


Authorization Token manipulation using Burp Suite extender
by Xenofon Vassilakopoulos | May 5, 2017 | 5 comments
LATEST POSTS
- Basic knowledge to get started with Penetration Testing November 18, 2022
- Free Application Security Assessment for Start – Ups September 30, 2022
- War is Never the Answer February 22, 2022
- Log4Shell – Exploiting a Critical Remote Code Execution Vulnerability in Apache Log4j (CVE-2021-44228) January 21, 2022
- EU GDPR vs Virginia CDPA April 22, 2021
- Data protection around the world – Part II March 31, 2021
- Data protection around the world March 24, 2021
TAGS
vulnerabilities
self-isolation
Misconfigurations
information security
Coronavirus
GDPR compliance
Privacy
cybersecurity
reversing
Corelan
android
ctf
Application Penetration Test
CCPA
IT security
social distancing
Web Application Penetration Testing
pentest
ICT security
pen-test
event
partnerships
Covid-19
TwelveSec
NY SHIELD
infosec
capture the flag
Reverse Engineering
social responsibility
Ransomware attacks
teleworking
cyber security
collaborations
Burp Extender
Penetration Testing
Ethics
Mobile Security
GDPR
Encryption
Web Security
bruteforce
Information Leakage
computer security
Cyber Defense tool
community
ΝΟΤΕ
* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.