Tools / JWT Decoder
JWT Decoder
Paste a JWT token to instantly decode its three parts: the algorithm header, the claims payload, and the base64url-encoded signature. The token structure is color-coded so you can see exactly where each section begins and ends.
Paste a JWT token above to decode its header and payload.
JWTs in CTF web challenges
A JSON Web Token is a compact, URL-safe way to transmit claims between parties. It consists of three base64url-encoded parts separated by dots: header.payload.signature. The header specifies the signing algorithm (e.g. HS256), the payload carries the actual claims, and the signature verifies integrity.
Common CTF vulnerabilities involve JWTs:
- Weak secret — if the HMAC secret is short or guessable, forge a new token with elevated privileges.
- Algorithm confusion — changing
algfromRS256toHS256and signing with the public key as the HMAC secret. - None algorithm — some libraries accept
"alg": "none"and skip signature verification entirely.
Challenges solved with this tool: picoCTF 2023 -- Java Code Analysis!?!.