


Authorization Token manipulation using Burp Suite extender
by Xenofon Vassilakopoulos | May 5, 2017 | 2 comments
LATEST POSTS
- War is Never the Answer February 22, 2022
- Log4Shell – Exploiting a Critical Remote Code Execution Vulnerability in Apache Log4j (CVE-2021-44228) January 21, 2022
- EU GDPR vs Virginia CDPA April 22, 2021
- Data protection around the world – Part II March 31, 2021
- Data protection around the world March 24, 2021
- The Privacy Shield Frameworks March 3, 2021
- GDPR vs LGPD February 24, 2021
TAGS
Misconfigurations
infosec
Ransomware attacks
event
social distancing
cybersecurity
ICT security
Corelan
bruteforce
social responsibility
IT security
NY SHIELD
cyber security
CCPA
ctf
Application Penetration Test
community
Reverse Engineering
Information Leakage
Web Application Penetration Testing
information security
pentest
self-isolation
vulnerabilities
TwelveSec
GDPR
Encryption
Ethics
partnerships
Cyber Defense tool
GDPR compliance
Burp Extender
computer security
reversing
Penetration Testing
collaborations
capture the flag
android
Privacy
Web Security
teleworking
pen-test
Mobile Security
Covid-19
Coronavirus
ΝΟΤΕ
* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.