Authorization Token manipulation using Burp Suite extender
by Xenofon Vassilakopoulos | May 5, 2017 | 5 comments
LATEST POSTS
- Introducing Tabletop Exercises (TTX) December 2, 2024
- Introducing Incident Handling November 26, 2024
- The EU NIS 2 Directive October 11, 2024
- Domain Admin through a simple Xerox Printer July 24, 2024
- LedgerSMB – CVE-2024-23831: Privilege escalation through CSRF attack on “setup.pl” February 2, 2024
- The Current State of Phishing Attacks November 22, 2023
- Bypassing anti-reversing defences in iOS applications October 10, 2023
TAGS
social responsibility
collaborations
pen-test
Ransomware attacks
penetration test
teleworking
Privacy
reversing
vulnerabilities
ICT security
TwelveSec
pentesting
capture the flag
social distancing
Coronavirus
community
Burp Extender
Covid-19
infosec
ctf
Reverse Engineering
cyber security
Penetration Testing
cybersecurity
Corelan
CCPA
security
iot
Web Security
partnerships
Misconfigurations
GDPR compliance
IT security
computer security
pentest
ethical hacking
self-isolation
Information Leakage
mobile
hacking
Cyber Defense tool
Mobile Security
android
GDPR
Application Penetration Test
ΝΟΤΕ
* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.