Authorization Token manipulation using Burp Suite extender
by Xenofon Vassilakopoulos | May 5, 2017 | 5 comments
LATEST POSTS
- The EU NIS 2 Directive October 11, 2024
- Domain Admin through a simple Xerox Printer July 24, 2024
- LedgerSMB – CVE-2024-23831: Privilege escalation through CSRF attack on “setup.pl” February 2, 2024
- The Current State of Phishing Attacks November 22, 2023
- Bypassing anti-reversing defences in iOS applications October 10, 2023
- iOS Instrumentation using Corellium, frida and r2frida September 27, 2023
- DLL Side Loading December 16, 2022
TAGS
community
infosec
collaborations
reversing
security
cyber security
Information Leakage
self-isolation
computer security
penetration test
capture the flag
IT security
iot
ctf
Corelan
GDPR compliance
ethical hacking
Coronavirus
Privacy
Reverse Engineering
pen-test
hacking
pentest
Misconfigurations
Penetration Testing
social responsibility
TwelveSec
GDPR
Covid-19
ICT security
pentesting
android
cybersecurity
Cyber Defense tool
partnerships
teleworking
Web Security
social distancing
CCPA
vulnerabilities
Burp Extender
Mobile Security
mobile
Application Penetration Test
Ransomware attacks
ΝΟΤΕ
* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.