


Authorization Token manipulation using Burp Suite extender
by Xenofon Vassilakopoulos | May 5, 2017 | 5 comments
LATEST POSTS
- Why You Need A Penetration Test Like You Need A Vaccine May 23, 2025
- Digital Operational Resilience Act – DORA – Part II March 7, 2025
- Digital Operational Resilience Act – DORA February 26, 2025
- Red Teaming – What is it and do you need it? February 5, 2025
- Introducing Tabletop Exercises (TTX) December 2, 2024
- Introducing Incident Handling November 26, 2024
- The EU NIS 2 Directive October 11, 2024
TAGS
collaborations
Christmas
Careers
Conditions
Burp Extender
0-day
airlines
Bank
Compliance
Bearer Token
business continuity
CDPA
communication
community
Authorization Token
Compromise Assessment
Architecture Review
Application Penetration Test
APPI
Car Manufacturers
0day
Application Source Code Review
computer security
cell
apk
13033
ALPHA BANK
android
Business Impact Assessment
0-days
Aerospace
Automotive
adb
Athens
Clients
Apple
Android Security
Bashdoor
Android App Reversing
CCPA
capture the flag
Brick & Mortar
ALDI
ADSL
bruteforce
ΝΟΤΕ
* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.