


Authorization Token manipulation using Burp Suite extender
by Xenofon Vassilakopoulos | May 5, 2017 | 5 comments
LATEST POSTS
- Digital Operational Resilience Act – DORA – Part II March 7, 2025
- Digital Operational Resilience Act – DORA February 26, 2025
- Red Teaming – What is it and do you need it? February 5, 2025
- Introducing Tabletop Exercises (TTX) December 2, 2024
- Introducing Incident Handling November 26, 2024
- The EU NIS 2 Directive October 11, 2024
- Domain Admin through a simple Xerox Printer July 24, 2024
TAGS
13033
bruteforce
Automotive
Application Source Code Review
0-days
0-day
ALPHA BANK
communication
Application Penetration Test
APPI
Car Manufacturers
Bank
Aerospace
Brick & Mortar
ALDI
ADSL
capture the flag
airlines
adb
Authorization Token
Athens
Apple
collaborations
Burp Extender
business continuity
Compliance
android
CDPA
Android App Reversing
Bearer Token
Conditions
Architecture Review
Clients
CCPA
computer security
community
apk
Careers
Christmas
Business Impact Assessment
Compromise Assessment
0day
Android Security
Bashdoor
cell
ΝΟΤΕ
* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.