A special cookie for sessions similar to a JWT Token but with different structure
Brute Forcing or Decoding Flask Cookie
https://github.com/mprunet/flask_util (decoding)
Decoding
python decode.py eyJhZG1pbiI6ZmFsc2UsImF1dGgiOmZhbHNlLCJ0b2tlbiI6InhKbVA5YUpKVUJma3BTQTdkOXlacExubFMwcVJkd2hyYmo2clhXOTVuSVNfSU9aUUxZYTFZV1NPSF9BQ0JwMS0wdXJvdmxEVFhhVkZ5YVhVNFhxS3hBIn0.aFwwtQ.tSwoZKSSVqSkr0Er3xwyJY76y60
Brute Force
Flask Unsign
https://pypi.org/project/flask-unsign/ (brute force)
- Check which wordlists you have with
ls /home/yoshixi/.pyenv/versions/3.12.4/lib/python3.12/site-packages/flask_unsign_wordlist/wordlists/rockyou.txt%
- Add a wordlist
cp /usr/share/wordlists/rockyou.txt ~/.pyenv/versions/3.12.4/lib/python3.12/site-packages/flask_unsign_wordlist/wordlists/rockyou.txt
- Unsign
flask-unsign --no-literal-eval --wordlist /usr/share/wordlists/jwtsecrets.txt --unsign --cookie "eyJhZG1pbiI6ZmFsc2UsImF1dGgiOmZhbHNlLCJ0b2tlbiI6InhKbVA5YUpKVUJma3BTQTdkOXlacExubFMwcVJkd2hyYmo2clhXOTVuSVNfSU9aUUxZYTFZV1NPSF9BQ0JwMS0wdXJvdmxEVFhhVkZ5YVhVNFhxS3hBIn0.aFwwtQ.tSwoZKSSVqSkr0Er3xwyJY76y60"