What is Reset Tolkien?
Reset Tolkien is a specialized tool designed for detecting and exploiting vulnerabilities related to time-based secrets. It is particularly useful for identifying and attacking tokens that rely on timestamp-based generation methods.
Usage
Reset Tolkien offers several commands for different tasks related to detecting and attacking time-based tokens:
Detecting Token Format:
To detect if a token is time-based, use:
reset-tolkien detect 660430516ffcf -d "Wed, 27 Mar 2024 14:42:25 GMT" --prefixes "attacker@example.com" --suffixes "attacker@example.com" --timezone "-7"`
Brute Force Attack:
To perform a brute force attack to find possible tokens:
reset-tolkien bruteforce 660430516ffcf -bt 1711550546.485597 -et 1711550546.505134 -o output.txt --token-format="uniqid"
Sandwich Attack:
To export possible tokens based on a time frame using the sandwich method:
reset-tolkien sandwich 660430516ffcf -bt 1711550546.485597 -et 1711550546.505134 -o output.txt --token-format="uniqid"
Supported Encoding and Hash Functions
Reset Tolkien supports various encoding and hash functions, including:
- base32
- base64
- urlencode
- hexint
- hexstr
- uniqid
- uuidv1
- shortuuid
- mongodb_objectid
- datetime
- datetimeRFC2822
- md5
- sha1
- sha224
- sha256
- sha384
- sha512
- sha3_224
- sha3_256
- sha3_384
- sha3_512
- blake_256
- blake_512
More Information
For detailed usage instructions and updates, refer to the Reset Tolkien GitHub repository (opens in a new tab).
Reset Tolkien is a specialized tool aimed at security researchers and developers to identify and mitigate vulnerabilities related to time-based token systems. Always ensure ethical use and proper authorization before testing or exploiting systems with such tools.