode it to understand a little bit more what's going on.
I went on : https://jwt.io/, which is a pretty good tool to analyse and modify a JWT Token
![Account token](https://raw.githubusercontent.com/IAgonYI/CTF---Space-Race-2021/main/Web/Skylark%20Capsule%20-%20Tokenz/Account_token.PNG)
## Create a fake admin token
The token contain an id and an username, so we are going to test if we put id = 1 and username = admin, to see what's going on.
Ok we already did a good job, but unfortunatly, the JWT has a signature... That's a bad news because we have to find out this signature.
The signature is used to know if the token has been created by the website.
We are going to use John The Ripper, a great cracking tool available on Kali linux, which integrate a functionality to hack JWT signature.
So let's use it !
## Help us John !
Ok, after putting the JWT in jwt.txt, I use this command on Kali terminal : john jwt.txt --worlist=/usr/share/wordlists/rockyou.txt --format=HMAC-SHA256
And that's the result in less than 1 second :
![John result](https://raw.githubusercontent.com/IAgonYI/CTF---Space-Race-2021/main/Web/Skylark%20Capsule%20-%20Tokenz/John_signature.PNG)
The signature was ... skylark140584 ... Skylark like the challenge's tittle. The creator of this challenge like making jokes, anyway.
So now, we got the signature, let's create our fake admin JWT.
## I'm the admin, am I not ?
Let's get back on jwt.io and replace id and username label without forget to enter the signature :
![Admin token creation](https://raw.githubusercontent.com/IAgonYI/CTF---Space-Race-2021/main/Web/Skylark%20Capsule%20-%20Tokenz/Admin_jwt.PNG)
And now, we return on Burp suite, send the query to the repeater, modify the token with the one we just created, and forward it !
Finaly we did it ! Here's the flag !
![Burp flag](https://raw.githubusercontent.com/IAgonYI/CTF---Space-Race-2021/main/Web/Skylark%20Capsule%20-%20Tokenz/Burp_flag.PNG)
```
CTF{break1ng_dem_jwtz}
```
*First writeup, I hope it was clear and understandable*