LAB - JWT Token Manipulation
In this lab environment, you will have GUI access to a Debian machine. An application named Playme is available on the Android Emulator.
Objective: Manipulate the JWT token to impersonate an admin and retrieve the flag.
The regular user credentials for the Playme app are:
Username: alice
Password: Qwerty@1234567
Note: You can start the emulator using the script located on the Desktop. Additionally, check the /root/Tools directory for available tools.

After execute the app, we can see a login panel. Set credentials here -->

Now, with it, configurate local proxy and burpproxy -_>
## View us IP 
hostname -I
## Set local proxy
adb shell settings put global http_proxy <host-ip>:8080
With it do, intercept the login peticion -->


We can get a login token, and we can see three points so... copy and put in into jwio -_>

Know it, we can decode of base64 the content "white selection" and manipulate it. For example, change the role to admin -->




Last updated