Spoofing HS256 Cupon Code
by Echo5Echo - Friday January 24, 2025 at 09:59 PM
#1
Trying to spoof a cupon code request, would appreciate any resources thrown my way to learn how to get this done. 

https://geekydrop.com/api/coupon/claim

 Here’s the setup:
  • The system uses a POST API endpoint for coupon claims
  • The request requires a Bearer token (JWT) for authorization, which includes basic claims like email and session information.
  • Coupon codes are alphanumeric, 12 characters long.
  • The server returns a 500 Internal Server Error for invalid input

    but I’d like to test the following:
    • Whether coupon codes are predictable or vulnerable to brute-forcing.
    • If the JWT implementation has potential weaknesses (e.g., weak signing secret or algorithm tampering).
    • How to identify patterns or potential flaws in the API’s response.

What I’ve done so far:
  • Decoded the JWT to check its payload and algorithm (HS256).
  • Tested a few common coupon code patterns manually (e.g.,
    SAVE10 ,DISCOUNT20), but the system hasn’t returned valid responses yet.
  • Analyzed API responses for hints about how coupon validation is processed.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  A collection of deepweb sites [2025] dg7ka 117 3,823 4 hours ago
Last Post: helicoil1234
  [GUIDE] What to do when arrested! 0x666 201 27,288 4 hours ago
Last Post: caribou
  What is your most efficent way to gain initial access? likju 5 348 10 hours ago
Last Post: phas3lock
  Tanaka leak real email unret 0 82 Yesterday, 10:36 AM
Last Post: unret
  CHATGPT jailbreak | cyber devils Abandoned 92 10,921 Yesterday, 07:46 AM
Last Post: Rochet

Forum Jump:


 Users browsing this forum: 1 Guest(s)