


Authorization Token manipulation using Burp Suite extender
by Xenofon Vassilakopoulos | May 5, 2017 | 5 comments
LATEST POSTS
- Red Teaming – What is it and do you need it? February 5, 2025
- Introducing Tabletop Exercises (TTX) December 2, 2024
- Introducing Incident Handling November 26, 2024
- The EU NIS 2 Directive October 11, 2024
- Domain Admin through a simple Xerox Printer July 24, 2024
- LedgerSMB – CVE-2024-23831: Privilege escalation through CSRF attack on “setup.pl” February 2, 2024
- The Current State of Phishing Attacks November 22, 2023
TAGS
IT security
ethical hacking
Mobile Security
cyber security
community
collaborations
iot
Covid-19
CCPA
penetration test
vulnerabilities
Services
mobile
GDPR
partnerships
Corelan
cybersecurity
pen-test
Penetration Testing
defence
computer security
Burp Extender
Application Penetration Test
ICT security
Information Leakage
Coronavirus
social distancing
Web Security
Privacy
Misconfigurations
Reverse Engineering
android
infosec
ctf
teleworking
reversing
pentesting
security
social responsibility
pentest
GDPR compliance
TwelveSec
capture the flag
Cyber Defense tool
Ransomware attacks
ΝΟΤΕ
* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.