Laravel

Exposed .env Files & JWT Exploitation

Daftar Isi Bab 1 — Exposed .env Files 1.1 Apa itu .env File 1.2 Mengapa Sering Terekspos 1.3 Dorking: Google 1.4 Dorking: Shodan / Censys / FOFA 1.5 Manual & Automated Discovery 1.6 Variasi Path & Filename 1.7 Parsing & Extracting Secrets 1.8 Exploitation per Secret Type 1.9 Laravel APP_KEY → RCE 1.10 Database Credentials → Data Access 1.11 Cloud Keys → Full Infrastructure 1.12 SMTP Credentials → Phishing / Account Takeover 1.13 Checklist .env Exploitation Bab 2 — JWT Exploitation 2.1 Apa itu JWT 2.2 Struktur JWT 2.3 Dimana JWT Ditemukan 2.4 Algorithm None Attack 2.5 Algorithm Confusion (RS256 → HS256) 2.6 Weak Secret Brute Force 2.7 JWT Secret dari .env / Source Code 2.8 KID Injection 2.9 JWK / JKU Header Injection 2.10 Expired Token Bypass 2.11 Privilege Escalation via JWT Claims 2.12 Tools 2.13 Checklist JWT Exploitation Bab 3 — Kombinasi: .env + JWT = Full Takeover 3.1 Flow Umum 3.2 Contoh Kasus: Laravel 3.3 Contoh Kasus: Node.js / Express 3.4 Contoh Kasus: Django / Flask 3.5 Dari JWT Admin ke RCE Bab 1 — Exposed .env Files 1.1 Apa itu .env File File .env menyimpan konfigurasi environment aplikasi. Isinya biasanya: ...