


Authorization Token manipulation using Burp Suite extender
by Xenofon Vassilakopoulos | May 5, 2017 | 5 comments
LATEST POSTS
- Basic knowledge to get started with Penetration Testing November 18, 2022
- Free Application Security Assessment for Start – Ups September 30, 2022
- War is Never the Answer February 22, 2022
- Log4Shell – Exploiting a Critical Remote Code Execution Vulnerability in Apache Log4j (CVE-2021-44228) January 21, 2022
- EU GDPR vs Virginia CDPA April 22, 2021
- Data protection around the world – Part II March 31, 2021
- Data protection around the world March 24, 2021
TAGS
infosec
ctf
GDPR compliance
cyber security
social responsibility
partnerships
GDPR
Encryption
Reverse Engineering
Mobile Security
information security
Covid-19
collaborations
capture the flag
Web Security
Privacy
event
teleworking
computer security
pentest
TwelveSec
Burp Extender
pen-test
bruteforce
social distancing
Application Penetration Test
Corelan
IT security
Cyber Defense tool
reversing
CCPA
Web Application Penetration Testing
Misconfigurations
NY SHIELD
community
android
cybersecurity
Ransomware attacks
self-isolation
vulnerabilities
ICT security
Information Leakage
Coronavirus
Penetration Testing
Ethics
ΝΟΤΕ
* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.